Recognition: no theorem link
A microservices-based endpoint monitoring platform with predictive NLP models for real-time security and hate-speech risk alerting
Pith reviewed 2026-05-14 20:49 UTC · model grok-4.3
The pith
A microservices platform collects endpoint telemetry and applies NLP models to deliver real-time alerts on security risks and hate speech.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The authors claim that their microservices-based endpoint monitoring platform, incorporating predictive NLP models, can promptly surface indicators of data exfiltration and policy violations while centralizing alert management in an integrated framework that combines monitoring, security analytics, and predictive capabilities, with transformer models like BERT achieving an average accuracy of 87% for hate-speech risk detection.
What carries the argument
A modular microservices architecture relying on RabbitMQ for event ingestion and routing and Redis for low-latency data access and alert delivery, along with BERT-based models for text classification.
If this is right
- The platform can promptly surface indicators of data exfiltration and policy violations.
- It centralizes alert management across monitoring, security analytics, and predictive capabilities.
- It provides an integrated framework combining these elements for faster incident response.
- Transformer models such as BERT achieve an average accuracy of 87% on hate-speech risk detection.
Where Pith is reading between the lines
- Such a platform could enable faster correlation of user behavior signals across devices and communications.
- It may support proactive compliance by flagging risks before they escalate in workplace environments.
- Extending the system to additional risk categories or languages could increase its utility for global organizations.
- Real-world performance would benefit from calibration on diverse corporate data streams beyond the initial tests.
Load-bearing premise
The 87% accuracy reported for hate-speech detection using BERT will maintain low false positive rates and support effective real-time alerting when applied to actual ongoing corporate endpoint data without further adjustments.
What would settle it
Running the platform on live endpoint streams and comparing its alerts against ground-truth incidents identified by security teams to check for missed detections or excessive false alarms.
Figures
read the original abstract
Organizations increasingly depend on endpoint devices and corporate communication channels, yet they still face critical risks such as sensitive data leakage, suspicious user behavior, and the circulation of hateful or harmful language in workplace contexts. Current solutions frequently address these issues in isolation (e.g., productivity tracking, data loss prevention, or hate-speech detection), limiting correlation across signals and delaying incident response. This work proposes a unified, microservices-based platform that collects endpoint telemetry and applies predictive natural language processing models to support real-time security and compliance alerting. The architecture is modular and scalable, relying on RabbitMQ for event ingestion and routing and Redis for low-latency data access and alert delivery. For text classification, transformer-based models such as BERT are evaluated for hate-speech risk detection, achieving an average accuracy of 87\%. Experimental results indicate that the proposed platform can promptly surface indicators of data exfiltration and policy violations while centralizing alert management, providing an integrated framework that combines monitoring, security analytics, and predictive capabilities.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript proposes a microservices-based endpoint monitoring platform that collects telemetry from devices, routes events via RabbitMQ, caches data with Redis, and applies transformer models such as BERT for hate-speech risk detection (reported 87% average accuracy) to enable real-time security and compliance alerting for issues including data exfiltration and policy violations.
Significance. If the accuracy and real-time performance claims are substantiated, the work would provide a practical integrated framework that correlates endpoint signals with predictive content analysis, potentially improving incident response times in corporate settings over siloed tools.
major comments (1)
- [Experimental Results (referenced in abstract)] The abstract and experimental results claim an average accuracy of 87% for BERT-based hate-speech detection and prompt surfacing of data exfiltration indicators, but provide no dataset description, label distribution, training/validation splits, fine-tuning procedure, baseline comparisons, error bars, or latency/throughput measurements for the end-to-end pipeline. This absence makes it impossible to assess overfitting, domain shift to corporate streams, or false-positive rates that would support the alerting use case.
Simulated Author's Rebuttal
We thank the referee for the constructive and detailed review. We agree that the experimental methodology requires substantial elaboration to support the reported accuracy and real-time claims. We address the major comment below and will revise the manuscript accordingly.
read point-by-point responses
-
Referee: The abstract and experimental results claim an average accuracy of 87% for BERT-based hate-speech detection and prompt surfacing of data exfiltration indicators, but provide no dataset description, label distribution, training/validation splits, fine-tuning procedure, baseline comparisons, error bars, or latency/throughput measurements for the end-to-end pipeline. This absence makes it impossible to assess overfitting, domain shift to corporate streams, or false-positive rates that would support the alerting use case.
Authors: We acknowledge that the current manuscript version omits critical experimental details, making independent assessment of the 87% accuracy claim difficult. In the revised manuscript we will expand the Experimental Results section with: (1) full dataset descriptions, including sources (public corpora such as the Davidson hate-speech dataset and any internal corporate logs), ethical data-handling notes, label distributions, and exact train/validation/test splits; (2) the BERT fine-tuning procedure, including hyperparameters, optimizer, epochs, and regularization; (3) baseline comparisons (e.g., TF-IDF+SVM, LSTM, RoBERTa) with accuracy, precision, recall, and F1 scores; (4) error bars or standard deviations from repeated runs or cross-validation; and (5) end-to-end latency and throughput figures for the RabbitMQ/Redis pipeline under representative loads. These additions will allow evaluation of overfitting risk, domain shift, and false-positive rates relevant to real-time alerting. revision: yes
Circularity Check
No significant circularity in derivation chain
full rationale
The manuscript is a high-level system proposal describing a microservices architecture (RabbitMQ ingestion, Redis caching, modular services) and states that BERT-based models achieve 87% average accuracy on hate-speech detection. No equations, derivations, fitted parameters, or mathematical predictions appear in the provided text. There are no self-definitional steps, no claims that a prediction reduces to its own inputs by construction, and no load-bearing self-citations. The accuracy figure is presented as an experimental result without supporting dataset, training, or validation details, but this is an evidence gap rather than circularity. The architecture and claims remain independent of any self-referential reduction.
Axiom & Free-Parameter Ledger
Reference graph
Works this paper leans on
-
[1]
Leithardt, V. R. Q., et al. (2010). Use of Data Replication in WSNs Directed to Special Needs. DOI: 10.1109/ICCW.2010.5503914
-
[2]
Noetzold, D., et al. (2026). Self-Adaptive Systems in Smart Environments: Strategies, Metrics, and Challenges. DOI: 10.1109/MC.2025.3637543
-
[3]
Dafhalla, A. K. Y., et al. (2025). Innovative Horizons in IoT and Cloud Continuum: Enhancing Data Processing and Advanced Analytical Solutions. Journal of Computer Networks and Communications, Article ID 3635533, 20 pages. DOI: 10.1155/jcnc/3635533
-
[4]
Reshma, C. R., et al. (2025). Dynamic Sensitivity Differential Privacy: A Versatile Framework for Enhancing Privacy Across Diverse Data Scenarios. Journal of Computer Networks and Communications, Article ID 2972993, 18 pages. DOI: 10.1155/jcnc/2972993
-
[5]
Leithardt, V. R. Q., et al. (2014). Privacy management solution in ubiquitous environments using percontrol. In: Journal of Ubiquitous Systems & Pervasive Networks, vol. 5, no. 2, pp. 21--28
2014
-
[6]
Emon, M. J. H., et al. (2025). Integration of IoT, Machine Learning, and Sensors for Intelligent Environmental Monitoring and Agricultural Development. Journal of Computer Networks and Communications, Article ID 6611890, 20 pages. DOI: 10.1155/jcnc/6611890
-
[7]
Pinto, J. (2023). Spearmint: A Decentralized Solution for Recording Evidence of Cyberbullying. CISTI 2023, pp. 110--122. DOI: 10.23919/CISTI58278.2023.10211594
-
[8]
Noetzold, D., et al. (2026). Reinforcement Learning-Based Adaptive Quantum-Safe Cryptography for DN25-Compliant Smart Environments. DOI: 10.1109/ACCESS.2026.3685890
-
[9]
Leithardt, V. R. Q., et al. (2014). Privacy Management Solution in Ubiquitous Environments Using Percontrol. Journal of Ubiquitous Systems & Pervasive Networks, vol. 5, no. 2, pp. 21--28. Available at: https://www.jusat.org/index.php/jusat/article/view/133 . (Accessed in: 17 Jan 2026)
2014
-
[10]
Zhang, Y., et al. (2021). Hate crimes against Asian Americans. American Journal of Criminal Justice, pp. 1--21. DOI: 10.1007/s12103-020-09602-9
-
[11]
Said-Hung, E., et al. (2024). The Promotion of Hate Speech: From a Media and Journalism Perspective. Journalism Practice, vol. 18, no. 2, pp. 217--223. DOI: 10.1080/17512786.2023.2288918
-
[12]
Samuel, R. A. M., et al. (2024). Investigation of Data Interception and its Vulnerabilities in HTTP and HTTPS networks through Packet Sniffers. ICNWC 2024, pp. 1--4. DOI: 10.1109/ICNWC60771.2024.10537403
-
[13]
Smith, J., & Johnson, A. (2022). A Comparative Study: Undertow vs. Tomcat for Web Application Performance. Journal of Web Engineering, vol. 10, no. 2, pp. 45--60. DOI: 10.1234/jwe.2022.10.2.45
-
[14]
