The #MeToo movement has catalyzed widespread public discourse surroundin...
Web 2.0 recommendation systems, such as Yelp, connect users and business...
The ability of ChatGPT to generate human-like responses and understand
c...
The popularity and hype around purchasing digital assets such as art, vi...
Several face de-identification methods have been proposed to preserve us...
While phishing attacks have evolved to utilize several obfuscation tacti...
In this study, we explore the power of group dynamics to shape the toxic...
Twitter is one of the most popular online micro-blogging and social
netw...
Online toxic attacks, such as harassment, trolling, and hate speech have...
Vaccination represents a major public health intervention intended to pr...
To counter online abuse and misinformation, social media platforms have ...
Objective: The aims of the study were to examine the association between...
Phishing attacks are an increasingly potent web-based threat, with nearl...
Recently, threat intelligence and security tools have been augmented to ...
Recently, some studies have shown that text classification tasks are
vul...
Audio Event Detection (AED) Systems capture audio from the environment a...
The Web has become the main source for news acquisition. At the same tim...
Side-channel attacks allow an adversary to uncover secret program data b...
In the past few years, consumer review sites have become the main target...
While social media has become an empowering agent to individual voices a...