Department of General Education and Language
Permanent URI for this collection
Browse
Browsing Department of General Education and Language by Author "Lu, Joan"
Now showing 1 - 4 of 4
Results Per Page
Sort Options
Item A clustering approach for autistic trait classification(Taylor and Francis Ltd, 2020-07-02) Baadel, Said; Thabtah, Fadi; Lu, JoanMachine learning (ML) techniques can be utilized by physicians, clinicians, as well as other users, to discover Autism Spectrum Disorder (ASD) symptoms based on historical cases and controls to enhance autism screening efficiency and accuracy. The aim of this study is to improve the performance of detecting ASD traits by reducing data dimensionality and eliminating redundancy in the autism dataset. To achieve this, a new semi-supervised ML framework approach called Clustering-based Autistic Trait Classification (CATC) is proposed that uses a clustering technique and that validates classifiers using classification techniques. The proposed method identifies potential autism cases based on their similarity traits as opposed to a scoring function used by many ASD screening tools. Empirical results on different datasets involving children, adolescents, and adults were verified and compared to other common machine learning classification techniques. The results showed that CATC offers classifiers with higher predictive accuracy, sensitivity, and specificity rates than those of other intelligent classification approaches such as Artificial Neural Network (ANN), Random Forest, Random Trees, and Rule Induction. These classifiers are useful as they are exploited by diagnosticians and other stakeholders involved in ASD screening. © 2020 Taylor & Francis Group, LLC.Item Cybersecurity awareness: A critical analysis of education and law enforcement methods(Slovene Society Informatika, 2021) Baadel, Said; Thabtah, Fadi; Lu, JoanAccording to the international Anti-Phishing Work Group (APWG), phishing activities have abruptly risen over the last few years, and users are becoming more susceptible to online and mobile fraud. Machine Learning techniques have potential for building technical anti-phishing models, with a handful already implemented in the real time environment. However, majority of them have yet to be applied in a real time environment and require domain experts to interpret the results. This gives conventional techniques a vital role as supportive tools for a wider audience, especially novice users. This paper reviews in-depth, common, phishing countermeasures including legislation, law enforcement, hands-on training, and education among others. A complete prevention layer based on the aforementioned approaches is suggested to increase awareness and report phishing to different stakeholders, including organizations, novice users, researchers, and computer security experts. Therefore, these stakeholders can understand the upsides and downsides of the current conventional approaches and the ways forward for improving them. © 2021 Slovene Society Informatika. All rights reserved.Item Data analytics : intelligent anti-phishing techniques based on machine learning(World Scientific Publishing Co. Pte Ltd, 2019) Baadel, Said; Lu, JoanAccording to the international body Anti-Phishing Work Group (APWG), phishing activities have skyrocketed in the last few years and more online users are becoming susceptible to phishing attacks and scams. While many online users are vulnerable and naive to the phishing attacks, playing catch-up to the phishers' evolving strategies is not an option. Machine Learning techniques play a significant role in developing effective anti-phishing models. This paper looks at phishing as a classification problem and outlines some of the recent intelligent machine learning techniques (associative classifications, dynamic self-structuring neural network, dynamic rule-induction, etc.) in the literature that is used as anti-phishing models. The purpose of this review is to serve researchers, organisations' managers, computer security experts, lecturers, and students who are interested in understanding phishing and its corresponding intelligent solutions. This will equip individuals with knowledge and skills that may prevent phishing on a wider context within the community. © 2019 World Scientific Publishing Co.Item MCOKE: Multi-Cluster Overlapping K-Means Extension Algorithm(World Academy of Science, Engineering and Technology, 2015) Baadel, Said; Thabtah, Fadi; Lu, JoanClustering involves the partitioning of n objects into k clusters. Many clustering algorithms use hard-partitioning techniques where each object is assigned to one cluster. In this paper we propose an overlapping algorithm MCOKE which allows objects to belong to one or more clusters. The algorithm is different from fuzzy clustering techniques because objects that overlap are assigned a membership value of 1 (one) as opposed to a fuzzy membership degree. The algorithm is also different from other overlapping algorithms that require a similarity threshold be defined a priori which can be difficult to determine by novice users.