default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 825 matches
- 2024
- M. Abinaya, G. Vadivu:
Identification of Social Anxiety in High School: A Machine Learning Approaches to Real-Time Analysis of Student Characteristics. IEEE Access 12: 77932-77946 (2024) - Mahmoud Ahmad Al-Khasawneh, Muhammad Faheem, Ala Abdulsalam Alarood, Safa Habibullah, Eesa A. Alsolami:
Toward Multi-Modal Approach for Identification and Detection of Cyberbullying in Social Networks. IEEE Access 12: 90158-90170 (2024) - Farhan Amin, Ligang He, Gyu Sang Choi:
City Hotspot Identification Using Smart Cyber-Physical Social System. IEEE Access 12: 60556-60567 (2024) - Ayesha Atif, Amna Zafar, Muhammad Wasim, Talha Waheed, Amjad Ali, Hazrat Ali, Zubair Shah:
Cyberbullying Detection and Abuser Profile Identification on Social Media for Roman Urdu. IEEE Access 12: 123339-123351 (2024) - Zhenjie Liu, Yingyue Su, Xiangming Xiao, Yuanwei Qin, Jun Li, Luo Liu:
Identification and mapping of yellow-flowering rapeseed fields by combining social media data, Sentinel-2 imagery, deep learning algorithm, and Google Earth Engine. Int. J. Appl. Earth Obs. Geoinformation 132: 104047 (2024) - Guoqing Zhao, Shaofeng Liu, Carmen Lopez, Yi Wang, Haiyan Lu, Jinhua Zhang:
Identification, establishment of connection, and clustering of social risks involved in the agri-food supply chains: a cross-country comparative study. Ann. Oper. Res. 338(2): 1241-1282 (2024) - Nanhang Luo, Dongdong Xie, Yiwen Mo, Fei Li, Chong Teng, Donghong Ji:
Joint rumour and stance identification based on semantic and structural information in social networks. Appl. Intell. 54(11-12): 264-282 (2024) - Hamed Baziyad, Vahid Kayvanfar, Mehdi Toloo:
A data envelopment analysis model for opinion leaders' identification in social networks. Comput. Ind. Eng. 190: 110010 (2024) - Jisu Kim:
The value of a shared experience: Relationships between co-experience and identification with other audiences and audience engagement behaviors on social media. Comput. Hum. Behav. 152: 108050 (2024) - Mingfu Xiong, Hanmei Chen, Yi Wen, Abdul Khader Jilani Saudagar, Javier Del Ser, Khan Muhammad:
Person Re-identification with Spatial Multi-granularity Feature Exploration for Social Risk Situational Assessment. Cogn. Comput. 16(5): 2701-2712 (2024) - Sneha Mishra, Shashank Sheshar Singh, Shivansh Mishra, Bhaskar Biswas:
Multi-objective based unbiased community identification in dynamic social networks. Comput. Commun. 214: 18-32 (2024) - Xueqin Zhang, Zhineng Wang, Gang Liu, Yan Wang:
Key node identification in social networks based on topological potential model. Comput. Commun. 213: 158-168 (2024) - Ricardo Calderón-Suarez, Rosa María Ortega-Mendoza, Marco Antonio Márquez-Vera, Félix Agustín Castro Espinoza:
Automatic Identification of Misogynistic Content on Social Networks: An Approach based on Knowledge Transfer from Songs. Computación y Sistemas (CyS) 28(1) (2024) - Yiming Li, Xukan Xu, Muhammad Riaz, Yifan Su:
Risk identification of public opinion on social media: a new approach based on cross-spatial network analysis. Electron. Libr. 42(4): 576-597 (2024) - Narjes Firouzkouhi, Abbas Amini, Ahmed Bani-Mustafa, Arash Mehdizadeh, Sadeq Damrah, Ahmad Gholami, Chun Cheng, Bijan Davvaz:
Generalized fuzzy hypergraph for link prediction and identification of influencers in dynamic social media networks. Expert Syst. Appl. 238(Part A): 121736 (2024) - Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
