Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Impersonators Exploit Instagram to Generate Fake Engagement?, , and . ICC, page 1-6. IEEE, (2020)Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools. (Profilage d'usagers professionnels et non-professionnels de services Internet basés sur l'implémentation d'outils de mesure Internet à grande échelle).. Telecom & Management SudParis, Évry, Essonne, France, (2015)A BERT-Based Transfer Learning Approach for Hate Speech Detection in Online Social Media., , and . COMPLEX NETWORKS (1), volume 881 of Studies in Computational Intelligence, page 928-940. Springer, (2019)Stweeler: A Framework for Twitter Bot Analysis., , , , and . WWW (Companion Volume), page 37-38. ACM, (2016)No offence, Bert - I insult only humans! Multilingual sentence-level attack on toxicity detection networks., , and . EMNLP (Findings), page 2362-2369. Association for Computational Linguistics, (2023)Read Over the Lines: Attacking LLMs and Toxicity Detection Systems with ASCII Art to Mask Profanity., , and . CoRR, (2024)Redefining Toxicity: An Objective and Context-Aware Approach for Stress-Level-Based Detection., , and . CoRR, (March 2025)Deep Dive on Politician Impersonating Accounts in Social Media., , and . ISCC, page 1-6. IEEE, (2019)P2P IP Telephony over wireless ad-hoc networks - A smart approach on super node admission., , , and . Peer-to-Peer Netw. Appl., 5 (4): 363-383 (2012)NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media., , , and . CoRR, (2017)