Search Results for author: Ahmadreza Mosallanezhad

Found 9 papers, 2 papers with code

Domain Adaptive Fake News Detection via Reinforcement Learning

no code implementations16 Feb 2022 Ahmadreza Mosallanezhad, Mansooreh Karami, Kai Shu, Michelle V. Mancenido, Huan Liu

With social media being a major force in information consumption, accelerated propagation of fake news has presented new challenges for platforms to distinguish between legitimate and fake news.

Fake News Detection reinforcement-learning

Mitigating Bias in Session-based Cyberbullying Detection: A Non-Compromising Approach

1 code implementation ACL 2021 Lu Cheng, Ahmadreza Mosallanezhad, Yasin Silva, Deborah Hall, Huan Liu

The element of repetition in cyberbullying behavior has directed recent computational studies toward detecting cyberbullying based on a social media session.

Causal Learning for Socially Responsible AI

no code implementations25 Apr 2021 Lu Cheng, Ahmadreza Mosallanezhad, Paras Sheth, Huan Liu

The goal of this survey is to bring forefront the potentials and promises of CL for SRAI.


"Let's Eat Grandma": When Punctuation Matters in Sentence Representation for Sentiment Analysis

no code implementations10 Dec 2020 Mansooreh Karami, Ahmadreza Mosallanezhad, Michelle V Mancenido, Huan Liu

Neural network-based embeddings have been the mainstream approach for creating a vector representation of the text to capture lexical and semantic similarities and dissimilarities.

Sentiment Analysis

Toward Privacy and Utility Preserving Image Representation

no code implementations30 Sep 2020 Ahmadreza Mosallanezhad, Yasin N. Silva, Michelle V. Mancenido, Huan Liu

Face images are rich data items that are useful and can easily be collected in many applications, such as in 1-to-1 face verification tasks in the domain of security and surveillance systems.

Face Verification

Privacy-Aware Recommendation with Private-Attribute Protection using Adversarial Learning

no code implementations22 Nov 2019 Ghazaleh Beigi, Ahmadreza Mosallanezhad, Ruocheng Guo, Hamidreza Alvari, Alexander Nou, Huan Liu

The attacker seeks to infer users' private-attribute information according to their items list and recommendations.

Cannot find the paper you are looking for? You can Submit a new open access paper.