Mining structured knowledge from tweets using named entity recognition (...
Third-party libraries (TPLs) are extensively utilized by developers to
e...
Compiler optimization level recognition can be applied to vulnerability
...
The widespread code reuse allows vulnerabilities to proliferate among a ...
Modality representation learning is an important problem for multimodal
...
Named Entity Recognition (NER) on social media refers to discovering and...
Enterprise relation extraction aims to detect pairs of enterprise entiti...
The order/dimension of models derived on the basis of data is commonly
r...
This paper explores the threat detection for general Social Engineering ...
Although the importance of using static analysis to detect taint-style
v...
This paper proposes an authentication-simplified and deceptive scheme
(S...
The rapid growth of the Industrial Internet of Things (IIoT) has brought...
Named entity recognition (NER) remains challenging when entity mentions ...
Social engineering has posed a serious threat to cyberspace security. To...
Extracting entities and relations from unstructured text has attracted
i...
IP geolocation aims at locating the geographical position of Internet
de...
In recent years, IoT platforms and systems have been rapidly emerging.
A...
Renewable energy assisted heterogeneous networks can improve system capa...