scholarly journals Personality Prediction from Social Networks text using Machine Learning

2019 ◽  
Vol 8 (4) ◽  
pp. 2384-2389

Personality, a typical way of thinking, feeling, and behaviour. Personality embraces moods, attitudes and views and is expressed most obviously in relationships with others. It involves both intrinsic and acquired behavioural features that differentiate one individual from another and can be found in the relationships of people with the surroundings and with the social group. With the development of social networks, a broad variety of techn iques have been developed to identify user personalities based on their social activities and language usage practices. In terms of distinct machine learning algorithms, information sources and function sets, particular methods vary. Personality prediction has been an important research topic for describing user profiles and person not only in psychology but also in computer science. This paper presents a systematic survey of current work done of personality prediction from social networks. We also prepared a Comparison chart of existing techniques for personality prediction on the basis of relevant parameters. Based on this survey, we finally presented a few future research directions related to personality prediction.

2012 ◽  
pp. 13-22 ◽  
Author(s):  
João Gama ◽  
André C.P.L.F. de Carvalho

Machine learning techniques have been successfully applied to several real world problems in areas as diverse as image analysis, Semantic Web, bioinformatics, text processing, natural language processing,telecommunications, finance, medical diagnosis, and so forth. A particular application where machine learning plays a key role is data mining, where machine learning techniques have been extensively used for the extraction of association, clustering, prediction, diagnosis, and regression models. This text presents our personal view of the main aspects, major tasks, frequently used algorithms, current research, and future directions of machine learning research. For such, it is organized as follows: Background information concerning machine learning is presented in the second section. The third section discusses different definitions for Machine Learning. Common tasks faced by Machine Learning Systems are described in the fourth section. Popular Machine Learning algorithms and the importance of the loss function are commented on in the fifth section. The sixth and seventh sections present the current trends and future research directions, respectively.


Author(s):  
João Gama ◽  
André C.P.L.F. de Carvalho

Machine learning techniques have been successfully applied to several real world problems in areas as diverse as image analysis, Semantic Web, bioinformatics, text processing, natural language processing,telecommunications, finance, medical diagnosis, and so forth. A particular application where machine learning plays a key role is data mining, where machine learning techniques have been extensively used for the extraction of association, clustering, prediction, diagnosis, and regression models. This text presents our personal view of the main aspects, major tasks, frequently used algorithms, current research, and future directions of machine learning research. For such, it is organized as follows: Background information concerning machine learning is presented in the second section. The third section discusses different definitions for Machine Learning. Common tasks faced by Machine Learning Systems are described in the fourth section. Popular Machine Learning algorithms and the importance of the loss function are commented on in the fifth section. The sixth and seventh sections present the current trends and future research directions, respectively.


Proceedings ◽  
2018 ◽  
Vol 2 (15) ◽  
pp. 1133 ◽  
Author(s):  
Fanlin Meng ◽  
Kui Weng ◽  
Balsam Shallal ◽  
Xiangping Chen ◽  
Monjur Mourshed

In this paper, we look at the key forecasting algorithms and optimization strategies for the building energy management and demand response management. By conducting a combined and critical review of forecast learning algorithms and optimization models/algorithms, current research gaps and future research directions and potential technical routes are identified. To be more specific, ensemble/hybrid machine learning algorithms and deep machine learning algorithms are promising in solving challenging energy forecasting problems while large-scale and distributed optimization algorithms are the future research directions for energy optimization in the context of smart buildings and smart grids.


2021 ◽  
Vol 11 (22) ◽  
pp. 10706
Author(s):  
Manuel Lepe-Faúndez ◽  
Alejandra Segura-Navarrete ◽  
Christian Vidal-Castro ◽  
Claudia Martínez-Araneda ◽  
Clemente Rubio-Manzano

In recent years, the use of social networks has increased exponentially, which has led to a significant increase in cyberbullying. Currently, in the field of Computer Science, research has been made on how to detect aggressiveness in texts, which is a prelude to detecting cyberbullying. In this field, the main work has been done for English language texts, mainly using Machine Learning (ML) approaches, Lexicon approaches to a lesser extent, and very few works using hybrid approaches. In these, Lexicons and Machine Learning algorithms are used, such as counting the number of bad words in a sentence using a Lexicon of bad words, which serves as an input feature for classification algorithms. This research aims at contributing towards detecting aggressiveness in Spanish language texts by creating different models that combine the Lexicons and ML approach. Twenty-two models that combine techniques and algorithms from both approaches are proposed, and for their application, certain hyperparameters are adjusted in the training datasets of the corpora, to obtain the best results in the test datasets. Three Spanish language corpora are used in the evaluation: Chilean, Mexican, and Chilean-Mexican corpora. The results indicate that hybrid models obtain the best results in the 3 corpora, over implemented models that do not use Lexicons. This shows that by mixing approaches, aggressiveness detection improves. Finally, a web application is developed that gives applicability to each model by classifying tweets, allowing evaluating the performance of models with external corpus and receiving feedback on the prediction of each one for future research. In addition, an API is available that can be integrated into technological tools for parental control, online plugins for writing analysis in social networks, and educational tools, among others.


