279 results on '"Rakesh M. Verma"'
Search Results
2. Can Machines Tell Stories? A Comparative Study of Deep Neural Language Models and Metrics
3. An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs
4. All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset.
5. Domain-Agnostic Adapter Architecture for Deception Detection: Extensive Evaluations with the DIFrauD Benchmark.
6. DetectiveReDASers at HSD-2Lang 2024: A New Pooling Strategy with Cross-lingual Augmentation and Ensembling for Hate Speech Detection in Low-resource Languages.
7. Domain Independent Deception Detection: Feature Sets, LIWC Efficacy, and Synthetic Data Challenges.
8. LLMs for Explainable Few-shot Deception Detection.
9. Data Quality in NLP: Metrics and a Comprehensive Taxonomy.
10. Blue Sky: Multilingual, Multimodal Domain Independent Deception Detection.
11. ReDASPersuasion at SemEval-2023 Task 3: Persuasion Detection using Multilingual Transformers and Language Agnostic Features.
12. DetectiveRedasers at ArAIEval Shared Task: Leveraging Transformer Ensembles for Arabic Deception Detection.
13. ReDASPersuasion at ArAIEval Shared Task: Multilingual and Monolingual Models For Arabic Persuasion Detection.
14. Adversarial Robustness of Phishing Email Detection Models.
15. USDOT Tier-1 University Transportation Center for Advancing Cybersecurity Research and Education.
16. Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection.
17. The Pitfalls of Publishing in the Age of LLMs: Strange and Surprising Adventures with a High-Impact NLP Journal.
18. Homograph Attacks on Maghreb Sentiment Analyzers.
19. A Roadmap for Multilingual, Multimodal Domain Independent Deception Detection.
20. Unmasking the Imposters: In-Domain Detection of Human vs. Machine-Generated Tweets.
21. Domain-Independent Deception: A New Taxonomy and Linguistic Analysis.
22. Sixteen Years of Phishing User Studies: What Have We Learned?
23. Rebutting Rebuttals.
24. Enhancement of Twitter event detection using news streams.
25. Software Vulnerability Detection via Multimodal Deep Learning.
26. Leveraging Synthetic Data and PU Learning For Phishing Email Detection.
27. Data Quality and Linguistic Cues for Domain-independent Deception Detection.
28. Does Deception Leave a Content Independent Stylistic Trace?
29. Vulnerability Detection via Multimodal Learning: Datasets and Analysis.
30. On the Feasibility of Using GANs for Claim Verification- Experiments and Analysis.
31. Claim Verification Using a Multi-GAN Based Model.
32. Phishing Sites Detection from a Web Developer's Perspective Using Machine Learning.
33. Diverse Datasets and a Customizable Benchmarking Framework for Phishing.
34. Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders.
35. Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate.
36. Developing A Compelling Vision for Winning the Cybersecurity Arms Race.
37. PhishBench 2.0: A Versatile and Extendable Benchmarking Framework for Phishing.
38. SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective.
39. Phishing Email Detection Using Robust NLP Techniques.
40. Performance Evaluation of Features and Clustering Algorithms for Malware.
41. Machine Learning Methods for Software Vulnerability Detection.
42. University of Houston @ CL-SciSumm 2018.
43. Parameter Tuning and Confidence Limits of Malware Clustering.
44. Data Quality for Security Challenges: Case Studies of Phishing, Malware and Intrusion Detection Datasets.
45. Sixteen Years of Phishing User Studies: What Have We Learned?
46. Online news media website ranking using user-generated content.
47. The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories.
48. ICE: Idiom and Collocation Extractor for Research and Education.
49. What's in a URL: Fast Feature Extraction and Malicious URL Detection.
50. Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.