Khurum Nazir Junejo

Learn More
Text classification is widely used in applications ranging from e-mail filtering to review classification. Many of these applications demand that the classification method be efficient and robust, yet produce accurate categorizations by using the terms in the documents only. We present a supervised text classification method based on discriminative term(More)
Typically, spam filters are built on the assumption that the characteristics of e-mails in the training dataset is identical to those in individual users' inboxes on which it will be applied. This assumption is oftentimes incorrect leading to poor performance of the filter. A personalized spam filter is built by taking into account the characteristics of(More)
The accurate prediction of Web navigation patterns has immense commercial value as the Web evolves into a primary medium for marketing and sales for many businesses. Often these predictions are based on complex temporal models of users' behavior learned from historical data. Such an approach, however, is not readily understandable by business people and(More)
This paper proposes a method for learning ontologies given a corpus of text documents. The method identifies concepts in documents and organizes them into a subsumption hierarchy, without presupposing the existence of a seed ontology. The method uncovers latent topics in terms of which document text is being generated. These topics form the concepts of the(More)
Typically, spam filters are built on the assumption that the characteristics of e-mails in the training set is identical to those in individual users' inboxes on which it will be applied. This assumption is oftentimes incorrect leading to poor performance of the filter. A personalized spam filter is built by taking into account the characteristics of(More)
Content-based e-mail spam filtering continues to be a challenging machine learning problem. Usually, the joint distribution of e-mails and labels changes from user to user and from time to time, and the training data are poor representatives of the true distribution. E-mail service providers have two options for automatic spam filtering at the service-side:(More)
Autonomic and autonomous systems exist within a world view of their own. This world view is created from the training data and assumptions that were available at their inception. In most of these systems this world view becomes obsolete over time due to changes in the environment. This brings a level of inaccuracy in the autonomic behavior of the system.(More)
Cyber-physical systems (CPS) are often network integrated to enable remote management, monitoring, and reporting. Such integration has made them vulnerable to cyber attacks originating from an untrusted network (e.g., the internet). Once an attacker breaches the network security, he could corrupt operations of the system in question, which may in turn lead(More)
A great deal of information can be inferred from human facial images, such as emotions, gender, race, and age. Recently age estimation has developed a variety of applications including, internet access control, underage prevention of cigarette and alcohol machines, and many more. This paper presents a method to classify facial images into 3 evenly(More)