Author of the publication

CTI-Twitter: Gathering Cyber Threat Intelligence from Twitter using Integrated Supervised and Unsupervised Learning.

, , , and . IEEE BigData, page 2299-2308. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Well Do Deep Learning Models Capture Human Concepts? The Case of the Typicality Effect., , and . CoRR, (2024)From Intentions to Techniques: A Comprehensive Taxonomy and Challenges in Text Watermarking for Large Language Models., , , and . CoRR, (2024)Development of Cognitive Intelligence in Pre-trained Language Models., , and . EMNLP, page 9632-9657. Association for Computational Linguistics, (2024)LLMs Assist NLP Researchers: Critique Paper (Meta-)Reviewing., , , , , , , , , and 30 other author(s). CoRR, (2024)Metrics for Peer Counseling: Triangulating Success Outcomes for Online Therapy Platforms., , , , , and . CHI, page 483:1-483:17. ACM, (2023)Pre-training LLMs using human-like development data corpus., , and . CoRR, (2023)What Makes Digital Support Effective? How Therapeutic Skills Affect Clinical Well-Being., , , , , , and . CoRR, (2023)Multi-Level Feedback Generation with Large Language Models for Empowering Novice Peer Counselors., , , , , and . ACL (1), page 4130-4161. Association for Computational Linguistics, (2024)Natural Mitigation of Catastrophic Interference: Continual Learning in Power-Law Learning Environments., , , and . ECAI, volume 392 of Frontiers in Artificial Intelligence and Applications, page 2886-2893. IOS Press, (2024)Bitcoin Data Analytics: Scalable techniques for transaction clustering and embedding generation., , , and . COMSNETS, page 1-6. IEEE, (2021)