- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- Topic Modeling
- Multimodal Machine Learning Applications
- Spam and Phishing Detection
- Natural Language Processing Techniques
- Cryptography and Data Security
- French Urban and Social Studies
- European Political History Analysis
- Wireless Body Area Networks
- Sexuality, Behavior, and Technology
- Wireless Communication Networks Research
- Scottish History and National Identity
- Wireless Sensor Networks for Data Analysis
- Fault Detection and Control Systems
- IoT and Edge/Fog Computing
- Misinformation and Its Impacts
- Security and Verification in Computing
- Authorship Attribution and Profiling
- Network Security and Intrusion Detection
- Multiculturalism, Politics, Migration, Gender
- Opportunistic and Delay-Tolerant Networks
- Embedded Systems and FPGA Design
- Context-Aware Activity Recognition Systems
- Cybercrime and Law Enforcement Studies
Data augmentation is an important component in the robustness evaluation of models natural language processing (NLP) and enhancing diversity data they are trained on. In this paper, we present NL-Augmenter, a new participatory Python-based framework which supports creation both transformations (modifications to data) filters (data splits according specific features). We describe initial set 117 23 for variety tasks. demonstrate efficacy NL-Augmenter by using several its analyze popular...
Text data augmentation, i.e., the creation of new textual from an existing text, is challenging. Indeed, augmentation transformations should take into account language complexity while being relevant to target Natural Language Processing (NLP) task (e.g., Machine Translation, Classification). Initially motivated by application Business Email Compromise (BEC) detection, we propose a corpus and agnostic framework used as service augment English texts within our company. Our proposal combines...
M2M devices are ubiquitous, and there is a growing tendency to connect such mobile networks. Network operators investigating new solutions lower their costs address usability issues. Embedded SIM cards with remote provisioning capability one of the most promising solutions. GSMA, leading consortium on network standards, has proposed specification for an embedded card, called eUICC. The describes eUICC architecture mechanism. Embodiments this have potential disrupt telecommunications market:...
Election systems must ensure that representatives are chosen by voters. Moreover, each voter should have equal influence. Traditionally, this has been achieved permitting voters to cast at most one ballot. More recently, tallying the last ballot voter. We show is not Helios election system, because an adversary can cause a other than voter's be tallied. we how choose contents of such ballot, thus unduly influence selection representatives.
Tatarstan : a Paradigm for the Old Autonomous Regions of Russia, by Maxime Meyer This article deals with Russia's relations its former autonomous régions, which now aspire to independence. Tatarstan, most powerful, strongest tendencies in this direction, is used here as an example demonstrate problems. The author analyses political situation and forces at work republic.