Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Kokciyan, Nadin"'
Chatbots are conversational software applications designed to interact dialectically with users for a plethora of different purposes. Surprisingly, these colloquial agents have only recently been coupled with computational models of arguments (i.e. c
Externí odkaz:
http://arxiv.org/abs/2401.03454
Autor:
Chausson, Sandrine, Saadat-Yazdi, Ameer, Li, Xue, Pan, Jeff Z., Belle, Vaishak, Kokciyan, Nadin, Ross, Björn
Publikováno v:
Chausson, S, Saadat-Yazdi, A, Li, X, Pan, J Z, Belle, V, Kokciyan, N & Ross, B 2023, A Web-based Tool for Detecting Argument Validity and Novelty . in Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems . Richland, SC, pp. 3053–3055, The 22nd International Conference on Autonomous Agents and Multiagent Systems, 2023, London, United Kingdom, 29/05/23 . https://doi.org/10.5555/3545946.3599170
Individuals engage in arguments on an everyday basis as they seek to obtain information about current affairs and engage with social media. While fact-checkers are available to help dispel misinformation, it is almost impossible for users to verify e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3094::7c78571bab282e2182f60d890fb7585a
https://www.pure.ed.ac.uk/ws/files/347063344/A_Web_based_Tool_CHAUSSON_DOA07032023_AFV_CC_BY.pdf
https://www.pure.ed.ac.uk/ws/files/347063344/A_Web_based_Tool_CHAUSSON_DOA07032023_AFV_CC_BY.pdf
Autor:
Ogunniye, Gideon, Kokciyan, Nadin
Publikováno v:
Ogunniye, G & Kokciyan, N 2023, Contextual Integrity for Argumentation-based Privacy Reasoning . in Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems . Richland, SC, pp. 2253–2261, The 22nd International Conference on Autonomous Agents and Multiagent Systems, 2023, London, United Kingdom, 29/05/23 . https://doi.org/10.5555/3545946.3598903
Privacy management in online systems is a complex task. Recently, contextual integrity theory has been introduced to model privacy, which considers the social contexts of users before making privacy decisions. However, having a practical application
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3094::59b5ebab73b128715482745d2f623d02
https://hdl.handle.net/20.500.11820/c6b51e13-3c7a-4181-9ea9-495b84fd20ec
https://hdl.handle.net/20.500.11820/c6b51e13-3c7a-4181-9ea9-495b84fd20ec
Publikováno v:
Saadat-Yazdi, A, Pan, J Z & Kokciyan, N 2023, Uncovering Implicit Inferences for Improved Relational Argument Mining . in A Vlachos & I Augenstein (eds), Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics . pp. 2484 – 2495, The 17th Conference of the European Chapter of the Association for Computational Linguistics, 2023, Dubrovnik, Croatia, 2/05/23 . < https://aclanthology.org/2023.eacl-main.182/ >
Argument mining seeks to extract arguments and their structure from unstructured texts. Identifying relations (such as attack, support, and neutral) between argumentative units is a challenging task because two units may be related to each other via
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3094::b6dc9a60d5695bfe3e2e1acace2b144e
https://www.pure.ed.ac.uk/ws/files/349868756/Uncovering_implicit_SAADAT_YAZDI_DOA21012023_VOR_CC_BY.pdf
https://www.pure.ed.ac.uk/ws/files/349868756/Uncovering_implicit_SAADAT_YAZDI_DOA21012023_VOR_CC_BY.pdf
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Ogunniye, Gideon, Kokciyan, Nadin
Publikováno v:
Ogunniye, G & Kokciyan, N 2023, ' A Survey on Understanding and Representing Privacy Requirements in IoT ', Journal of Artificial Intelligence Research, vol. 76, pp. 163-192 . https://doi.org/10.1613/jair.1.14000
People are interacting with online systems all the time. In order to use the services being provided, they give consent for their data to be collected. This approach requires too much human effort and is impractical for systems like Internet-of-Thing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3094::d0f8b5065c8916a98b64aef7e6b43117
https://www.pure.ed.ac.uk/ws/files/319753516/A_Survey_on_Understanding_OGUNNIYE_DOA22092022_AFV.pdf
https://www.pure.ed.ac.uk/ws/files/319753516/A_Survey_on_Understanding_OGUNNIYE_DOA22092022_AFV.pdf
