Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computational Linguistics | 3 |
Computer Security | 3 |
Computer Software | 3 |
Accuracy | 2 |
Crime | 2 |
Identification | 2 |
Social Media | 2 |
Artificial Intelligence | 1 |
Audiences | 1 |
Authors | 1 |
Comparative Analysis | 1 |
More ▼ |
Author
Alsager, Haroon Nasser | 1 |
Huaibo Wang | 1 |
Mbaziira, Alex Vincent | 1 |
Qianta Zhu | 1 |
Qinhua Zheng | 1 |
Yishen Song | 1 |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Education Level
Audience
Location
Saudi Arabia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yishen Song; Qianta Zhu; Huaibo Wang; Qinhua Zheng – IEEE Transactions on Learning Technologies, 2024
Manually scoring and revising student essays has long been a time-consuming task for educators. With the rise of natural language processing techniques, automated essay scoring (AES) and automated essay revising (AER) have emerged to alleviate this burden. However, current AES and AER models require large amounts of training data and lack…
Descriptors: Scoring, Essays, Writing Evaluation, Computer Software
Alsager, Haroon Nasser – Arab World English Journal, 2020
Numerous studies have been concerned with developing new authorship recognition systems to address the increasing rates of cybercrimes associated with the anonymous nature of social media platforms, which still offer the opportunity for the users not to reveal their true identities. Nevertheless, it is still challenging to identify the real…
Descriptors: Social Media, Semitic Languages, Authors, Computer Security
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks