2021
DOI: 10.1007/978-3-030-66840-2_8
|View full text |Cite
|
Sign up to set email alerts
|

Review of Learning-Based Techniques of Sentiment Analysis for Security Purposes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
3

Relationship

4
5

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 45 publications
0
13
0
Order By: Relevance
“…It is composed of an input layer, many hidden layers in between, and an output layer as shown in Figure 1 like the multi-layer perceptron (MLP) networks. Best known and used layers are: convolution [11], activation or ReLU, and pooling [12], [13]. In contrast to standard feature selection algorithms, it is capable of dynamically learning better features and categorizing traffic.…”
Section: Background 21 Convolutional Neural Networkmentioning
confidence: 99%
“…It is composed of an input layer, many hidden layers in between, and an output layer as shown in Figure 1 like the multi-layer perceptron (MLP) networks. Best known and used layers are: convolution [11], activation or ReLU, and pooling [12], [13]. In contrast to standard feature selection algorithms, it is capable of dynamically learning better features and categorizing traffic.…”
Section: Background 21 Convolutional Neural Networkmentioning
confidence: 99%
“…These sentiments can express the author's opinion, his emotional state (when writing his text), or a deliberate sense of connection (that the author expects to make with readers). Sentiment analysis is widely used in security intelligence purposes to analyze and synthesize individual reactions to deduce trends and user needs [16]. Indeed, we have already overviewed in [16] learning-based techniques of sentiment analysis for security purposes.…”
Section: Background 21 Sentiment Analysismentioning
confidence: 99%
“…Sentiment analysis is widely used in security intelligence purposes to analyze and synthesize individual reactions to deduce trends and user needs [16]. Indeed, we have already overviewed in [16] learning-based techniques of sentiment analysis for security purposes.…”
Section: Background 21 Sentiment Analysismentioning
confidence: 99%
“…The COVID-19 outbreak is leading to a rush in IoT security adoption [5]. Researchers are trying to achieve a good level in for IoT security, among the most used techniques is the use of artificial intelligence (AI) and its subsets machine learning (ML) and deep learning (DL) [6] [7]. While these techniques are achieving astonishing results, securing IoT devices doesn't have to be excessively complex or costly.…”
Section: Introductionmentioning
confidence: 99%