MIS Quarterly ◽  
2021 ◽  
Vol 45 (2) ◽  
pp. 821-858
Author(s):  
Xiao Han ◽  
Leye Wang ◽  
Weiguo Fan

User privacy protection is a vital issue of concern for online social networks (OSNs). Even though users often intentionally hide their private information in OSNs, since adversaries may conduct prediction attacks to predict hidden information using advanced machine learning techniques, private information that users intend to hide may still be at risk of being exposed. Taking the current city listed on Facebook profiles as a case, we propose a solution that estimates and manages the exposure risk of users’ hidden information. First, we simulate an aggressive prediction attack using advanced state-of-the-art machine learning algorithms by proposing a new current city prediction framework that integrates location indications based on various types of information exposed by users, including demographic attributes, behaviors, and relationships. Second, we study prediction attack results to model patterns of prediction correctness (as correct predictions lead to information exposures) and construct an exposure risk estimator. The proposed exposure risk estimator has the ability not only to notify users of exposure risks related to their hidden current city but can also help users mitigate exposure risks by overhauling and selecting countermeasures. Moreover, our exposure risk estimator can improve the privacy management of OSNs by facilitating empirical studies on the exposure risks of OSN users as a group. Taking the current city as a case, this work offers insight on how to protect other types of private information against machine-learning prediction attacks and reveals several important implications for both practice management and future research.


2021 ◽  
Vol 54 (5) ◽  
pp. 1-36
Author(s):  
Ishai Rosenberg ◽  
Asaf Shabtai ◽  
Yuval Elovici ◽  
Lior Rokach

In recent years, machine learning algorithms, and more specifically deep learning algorithms, have been widely used in many fields, including cyber security. However, machine learning systems are vulnerable to adversarial attacks, and this limits the application of machine learning, especially in non-stationary, adversarial environments, such as the cyber security domain, where actual adversaries (e.g., malware developers) exist. This article comprehensively summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques and illuminates the risks they pose. First, the adversarial attack methods are characterized based on their stage of occurrence, and the attacker’ s goals and capabilities. Then, we categorize the applications of adversarial attack and defense methods in the cyber security domain. Finally, we highlight some characteristics identified in recent research and discuss the impact of recent advancements in other adversarial learning domains on future research directions in the cyber security domain. To the best of our knowledge, this work is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain, map them in a unified taxonomy, and use the taxonomy to highlight future research directions.


2021 ◽  
Vol 9 ◽  
Author(s):  
Sensen Guo ◽  
Xiaoyu Li ◽  
Zhiying Mu

In recent years, machine learning technology has made great improvements in social networks applications such as social network recommendation systems, sentiment analysis, and text generation. However, it cannot be ignored that machine learning algorithms are vulnerable to adversarial examples, that is, adding perturbations that are imperceptible to the human eye to the original data can cause machine learning algorithms to make wrong outputs with high probability. This also restricts the widespread use of machine learning algorithms in real life. In this paper, we focus on adversarial machine learning algorithms on social networks in recent years from three aspects: sentiment analysis, recommendation system, and spam detection, We review some typical applications of machine learning algorithms and adversarial example generation and defense algorithms for machine learning algorithms in the above three aspects in recent years. besides, we also analyze the current research progress and prospects for the directions of future research.


2020 ◽  
Vol 14 ◽  
Author(s):  
Meghna Dhalaria ◽  
Ekta Gandotra

Purpose: This paper provides the basics of Android malware, its evolution and tools and techniques for malware analysis. Its main aim is to present a review of the literature on Android malware detection using machine learning and deep learning and identify the research gaps. It provides the insights obtained through literature and future research directions which could help researchers to come up with robust and accurate techniques for classification of Android malware. Design/Methodology/Approach: This paper provides a review of the basics of Android malware, its evolution timeline and detection techniques. It includes the tools and techniques for analyzing the Android malware statically and dynamically for extracting features and finally classifying these using machine learning and deep learning algorithms. Findings: The number of Android users is expanding very fast due to the popularity of Android devices. As a result, there are more risks to Android users due to the exponential growth of Android malware. On-going research aims to overcome the constraints of earlier approaches for malware detection. As the evolving malware are complex and sophisticated, earlier approaches like signature based and machine learning based are not able to identify these timely and accurately. The findings from the review shows various limitations of earlier techniques i.e. requires more detection time, high false positive and false negative rate, low accuracy in detecting sophisticated malware and less flexible. Originality/value: This paper provides a systematic and comprehensive review on the tools and techniques being employed for analysis, classification and identification of Android malicious applications. It includes the timeline of Android malware evolution, tools and techniques for analyzing these statically and dynamically for the purpose of extracting features and finally using these features for their detection and classification using machine learning and deep learning algorithms. On the basis of the detailed literature review, various research gaps are listed. The paper also provides future research directions and insights which could help researchers to come up with innovative and robust techniques for detecting and classifying the Android malware.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Fathima Aliyar Vellameeran ◽  
Thomas Brindha

Abstract Objectives To make a clear literature review on state-of-the-art heart disease prediction models. Methods It reviews 61 research papers and states the significant analysis. Initially, the analysis addresses the contributions of each literature works and observes the simulation environment. Here, different types of machine learning algorithms deployed in each contribution. In addition, the utilized dataset for existing heart disease prediction models was observed. Results The performance measures computed in entire papers like prediction accuracy, prediction error, specificity, sensitivity, f-measure, etc., are learned. Further, the best performance is also checked to confirm the effectiveness of entire contributions. Conclusions The comprehensive research challenges and the gap are portrayed based on the development of intelligent methods concerning the unresolved challenges in heart disease prediction using data mining techniques.


Sign in / Sign up

Export Citation Format

Share Document