Author of the publication

A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data.

, , , , and . IEEE Big Data, page 5418-5427. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing., , and . CoRR, (2023)Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks Using a Malware Dataset: A Comparative Analysis., , , , , , and . SSE, page 222-231. IEEE, (2023)Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words., , , , and . IEEE Big Data, page 5414-5423. IEEE, (2022)A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data., , and . CoRR, (2023)Deep Learning Approach for Classifying the Aggressive Comments on Social Media: Machine Translated Data Vs Real Life Data., , , and . CoRR, (2023)Understanding Rural women's Experience in STEM and Non-STEM field in Bangladesh., , and . COMPSAC, page 1037-1046. IEEE, (2023)Forecasting the Risk Factor of Frontier Markets: A Novel Stacking Ensemble of Neural Network Approach., , , and . Future Internet, 14 (9): 252 (2022)Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python., , , , and . CoRR, (2023)Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions.. CoRR, (2023)Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks., , , , and . COMPSAC, page 765-776. IEEE, (2023)