no code implementations • 1 Dec 2020 • Prerit Datta, Natalie Lodinger, Akbar Siami Namin, Keith S. Jones
We compare the performance through various machine learning models employing word vectors obtained using both tf-idf and Doc2Vec models.
Cryptography and Security Human-Computer Interaction