Publikováno v:
Saka, T, Vaniea, K E & Kokciyan, N 2022, Context-based Clustering to Mitigate Phishing Attacks . in Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security (AISec 2022) . pp. 115-126, 15th ACM Workshop on Artificial Intelligence and Security, Los Angeles, California, United States, 11/11/22 . https://doi.org/10.1145/3560830.3563728
Phishing is by far the most common and disruptive type of cyber-attack faced by most organizations. Phishing messages may share common attributes such as the same or similar subject lines, the same sending infrastructure, similar URLs with certain pa
Autor:
Saadat-Yazdi, Ameer, Li, Xue, Chausson, Sandrine, Belle, Vaishak, Ross, Björn, Pan, Jeff Z, Kokciyan, Nadin
Publikováno v:
Saadat-Yazdi, A, Li, X, Chausson, S, Belle, V, Ross, B, Pan, J Z & Kokciyan, N 2022, KEViN: A Knowledge Enhanced Validity and Novelty Classifier for Arguments . in G Lapesa, J Schneider, Y Jo & S Saha (eds), Proceedings of 9th Workshop on Argument Mining . International Conference on Computational Linguistics-Proceedings of 9th Workshop on Argument Mining, no. 14, vol. 29, pp. 104-110, The 9th Workshop on Argument Mining, 2022, Gyeongju, Korea, Democratic People's Republic of, 12/10/22 . < https://aclanthology.org/2022.argmining-1.9/ >
The ArgMining 2022 Shared Task is concerned with predicting the validity and novelty of an inference for a given premise and conclusion pair. We propose two feed-forward network based models (KEViN1 and KEViN2), which combine features generated from
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3094::6fe0c5c2df791d36e0ca8981b348b099
https://www.pure.ed.ac.uk/ws/files/301699635/KEViN_SAADAT_YAZDI_DOA05092022_VOR_CC_BY.pdf
https://www.pure.ed.ac.uk/ws/files/301699635/KEViN_SAADAT_YAZDI_DOA05092022_VOR_CC_BY.pdf
Autor:
Chapman, Martin, G-Medhin, Abigail, Sassoon, Isabel, Kokciyan, Nadin, Sklar, Elizabeth I., Curcin, Vasa
Publikováno v:
IEEE 18th International Conference on eScience. 2022.
Chapman, M, G-Medhin, A, Sassoon, I, Kokciyan, N, Sklar, E & Curcin, V 2022, Using Microservices to Design Patient-facing Research Software . in Proceedings of the IEEE 18th International Conference on eScience . Institute of Electrical and Electronics Engineers (IEEE), pp. 44-54, The 18th IEEE International eScience Conference, 2022, Salt Lake City, Utah, United States, 10/10/22 . https://doi.org/10.1109/eScience55777.2022.00019
Chapman, M, G-Medhin, A, Sassoon, I, Kokciyan, N, Sklar, E & Curcin, V 2022, Using Microservices to Design Patient-facing Research Software . in Proceedings of the IEEE 18th International Conference on eScience . Institute of Electrical and Electronics Engineers (IEEE), pp. 44-54, The 18th IEEE International eScience Conference, 2022, Salt Lake City, Utah, United States, 10/10/22 . https://doi.org/10.1109/eScience55777.2022.00019
With a significant amount of software now being developed for use in patient-facing studies, there is a pressing need to consider how to design this software effectively in order to support the needs of both researchers and patients. We posit that a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::02be337da49a2553fd76817c5c28e0a1
https://bura.brunel.ac.uk/handle/2438/25990
https://bura.brunel.ac.uk/handle/2438/25990
Publikováno v:
Jenkins, A, Kokciyan, N & Vaniea, K E 2022, PhishED: Automated contextual feedback for reported Phishing . in Symposium on Usable Privacy and Security . 18th Symposium on Usable Privacy and Security, Boston, Maryland, United States, 7/08/22 . < https://www.usenix.org/conference/soups2022/presentation/jenkins-poster >
When people receive malicious emails that claim to be from a trusted entity like their bank, they can be frightened and uncertain about how safe it is to ignore or delete the message. The uncertainty is hard on users and it may lead them to engage in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3094::e775536595e5370cf8bbad08c33b51e6
https://www.pure.ed.ac.uk/ws/files/289952149/soups2022_poster49_jenkins_abstract_final.pdf
https://www.pure.ed.ac.uk/ws/files/289952149/soups2022_poster49_jenkins_abstract_final.pdf