Author of the publication

Aggression Identification in English, Hindi and Bangla Text using BERT, RoBERTa and SVM.

, , , and . TRAC@LREC, page 76-82. European Language Resources Association (ELRA), (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol., , and . SIN, page 111-118. ACM, (2011)Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm., , , and . SocProS (2), volume 131 of Advances in Intelligent and Soft Computing, page 305-315. Springer, (2011)An Active Intrusion Detection System for LAN Specific Attacks., , , , , , , and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 129-142. Springer, (2010)An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks., , , , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 294-308. Springer, (2011)Eye center localization and detection using radial mapping., , , , and . ICIP, page 3121-3125. IEEE, (2016)An Active Detection Mechanism for Detecting ICMP Based Attacks., , , , and . TrustCom, page 51-58. IEEE Computer Society, (2012)ABARUAH at SemEval-2019 Task 5 : Bi-directional LSTM for Hate Speech Detection., , and . SemEval@NAACL-HLT, page 371-376. Association for Computational Linguistics, (2019)IIITG-ADBU at SemEval-2020 Task 12: Comparison of BERT and BiLSTM in Detecting Offensive Language., , , and . SemEval@COLING, page 1562-1568. International Committee for Computational Linguistics, (2020)IIITG-ADBU at SemEval-2020 Task 9: SVM for Sentiment Analysis of English-Hindi Code-Mixed Text., , , and . SemEval@COLING, page 946-950. International Committee for Computational Linguistics, (2020)An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics., , and . CSS, volume 7672 of Lecture Notes in Computer Science, page 139-152. Springer, (2012)