ml nlp blockchain security cyber adversarial machine learning artificial intelligence machine learning ai stylometry cryptocurrency bitcoin information security software development reinforcement learning technology genetic algorithm authenication intrusion detection log analysis vulnerability network computer software testing software distirubted system lower dimensional feature interpretable learning model unidentifiable data recommendation system adversarial attacks and defense deployed ml mlops dnn aml word2vec zero shot image classification negative selection algorithm computer science rl user-item interactions neural network reinforcement learning deep recommendation forensics deeplearning time series policy snort data mining covid newspaper tsne mnist medical healthcare cnn pca lda lsne kmeans clustering basic digital image concept ieee bias alogirthm hci fake review detection jaccard similarity sentient analysis natural language processing review manipulation hybrid pow pos attack 51% password hashing network reconfiguration. power distribution microgrid malware ransomware rulebased accuracy explainability file access ledger classification malicious website spark performance performance evaluation apache spark apache hadoop cloud language prcessing stylo review system social crowd source fake news analysis privacy big data social network denial of service ddos attack software defined network sdn open data map virtual 3d cryptojacking protection access control attribute role authentication protocol trust shared monte carlo merkle tree dag byteball iota local blockchain ddos iot smarthome management code risk assesment network vulnerability cvss markov chain attack graph code commit code version review penalty function fitness funcion ga genetic algorithms fine grained revision market analysis code history fuzzy quick response code qr qr-code barcode consensus byzantine agreement mutual exclusion collaborative filtering
Tout plus