Author of the publication

Team Sigmoid at CheckThat!2021 Task 3a: Multiclass fake news detection with Machine Learning.

, , , , and . CLEF (Working Notes), volume 2936 of CEUR Workshop Proceedings, page 612-618. CEUR-WS.org, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing Trust Networks Based on User Tagging Information for Recommendation Making., , , , and . WISE, volume 6488 of Lecture Notes in Computer Science, page 357-364. Springer, (2010)A Proposed PST Model for Enhancing E-Learning Experiences., , , and . ICDTE, page 44-48. ACM, (2017)Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making., , and . Web Intelligence/IAT Workshops, page 107-110. IEEE Computer Society, (2008)978-0-7695-3496-1.RFI and SQLi based local file inclusion vulnerabilities in web applications of Bangladesh., , , and . IWCI, page 21-25. IEEE, (2016)Customer Feedback Prioritization Technique: A Case Study on Lean Startup., , , , , and . ICCSA (5), volume 11623 of Lecture Notes in Computer Science, page 70-81. Springer, (2019)A Comparative Study on GA-based Scheduling on Cloud Computing., , , , and . CIIS, page 74-78. ACM, (2019)e-School: Design and Implementation of Web Based Teaching Institution for Enhancing E-Learning Experiences., , and . ICCCI (1), volume 11055 of Lecture Notes in Computer Science, page 99-108. Springer, (2018)Optimal Trust Network Analysis with Subjective Logic., and . SECURWARE, page 179-184. IEEE Computer Society, (2008)Dataset of suspicious phishing URL detection., , , and . Frontiers Comput. Sci., (2024)Knowledge Management in Distributed Agile Software Development Projects., , and . AI4KM@FedCSIS, volume 469 of IFIP Advances in Information and Communication Technology, page 107-131. Springer, (2014)