A privacy-sensitive data identification model in online social networks. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - Ravi Kishore Devarapalli, Soumita Das, Anupam Biswas:
Multiple rumor source identification in social networks leveraging community and monitor information. Inf. Fusion 111: 102530 (2024) - Retraction Note: Spatial-temporal deep learning model based rumor source identification in social networks. J. Comb. Optim. 47(3): 22 (2024)
- Judit Gárdos, Julia Egyed-Gergely, Anna Horváth, Balázs E. Pataki, Roza Vajda, András Micsik:
Identification of social scientifically relevant topics in an interview repository: a natural language processing experiment. J. Documentation 80(2): 354-377 (2024) - Samawel Jaballi, Manar Joundy Hazar, Salah Zrigui, Azer Mahjoubi, Henri Nicolas, Mounir Zrigui:
Decoding Multilingual Topic Dynamics and Trend Identification through ARIMA Time Series Analysis on Social Networks: A Novel Data Translation Framework Enhanced by LDA/HDP Models. J. Electr. Comput. Eng. 2024 (2024) - Yasir Rashid, Javaid Iqbal Bhat:
An insight into topological, machine and Deep Learning-based approaches for influential node identification in social media networks: a systematic review. Multim. Syst. 30(1): 57 (2024) - Yaning Han, Ke Chen, Yunke Wang, Wenhao Liu, Zhouwei Wang, Xiaojing Wang, Chuanliang Han, Jiahui Liao, Kang Huang, Shengyuan Cai, Yiting Huang, Nan Wang, Jinxiu Li, Yangwangzi Song, Jing Li, Guo-Dong Wang, Liping Wang, Yaping Zhang, Pengfei Wei:
Multi-animal 3D social pose estimation, identification and behaviour embedding with a few-shot learning framework. Nat. Mac. Intell. 6(1): 48-61 (2024) - Joy Gorai, Dilip Kumar Shaw:
A BERT-encoded ensembled CNN model for suicide risk identification in social media posts. Neural Comput. Appl. 36(18): 10955-10970 (2024) - Brent J. Hale:
Examining the effect of identification with a social media community on persuasive message processing and attitude change. New Media Soc. 26(8): 4589-4610 (2024) - Shavez Mushtaq Qureshi, Atif Saeed, Sultan H. Almotiri, Farooq Ahmad, Mohammed A. Al Ghamdi:
Deepfake forensics: a survey of digital forensic methods for multimodal deepfake identification on social media. PeerJ Comput. Sci. 10: e2037 (2024) - Simone Magistri, Daniele Baracchi, Dasara Shullani, Andrew D. Bagdanov, Alessandro Piva:
Continual learning for adaptive social network identification. Pattern Recognit. Lett. 180: 82-89 (2024) - M. Venunath, Pothula Sujatha, Prasad Koti:
Identification of influential users in social media network using golden ratio optimization method. Soft Comput. 28(3): 2207-2222 (2024) - Jiangbo Zheng, Ying Liang:
User Interest Identification with Social Media Information using Natural Language and Meta-Heuristic Technique. ACM Trans. Asian Low Resour. Lang. Inf. Process. 23(1): 10:1-10:17 (2024) - Yansong Cao, Yutong Wang, Jiangong Wang, Yonglin Tian, Xiao Wang, Fei-Yue Wang:
Parameter Identification and Refinement for Parallel PCB Inspection in Cyber-Physical-Social Systems. IEEE Trans. Comput. Soc. Syst. 11(3): 3978-3987 (2024) - Juan-Carlos Gomez, Jorge Moreno, Mario Alberto Ibarra-Manzano, Dora Luz Almanza-Ojeda:
Reconstructive Classification for Age and Gender Identification in Social Networks. IEEE Trans. Comput. Soc. Syst. 11(2): 2291-2301 (2024)
skipping 795 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-26 15:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint