|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 344 occurrences of 275 keywords
|
|
|
Results
Found 1066 publication records. Showing 1066 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
91 | Antonella De Angeli, Sheryl Brahnam, Peter Wallis 0001, Alan J. Dix |
Misuse and abuse of interactive technologies. |
CHI Extended Abstracts |
2006 |
DBLP DOI BibTeX RDF |
abuse, disinhibition, machine violence, mediated verbal abuse, user aggression |
84 | Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie |
Abuse-Free Optimistic Contract Signing. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
82 | Chen-Huei Chou, Atish P. Sinha, Huimin Zhao 0003 |
A text mining approach to Internet abuse detection. |
Inf. Syst. E Bus. Manag. |
2008 |
DBLP DOI BibTeX RDF |
Internet abuse, Internet filtering, Text mining, Text categorization |
72 | Yvo Desmedt |
Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
70 | Yubao Liu, Jiarong Cai, Zhilan Huang, Jingwen Yu, Jian Yin 0001 |
Fast detection of database system abuse behaviors based on data mining approach. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
access profiles, anomaly-based detection model, data system abuse behaviors, maximal access profiles, FP-tree |
59 | Per Arne Godejord |
Exploring teacher methodology: using the example of sexual abuse of children as a way of teaching social informatics. |
ITiCSE |
2006 |
DBLP DOI BibTeX RDF |
sexual abuse, teacher methodology, project, teaching method, social informatics |
49 | Kai Fan 0001, Yue Wang 0043, Hui Li 0006 |
A New Abuse-Free Fair Electronic Payment Protocol. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Jarad Niemi, Meredith Smith, David Banks |
Test Power for Drug Abuse Surveillance. |
BioSecure |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Steve Kremer, Jean-François Raskin |
Game Analysis of Abuse-free Contract Signing. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
|
49 | Vitaly Shmatikov, John C. Mitchell |
Analysis of Abuse-Free Contract Signing. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
49 | Donn B. Parker |
Computer abuse perpetrators and vulnerabilities of computer systems. |
AFIPS National Computer Conference |
1976 |
DBLP DOI BibTeX RDF |
|
47 | Peter O'Connor |
An Analysis of Hotel Trademark Abuse in Pay-Per-Click Search Advertising. |
ENTER |
2007 |
DBLP DOI BibTeX RDF |
trademark abuse, Search engine marketing, hotel sector |
46 | Johan Peeters, Paul Dyson |
Cost-Effective Security. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
Security Policies to Mitigate Insider Threat in the Document Control Domain. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Henry S. Baird, Kris Popat |
Human Interactive Proofs and Document Image Analysis. |
Document Analysis Systems |
2002 |
DBLP DOI BibTeX RDF |
abuse of web sites and services, the chatroom problem, human/machine discrimination, OCR performance evaluation, legibility of text, document image analysis, CAPTCHAs, Turing tests, Human interactive proofs, document image degradations |
44 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
42 | David Dittrich, Michael D. Bailey, Sven Dietrich |
Building an Active Computer Security Ethics Community. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
NONE, K.4.1.a Abuse and crime involving computers, K.4.1.c Ethics, K.4.1.g Regulation, K.4.2.a Abuse and crime involving computers, K.7.4.a Codes of ethics, K.7.4.c Ethical dilemmas, K.7.m.b Ethics |
42 | J. D. Falk, Murray S. Kucherawy |
Battling Spam: The Evolution of Mail Feedback Loops. |
IEEE Internet Comput. |
2010 |
DBLP DOI BibTeX RDF |
mail feedback loops, mail abuse reporting format, MARF, complaint feedback loops, abuse reporting format, ARF, email standards, MAAWG, spam, email, Phishing, IETF |
38 | Jeffrey J. Johnson, Kenneth W. Chalmers |
Identifying Employee Internet Abuse. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Detlef Kähler, Ralf Küsters, Thomas Wilke |
A Dolev-Yao-Based Definition of Abuse-Free Protocols. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Anat Talmy, Oren Dobzinski |
Abuse Freedom in Access Control Schemes. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Guilin Wang |
An abuse-free fair contract signing protocol based on the RSA signature. |
WWW |
2005 |
DBLP DOI BibTeX RDF |
security, e-commerce, digital signatures, RSA, cryptographic protocols, fair-exchange, contract signing |
38 | Hao Wang 0003, Heqing Guo, Jianfei Yin, Qi He 0002, Manshan Lin, Jun Zhang 0005 |
Abuse-Free Item Exchange. |
ICCSA (4) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Vinod Yegneswaran, Paul Barford, David Plonka |
On the Design and Use of Internet Sinks for Network Abuse Monitoring. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
Deception Systems, Intrusion Detection, Honeypots |
38 | Stanislaw Jarecki, Vitaly Shmatikov |
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Luncheng Lin, Bashar Nuseibeh, Darrel C. Ince, Michael Jackson 0001, Jonathan D. Moffett |
Introducing Abuse Frames for Analysing Security Requirements. |
RE |
2003 |
DBLP DOI BibTeX RDF |
|
38 | John P. McDermott |
Abuse-Case-Based Assurance Arguments. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Birgit Baum-Waidner, Michael Waidner |
Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing. |
ICALP |
2000 |
DBLP DOI BibTeX RDF |
|
38 | Juan A. Garay, Philip D. MacKenzie |
Abuse-Free Multi-party Contract Signing. |
DISC |
1999 |
DBLP DOI BibTeX RDF |
digital signatures, Cryptographic protocols, fair exchange, contract signing |
38 | Ivan Damgård |
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
36 | Christopher Kunz, Jan Wiebelitz, Stefan Piger, Christian Grimm |
A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection. |
ISPDC |
2009 |
DBLP DOI BibTeX RDF |
abuse detection, Grid, PKI, auditing, X.509, proxy certificate |
36 | Paco Hope, Gary McGraw, Annie I. Antón |
Misuse and Abuse Cases: Getting Past the Positive. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
abuse cases, software development, software design, misuse cases |
34 | Wayne Liu, Sudhir Aggarwal, Zhenhai Duan |
Incorporating accountability into internet email. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
email misuse, trust management, accountability |
34 | Danny Hughes 0001, Paul Rayson, James Walkerdine, Kevin Lee, Phil Greenwood, Awais Rashid, Corinne May-Chahal, Margaret Brennan |
Supporting Law Enforcement in Digital Communities through Natural Language Analysis. |
IWCF |
2008 |
DBLP DOI BibTeX RDF |
Child Protection, Social Networks, P2P, Network Monitoring, Natural Language Analysis |
32 | Kshitij Gupta, Adwait Joshi, Jamie Allison McAtee, Nigel Savio Vaz |
aSister: scheduling for homeless women with special needs. |
CHI Extended Abstracts |
2008 |
DBLP DOI BibTeX RDF |
pregnancy, substance abuse, scheduling, text messaging, homelessness |
32 | Christian M. Jones |
Online games-based child safety environment. |
IE |
2008 |
DBLP DOI BibTeX RDF |
anti-abduction, child safety, sexual abuse prevention, social and psychological evaluation, animation, games-based learning |
32 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
31 | Katie Winkle, Natasha Mulvihill |
Anticipating the Use of Robots in Domestic Abuse: A Typology of Robot Facilitated Abuse to Support Risk Assessment and Mitigation in Human-Robot Interaction. |
HRI |
2024 |
DBLP DOI BibTeX RDF |
|
31 | Sophie Stephenson, Majed Almansoori, Pardis Emami Naeini, Danny Yuxing Huang, Rahul Chatterjee 0001 |
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse. |
USENIX Security Symposium |
2023 |
DBLP BibTeX RDF |
|
31 | Min-Wei Hung, Tina Chien-Wen Yuan, Nanyi Bi, Yi-Chao Chen 0001, Wan-Chen Lee, Ming-Chyi Huang, Chuang-Wen You |
To Use or Abuse: Opportunities and Difficulties in the Use of Multi-channel Support to Reduce Technology Abuse by Adolescents. |
Proc. ACM Hum. Comput. Interact. |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Roxanne Leitão |
Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums. |
Hum. Comput. Interact. |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Graham G. Scott, Zara P. Brodie, Megan J. Wilson, Lucy Ivory, Christopher J. Hand, Sara C. Sereno |
Celebrity abuse on Twitter: The impact of tweet valence, volume of abuse, and dark triad personality factors on victim blaming and perceptions of severity. |
Comput. Hum. Behav. |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Isar Nejadgholi, Svetlana Kiritchenko |
On Cross-Dataset Generalization in Automatic Detection of Online Abuse. |
WOAH |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Vinodkumar Prabhakaran, Zeerak Waseem, Seyi Akiwowo, Bertie Vidgen |
Online Abuse and Human Rights: WOAH Satellite Session at RightsCon 2020. |
WOAH |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Pushkar Mishra, Helen Yannakoudakis, Ekaterina Shutova |
Tackling Online Abuse: A Survey of Automated Abuse Detection Methods. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
31 | Sudha Subramani, Hua Wang 0002, Md. Rafiqul Islam 0004, Anwaar Ulhaq, Manjula O'Connor |
Child Abuse and Domestic Abuse: Content and Feature Analysis from Social Media Disclosures. |
ADC |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Gökçe Nur Say, Zehra Babadagi, Koray Karabekiroglu, Murat Yüce, Seher Akbas |
Abuse Characteristics and Psychiatric Consequences Associated with Online Sexual Abuse. |
Cyberpsychology Behav. Soc. Netw. |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Luncheng Lin, Bashar Nuseibeh, Darrel C. Ince, Michael Jackson 0001 |
Using Abuse Frames to Bound the Scope of Security Problems. |
RE |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuji Yamaoka |
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
27 | John P. McDermott, Chris Fox |
Using Abuse Case Models for Security Requirements Analysis. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
security, UML, requirements, use case |
23 | Qiang He 0001, Jun Yan 0005, Hai Jin 0001, Yun Yang 0001 |
ServiceTrust: Supporting Reputation-Oriented Service Selection. |
ICSOC/ServiceWave |
2009 |
DBLP DOI BibTeX RDF |
service reputation, Web services, trust, Service-oriented computing, service selection |
23 | Markus Rückert, Dominique Schröder |
Security of Verifiably Encrypted Signatures and a Construction without Random Oracles. |
Pairing |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Joonseong Ko, Kanghak Kim, Ohyeon Kweon, Jongwook Kim, Young-rin Kim, Steve SangKi Han |
Open Editing Algorithm: A Collaborative News Promotion Algorithm Based on Users' Voting History. |
CSE (4) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Yongdong Wu, Feng Bao 0001, Robert H. Deng, Marc Mouffron, Frederic Rousseau 0002 |
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Kent Chan, Edgar Rodriguez, John L. Kundert-Gibbs, Adam Blank, James Orara, Tim Steele, Jeremy Hicks, Will Robinson, Rupali Parekh |
Mileena Malign. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Dave DeBarr 0001, Zachary Eyler-Walker |
Closing the gap: automated screening of tax returns to identify egregious tax shelters. |
SIGKDD Explor. |
2006 |
DBLP DOI BibTeX RDF |
abusive tax shelter, data mining, support vector machine, link analysis |
23 | Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, Kevin O'Neill |
Selectively Traceable Anonymity. |
Privacy Enhancing Technologies |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Wenqi Liu, Jianhua Yang, Lei Wei |
A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce Transactions. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Daniel E. Geer Jr. |
When Is a Product a Security Product? |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
security products |
23 | Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber |
Moderately hard, memory-bound functions. |
ACM Trans. Internet Techn. |
2005 |
DBLP DOI BibTeX RDF |
Spam |
23 | Boguslaw Banaszak, Katarzyna Rodziewicz |
Trust and Security. Digital Citizen Cards in Poland. |
EGOV |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Kim Todd, Jon Rickman, Tabatha Verbick |
Implementing a network improvement action plan. |
SIGUCCS |
2004 |
DBLP DOI BibTeX RDF |
communication, network management, customer service, network stability |
23 | Robert Willison |
Understanding the Offender/Environment Dynamic for Computer Crimes: Assessing the Feasibility of Applying Criminological Theory to the IS Security Context. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. Memon |
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Bertis B. Little, Walter L. Johnston, Ashley C. Lovell, Roderick M. Rejesus, Steve A. Steed |
Collusion in the U.S. crop insurance program: applied data mining. |
KDD |
2002 |
DBLP DOI BibTeX RDF |
doublets, insurance fraud, non-recursive, triplets, collusion, log linear models |
23 | Kim Todd, Tabatha Verbick, Merlin Miller |
Policies for the digital age campus. |
SIGUCCS |
2001 |
DBLP DOI BibTeX RDF |
privacy, information technology, policies, computing, e-mail |
23 | Frank R. Funderburk, Karen I. Bolla, Jean-Lud Cadet |
Multilayer Perceptrons Can Predict Cognitive Status during Recovery from Chronic Substance Misuse: Implications for Individualized Treatment Planning. |
IJCNN (3) |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Tatsuaki Okamoto, Kazuo Ohta |
Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
23 | Yvo Desmedt |
Abuses in Cryptography and How to Fight Them. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
23 | Louise Giovane Becker |
A national perspective on computer security. |
ACM Annual Conference |
1984 |
DBLP DOI BibTeX RDF |
|
21 | Soon Hin Khor, Akihiro Nakao |
DaaS: DDoS Mitigation-as-a-Service. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
resource abuse, distributed system, network security, Denial-of-service |
21 | Xiangdong Li, Qiusheng Zheng |
Two-round Multi-Party Contract Signing. |
WKDD |
2010 |
DBLP DOI BibTeX RDF |
multi-party contract signing, abuse-freeness, formal analysis, fair exchange, strand space |
21 | Ilkka Uusitalo, Josep M. Catot, Ramon Loureiro |
Phishing and Countermeasures in Spanish Online Banking. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Abuse and crime involving computers, Security, Authentication, Electronic commerce, Invasive software |
21 | Kevin Borders, Xin Zhao 0016, Atul Prakash 0001 |
Securing sensitive content in a view-only file system. |
Digital Rights Management Workshop |
2006 |
DBLP DOI BibTeX RDF |
insider abuse, virtual machines, file systems, digital rights management, information leakage |
21 | Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta |
A new fair non-repudiation protocol for secure negotiation and contract signing. |
PST |
2006 |
DBLP DOI BibTeX RDF |
abuse freeness, contract negotiation, contract signing protocol, security, e-commerce, confidentiality, fair-exchange |
21 | William Pohlhaus |
Ethical engagement with data collection efforts related to fighting terrorists and terrorism in the context of recent events. |
ITiCSE |
2005 |
DBLP DOI BibTeX RDF |
accountability and abuse, privacy, computer ethics |
21 | Henry S. Baird, Michael A. Moll, Sui-Yu Wang |
ScatterType: A Legible but Hard-to-Segment CAPTCHA. |
ICDAR |
2005 |
DBLP DOI BibTeX RDF |
abuse of web sites and services, human/machine discrimination, legibility of text, Gestalt perception, automatic attacks on CAPTCHAs, segmentation, fragmentation, document image analysis, CAPTCHAs, Turing tests, human interactive proofs |
21 | Virginia Franke Kleist |
A Transaction Cost Model of Electronic Trust: Transactional Return, Incentives for Network Security and Optimal Risk in the Digital Economy. |
Electron. Commer. Res. |
2004 |
DBLP DOI BibTeX RDF |
transaction cost economics (AM02), electronic markets (HA0702), data security (EK01), authentication (EK05), data integrity (AD0514), abuse and crime (BB0103) |
21 | Denis Verdon, Gary McGraw |
Risk Analysis in Software Design. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
abuse cases, software development, software design, misuse cases |
21 | Elizabeth A. Evans, Carolyn M. Kotlas, Donna W. Bailey, Abe Crystal, Terri Buckner |
It's eleven o'clock: do you know where your identity is? |
SIGUCCS |
2004 |
DBLP DOI BibTeX RDF |
identity abuse, identity theft |
21 | Do Van Thanh 0001 |
Security Issues in Mobile eCommerce. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
mobile e-commerce, mobile electronic commerce, illegal abuse, Ericsson, Web e-commerce, Internet, mobile phone, electronic commerce, data security, Wireless Application Protocol, mobile user |
21 | Celia T. Romm, Nava Pliskin |
Electronic Mail as a Coalition-Building Information Technology. |
ACM Trans. Inf. Syst. |
1998 |
DBLP DOI BibTeX RDF |
abuse, coalition building, email, politics, MIS |
15 | Mirko Franco, Ombretta Gaggi, Claudio Enrico Palazzi |
Can Messaging Applications Prevent Sexting Abuse? a Technology Analysis. |
IEEE Trans. Mob. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Jonathan Cui, David A. Araujo |
Rethinking use-restricted open-source licenses for regulating abuse of generative models. |
Big Data Soc. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Yanmei Cao, Jianghong Wei, Yang Xiang 0001, Willy Susilo, Xiaofeng Chen 0001 |
Abuse-resistant deniable encryption. |
Comput. Stand. Interfaces |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Sadia Tasnuva Pritha, Rahnuma Tasnim, Muhammad Ashad Kabir, Sumaiya Amin, Anik Das |
Smartphone apps for child sexual abuse education: gaps and design considerations. |
Int. J. Mob. Learn. Organisation |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Pedro H. V. Valois, João Macedo, Leo S. F. Ribeiro, Jefersson A. dos Santos, Sandra Avila |
Leveraging Self-Supervised Learning for Scene Recognition in Child Sexual Abuse Imagery. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Arkaprabha Bhattacharya, Kevin Lee, Vineeth Ravi, Jessica Staddon, Rosanna Bellini |
Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Rahime Belen Saglam, Jason R. C. Nurse, Lisa Sugiura |
Designing Chatbots to Support Victims and Survivors of Domestic Abuse. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner |
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Ashfak Md Shibli, Mir Mehedi A. Pritom, Maanak Gupta |
AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, Elissa M. Redmiles |
"Did They Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Christoph Tillmann, Aashka Trivedi, Bishwaranjan Bhattacharjee |
Efficient Models for the Detection of Hate, Abuse and Profanity. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Hongzhan Lin, Ziyang Luo, Bo Wang, Ruichao Yang, Jing Ma 0004 |
GOAT-Bench: Safety Insights to Large Multimodal Models through Meme-Based Social Abuse. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Aatman Vaidya, Arnav Arora, Aditya Joshi, Tarunima Prabhakar |
Overview of the 2023 ICON Shared Task on Gendered Abuse Detection in Indic Languages. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Jian Zhu, Yuping Ruan, Jingfei Chang, Cheng Luo |
Deep Prompt Multi-task Network for Abuse Language Detection. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Alexander Hoover, Ruth Ng, Daren Khu, Yao'an Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song |
Leakage-Abuse Attacks Against Structured Encryption for SQL. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
15 | Graham Kendall, Jaime A. Teixeira da Silva |
Risks of abuse of large language models, like ChatGPT, in scientific publishing: Authorship, predatory publishing, and paper mills. |
Learn. Publ. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Neetu Singh, Upkar Varshney |
Smart Interventions for Opioid Abuse: Design and Evaluation. |
Int. J. Heal. Inf. Syst. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Wenjian Luo, Licai Zhang, Yulin Wu, Chuanyi Liu, Peiyi Han, Rongfei Zhuang |
Capacity Abuse Attack of Deep Learning Models Without Need of Label Encodings. |
IEEE Trans. Artif. Intell. |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1066 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|