Share This Author
Network Anomaly Detection: Methods, Systems and Tools
- M. Bhuyan, D. Bhattacharyya, J. Kalita
- Computer ScienceIEEE Communications Surveys & Tutorials
- 21 January 2014
This paper provides a structured and comprehensive overview of various facets of network anomaly detection so that a researcher can become quickly familiar with every aspect of network anomalies detection.
Comparing Twitter Summarization Algorithms for Multiple Post Summaries
- David I. Inouye, J. Kalita
- Computer ScienceIEEE Third Int'l Conference on Privacy, Security…
- 1 October 2011
This paper compares algorithms for extractive summarization of micro log posts with two algorithms that produce summaries by selecting several posts from a given set.
Streaming trend detection in Twitter
Methodologies of detecting and identifying trending topics from streaming data from Twitter's streaming API were outlined, and term frequency-inverse document frequency analysis identified unigrams, bigrams, and trigrams as trending topics.
Summarizing Microblogs Automatically
An algorithm is developed that takes a trending phrase or any phrase specified by a user, collects a large number of posts containing the phrase, and provides an automatically created summary of the posts related to the term.
A Survey of the Usages of Deep Learning for Natural Language Processing
- Dan Otter, J. R. Medina, J. Kalita
- Computer ScienceIEEE Transactions on Neural Networks and Learning…
- 27 July 2018
An introduction to the field and a quick overview of deep learning architectures and methods is provided and a discussion of the current state of the art is provided along with recommendations for future research in the field.
Experiments in Microblog Summarization
- B. Sharifi, Mark-Anthony Hutton, J. Kalita
- Computer ScienceIEEE Second International Conference on Social…
- 20 August 2010
The goal is to produce summaries that are similar to what a human would produce for the same collection of posts on a speciﬁc topic, and evaluate the summaries produced by the summarizing algorithms, compare them with human-produced summaries and obtain excellent results.
MIFS-ND: A mutual information-based feature selection method
Deep Learning applied to NLP
This paper will try to explain the basics of CNNs, its different variations and how they have been applied to NLP.
A comparison of algorithms for the pairwise alignment of biological networks
This work presents the problem of biological network alignment, provides a guide to existing alignment algorithms and comprehensively benchmark existing algorithms on both synthetic and real-world biological data, finding dramatic differences between existing algorithms in the quality of the alignments they produce.
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions
A distributed denial of service (DDoS) attack is a large-scale, coordinated attack on the availability of services of a victim system or network resources, launched indirectly through many compromised computers on the Internet.