4.7 Article

Detecting COVID-19-Related Fake News Using Feature Extraction

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

A Survey on Deep Learning for Named Entity Recognition

Jing Li et al.

Summary: This paper provides a comprehensive review of existing deep learning techniques for named entity recognition (NER), including NER resources, categorization methods, and recent applied techniques. The paper introduces the basics of NER systems and outlines future research directions and challenges in the field.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2022)

Article Computer Science, Software Engineering

Senti-eSystem: A sentiment-basedeSystem-using hybridized fuzzy and deep neural network for measuring customer satisfaction

Muhammad Zubair Asghar et al.

Summary: In the competitive era of online industries, understanding customer feedback and satisfaction is crucial for any business organization. The proposed Senti-eSystem utilizes hybridized Fuzzy and Deep Neural Network technology to assist organizations in improving service and product quality, achieving high accuracy.

SOFTWARE-PRACTICE & EXPERIENCE (2021)

Article Computer Science, Artificial Intelligence

A novel PCA-whale optimization-based deep neural network model for classification of tomato plant diseases using GPU

Thippa Reddy Gadekallu et al.

Summary: With the rapid growth of human population, ensuring a healthy food supply and combating plant diseases threatening crop yield become crucial. This study focuses on using machine learning models to classify tomato disease images, extract features using optimization algorithms, apply deep neural networks for classification, and evaluate the model performance based on accuracy and loss rate metrics.

JOURNAL OF REAL-TIME IMAGE PROCESSING (2021)

Article Criminology & Penology

Intelligent Fake News Detection: A Systematic Mapping

Caio Meneses Silva et al.

Summary: The study aims to characterize and analyze Fake News threat detection, with results showing that the most commonly used algorithms are LSTM, Naive-Bayes, and Similarity Algorithm. The research indicates a lack of more controlled experiments in the Big Data context, highlighting fake news as a national security threat that requires effective solutions to combat it.

JOURNAL OF APPLIED SECURITY RESEARCH (2021)

Article Physics, Multidisciplinary

Fake news detection within online social media using supervised artificial intelligence algorithms

Feyza Altunbey Ozbay et al.

PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2020)

Article Medicine, General & Internal

Coronavirus Disease 2019 (COVID-19) in Italy

Edward Livingston et al.

JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION (2020)

Article Green & Sustainable Science & Technology

Location Based Business Recommendation Using Spatial Demand

Ashok P. Kumar et al.

SUSTAINABILITY (2020)

Review Computer Science, Information Systems

A review on classification of imbalanced data for wireless sensor networks

Harshita Patel et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2020)

Article Biology

Automated detection of COVID-19 cases using deep neural networks with X-ray images

Tulin Ozturk et al.

COMPUTERS IN BIOLOGY AND MEDICINE (2020)

Article Engineering, Electrical & Electronic

Predictive model for battery life in IoT networks

Praveen Kumar Reddy Maddikunta et al.

IET INTELLIGENT TRANSPORT SYSTEMS (2020)

Article Public, Environmental & Occupational Health

COVID-19 Patient Health Prediction Using Boosted Random Forest Algorithm

Celestine Iwendi et al.

FRONTIERS IN PUBLIC HEALTH (2020)

Article Psychology, Multidisciplinary

Fighting COVID-19 Misinformation on Social Media: Experimental Evidence for a Scalable Accuracy-Nudge Intervention

Gordon Pennycook et al.

PSYCHOLOGICAL SCIENCE (2020)

Article Computer Science, Information Systems

Analysis of Dimensionality Reduction Techniques on Big Data

G. Thippa Reddy et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Realizing an Efficient IoMT-Assisted Patient Diet Recommendation System Through Machine Learning Model

Celestine Iwendi et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies

Saqib Hakak et al.

IEEE ACCESS (2020)

Proceedings Paper Computer Science, Theory & Methods

Mining Malware To Detect Variants

Ahmad Azab et al.

2014 5TH CYBERCRIME AND TRUSTWORTHY COMPUTING CONFERENCE CTC (2014)

Proceedings Paper Computer Science, Theory & Methods

Malicious Spam Emails Developments and Authorship Attribution

Mamoun Alazab et al.

2013 FOURTH CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2013) (2014)

Article Computer Science, Information Systems

Triaxial Accelerometer-Based Fall Detection Method Using a Self-Constructing Cascade-AdaBoost-SVM Classifier

Wen-Chang Cheng et al.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2013)