相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A Survey on Deep Learning for Named Entity Recognition
Jing Li et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2022)
Senti-eSystem: A sentiment-basedeSystem-using hybridized fuzzy and deep neural network for measuring customer satisfaction
Muhammad Zubair Asghar et al.
SOFTWARE-PRACTICE & EXPERIENCE (2021)
A novel PCA-whale optimization-based deep neural network model for classification of tomato plant diseases using GPU
Thippa Reddy Gadekallu et al.
JOURNAL OF REAL-TIME IMAGE PROCESSING (2021)
Intelligent Fake News Detection: A Systematic Mapping
Caio Meneses Silva et al.
JOURNAL OF APPLIED SECURITY RESEARCH (2021)
Fake news detection within online social media using supervised artificial intelligence algorithms
Feyza Altunbey Ozbay et al.
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2020)
Coronavirus Disease 2019 (COVID-19) in Italy
Edward Livingston et al.
JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION (2020)
Location Based Business Recommendation Using Spatial Demand
Ashok P. Kumar et al.
SUSTAINABILITY (2020)
A review on classification of imbalanced data for wireless sensor networks
Harshita Patel et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2020)
Automated detection of COVID-19 cases using deep neural networks with X-ray images
Tulin Ozturk et al.
COMPUTERS IN BIOLOGY AND MEDICINE (2020)
Predictive model for battery life in IoT networks
Praveen Kumar Reddy Maddikunta et al.
IET INTELLIGENT TRANSPORT SYSTEMS (2020)
COVID-19 Patient Health Prediction Using Boosted Random Forest Algorithm
Celestine Iwendi et al.
FRONTIERS IN PUBLIC HEALTH (2020)
Fighting COVID-19 Misinformation on Social Media: Experimental Evidence for a Scalable Accuracy-Nudge Intervention
Gordon Pennycook et al.
PSYCHOLOGICAL SCIENCE (2020)
Analysis of Dimensionality Reduction Techniques on Big Data
G. Thippa Reddy et al.
IEEE ACCESS (2020)
Realizing an Efficient IoMT-Assisted Patient Diet Recommendation System Through Machine Learning Model
Celestine Iwendi et al.
IEEE ACCESS (2020)
Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies
Saqib Hakak et al.
IEEE ACCESS (2020)
Mining Malware To Detect Variants
Ahmad Azab et al.
2014 5TH CYBERCRIME AND TRUSTWORTHY COMPUTING CONFERENCE CTC (2014)
Malicious Spam Emails Developments and Authorship Attribution
Mamoun Alazab et al.
2013 FOURTH CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2013) (2014)
Triaxial Accelerometer-Based Fall Detection Method Using a Self-Constructing Cascade-AdaBoost-SVM Classifier
Wen-Chang Cheng et al.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2013)