4.6 Article

Using BiLSTM Networks for Context-Aware Deep Sensitivity Labelling on Conversational Data

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

An intelligent healthcare monitoring framework using wearable sensors and social networking data

Farman Ali et al.

Summary: Wearable sensors and social networking platforms are crucial for healthcare monitoring, generating large volumes of unstructured data. A novel healthcare monitoring framework based on the cloud environment and a big data analytics engine is proposed to efficiently store and analyze healthcare data, improving classification accuracy. Data mining techniques, ontologies, and Bi-LSTM are utilized for efficient preprocessing and classification of healthcare data, leading to accurate health condition classification and drug side effect predictions.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Information Systems

An Integrated LSTM Neural Networks Approach to Sustainable Balanced Scorecard-Based Early Warning System

Ednan Ayvaz et al.

IEEE ACCESS (2020)

Review Computer Science, Theory & Methods

A Systematic Review on Imbalanced Data Challenges in Machine Learning: Applications and Solutions

Harsurinder Kaur et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Information Systems

Enhancing clinical concept extraction with contextual embeddings

Yuqi Si et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2019)

Article Computer Science, Theory & Methods

Survey on deep learning with class imbalance

Justin M. Johnson et al.

JOURNAL OF BIG DATA (2019)

Article Biochemical Research Methods

Identifying tweets of personal health experience through word embedding and LSTM neural network

Keyuan Jiang et al.

BMC BIOINFORMATICS (2018)

Article Computer Science, Artificial Intelligence

Frankenstein: Learning Deep Face Representations Using Small Data

Guosheng Hu et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2018)

Proceedings Paper Computer Science, Hardware & Architecture

URL2Vec: URL Modeling with Character Embeddings for Fast and Accurate Phishing Website Detection

Huaping Yuan et al.

2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS (2018)

Proceedings Paper Computer Science, Hardware & Architecture

Context-Aware Data Loss Prevention for Cloud Storage Services

Yuya Jeremy Ong et al.

2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD) (2017)

Article Computer Science, Theory & Methods

Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online

Alessandro Acquisti et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Information Systems

Privacy and rationality in individual decision making

A Acquisti et al.

IEEE SECURITY & PRIVACY (2005)