Author of the publication

Design and Evaluation of Deep Learning Models for Real-Time Credibility Assessment in Twitter.

, , , and . ICANN (5), volume 12895 of Lecture Notes in Computer Science, page 396-408. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ActiveLLM: Large Language Model-based Active Learning for Textual Few-Shot Scenarios., and . CoRR, (2024)Design and Evaluation of Deep Learning Models for Real-Time Credibility Assessment in Twitter., , , and . ICANN (5), volume 12895 of Lecture Notes in Computer Science, page 396-408. Springer, (2021)CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data., , , , , , , and . ICICS (1), volume 12918 of Lecture Notes in Computer Science, page 429-446. Springer, (2021)Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher., , , , , and . MuC (Workshopband), Gesellschaft für Informatik e.V., (2018)Data augmentation in natural language processing: a novel text generation approach for long and short text classifiers., , , , , and . Int. J. Mach. Learn. Cybern., 14 (1): 135-150 (January 2023)'We Do Not Have the Capacity to Monitor All Media': A Design Case Study on Cyber Situational Awareness in Computer Emergency Response Teams., , , and . CHI, page 580:1-580:16. ACM, (2024)XAI-Attack: Utilizing Explainable AI to Find Incorrectly Learned Patterns for Black-Box Adversarial Example Creation., , , , and . LREC/COLING, page 17725-17738. ELRA and ICCL, (2024)CYWARN: Strategy and Technology Development for Cross-Platform Cyber Situational Awareness and Actor-Specific Cyber Threat Communication., , , , , , , , , and 3 other author(s). MuC (Workshopband), Gesellschaft für Informatik e.V., (2021)OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases., , , and . ARES, page 22:1-22:11. ACM, (2021)Information Overload in Crisis Management: Bilingual Evaluation of Embedding Models for Clustering Social Media Posts in Emergencies., , and . ECIS, (2021)