...
Recommending of experts to questions on Stack Overflow

In order to assist the process of questions answering on CQA (Community Question Answering) websites, this paper proposes an improved methodology of batch recommendation of answerers (experts) to questions called BESF (BERT Expert Recommendation using Multi-Objective Sailfish Algorithm with Genetic Algorithm). First, experts and questions modeling is done using BERT Topic modeling technique, which creates […]


Optimal Controller’s Placement inside SDN environment via Machine Learning Technique

In recent years, Software Defined Networking (SDN) has emerged as a pivotal element in various networks. The prominent feature of software-defined networking is the separation of two planes that were tightly coupled in traditional networks that is the forwarding and control planes. Forwarding plane’s basic functionalities are packet forwarding while control plane issues control command […]


...
Towards creation of adversarial attacks for textual data from diverse domains

Deep learning is the foundation for various applications, including decision support, fraud detection, text categorization, machine translation, market research, and customer segmentation. Despite their widespread use, deep learning algorithms are frequently vulnerable to adversarial instances, in which legal inputs are manipulated in subtle and often invisible ways. Even the most complicated models may be tricked […]


...
Replication of Multi-Agent Reinforcement Learning for Hide & Seek Problem

Reinforcement learning generates policies based on reward functions, hyper-parameters. Slight changes in these can significantly affect results. The lack of documentation and reproducibility in Reinforcement learning research makes it difficult to replicate once-deduced strategies. While previous research has identified strategies using grounded maneuver, there is limited work in the more complex environments. The agents in […]


...
Mapping Network Features to attack profiles to enhance the Real time Intrusion Detection

The immeasurable amount of data in network traffic has increased its vulnerability. Therefore, monitoring and analyzing traffic for threat hunting is inevitable. Analyzing and capturing realtime network traffic is challenging due to privacy and space concerns. However, many simulated datasets are available. Machine-learning based intrusion detection systems are trained on these datasets for attack detection. […]


...
Socio-economic and Geographical factors for Crime Incidents

Spatio-temporal data mining techniques are used for crime analysis for their knowledge oriented and meaningful visual representation of crime incidents. Visual representation of crime patterns assist analysts with in-depth understanding of crime behavior with time and location. The representation can be made more knowledgeable and perceptible by incorporating details of socio-economic factor and areafis geographical […]