Granata, D., et al. (2023). Attacking a Packet Analyzer: Caronte case study. Proceedings of CSR 2023, pp. 269--274. DOI: 10.1109/CSR57506.2023.10224918
-
[15]
Glasenapp, L. A., et al. (2023). OCR applied for identification of vehicles with irregular documentation using IoT. Electronics, vol. 12, no. 5, p. 1083. DOI: 10.3390/electronics12051083
-
[17]
Pinto, J. L. D., et al. (2023). Spearmint: A Decentralized Solution for Recording Evidence of Cyberbullying. In: New Trends in Disruptive Technologies, Tech Ethics and Artificial Intelligence. Springer, pp. 110--122. Available at: https://link.springer.com/chapter/10.1007/978-3-031-38345-8\_10 . (Accessed in: 17 Jan 2026)
-
[18]
Assessing the Impact of Contextual Information in Hate Speech Detection
Perez (2023). Assessing the Impact of Contextual Information in Hate Speech Detection. IEEE Access, vol. 11, pp. 30575--30590. DOI: 10.1109/ACCESS.2023.3258973
-
[19]
Ribeiro, M. H. D. M., et al. (2020). Electricity Price Forecasting Based on Self-Adaptive Decomposition and Heterogeneous Ensemble Learning. Energies, vol. 13, no. 19. DOI: 10.3390/en13195190
-
[20]
Moreno, S. R., et al. (2021). Hybrid Multi-Stage Decomposition with Parametric Model Applied to Wind Speed Forecasting in Brazilian Northeast. Renewable Energy, vol. 164, pp. 1508--1526. DOI: 10.1016/j.renene.2020.10.126
-
[21]
Jury Orders Tesla to Pay \ 137 Million to a Former Worker Over Racist Treatment
Nytime (2021). Jury Orders Tesla to Pay \ 137 Million to a Former Worker Over Racist Treatment. Available at: https://www.nytimes.com/2021/10/04/business/tesla-racism-lawsuit.html . (Accessed in: 17 Jan 2026)
2021
-
[22]
Cost of a Data Breach 2022
IBM (2022). Cost of a Data Breach 2022. Available at: https://www.ibm.com/downloads/cas/NNZMWXZL . (Accessed in: 17 Jan 2026)
2022
-
[23]
Stefenon, S. F., et al. (2023a). Optimized Hybrid YOLOu-Quasi-ProtoPNet for Insulators Classification. IET Generation, Transmission & Distribution, vol. 17, no. 15, pp. 3501--3511. DOI: 10.1049/gtd2.12886
-
[24]
Souza, B. J., et al. (2023). Hybrid-YOLO for Classification of Insulators Defects in Transmission Lines Based on UAV. International Journal of Electrical Power & Energy Systems, vol. 148, p. 108982. DOI: 10.1016/j.ijepes.2023.108982
-
[25]
Wilbert, H. J., et al. (2023). Recency, Frequency, Monetary Value, Clustering, and Internal and External Indices for Customer Segmentation from Retail Data. Algorithms, vol. 16, no. 9, p. 396. DOI: 10.3390/a16090396
-
[26]
Klaar, A. C. R., et al. (2023a). Structure Optimization of Ensemble Learning Methods and Seasonal Decomposition Approaches to Energy Price Forecasting in Latin America: A Case Study About Mexico. Energies, vol. 16, no. 7, p. 3184. DOI: 10.3390/en16073184
-
[27]
Klaar, A. C. R., et al. (2023b). Optimized EWT-Seq2Seq-LSTM with Attention Mechanism to Insulators Fault Prediction. Sensors, vol. 23, no. 6, p. 3202. DOI: 10.3390/s23063202
-
[28]
2020 Hate Crime Data Now Available! Available at: https://hatecrime.osce.org/infocus/2020-hate-crime-data-now-available
OSCE (2021). 2020 Hate Crime Data Now Available! Available at: https://hatecrime.osce.org/infocus/2020-hate-crime-data-now-available . (Accessed in: 17 Jan 2026)
2021
-
[29]
DeskTime
DeskTime (2024). DeskTime. Available at: https://desktime.com . (Accessed in: 17 Jan 2026)
2024
-
[30]
Linguistic Datasets for Portuguese
fititnt (2019). Linguistic Datasets for Portuguese. Available at: https://github.com/EticaAI/linguistic-datasets-portuguese . (Accessed in: 17 Jan 2026)
2019
-
[31]
Kansaon, D. (2018). BraSNAM2018-Dataset-Analise-de-sentimentos-em-tweets-em-portugues-brasileiro. Available at: https://github.com/danielkansaon/BraSNAM2018-Dataset-Analise-de-sentimentos-em-tweets-em-portugues-brasileiro . (Accessed in: 17 Jan 2026)
2018
-
[32]
Staffcop
Atom Security LLC (2024). Staffcop. Available at: https://www.staffcop.com . (Accessed in: 17 Jan 2026)
2024
-
[33]
Programa Para Monitorar e Controlar Computadores de Funcionários
Kickidler (2024). Programa Para Monitorar e Controlar Computadores de Funcionários. Available at: https://www.kickidler.com/br . (Accessed in: 17 Jan 2026)
2024
-
[34]
Workforce Analytics for Productivity Management
ActivTrak (2023). Workforce Analytics for Productivity Management. Available at: https://www.activtrak.com . (Accessed in: 17 Jan 2026)
2023
-
[35]
fSense: Sistema de Monitoramento Prático e Preciso para Estações de Trabalho
FSense (2023). fSense: Sistema de Monitoramento Prático e Preciso para Estações de Trabalho. Available at: https://fsense.com . (Accessed in: 17 Jan 2026)
2023
-
[36]
Paschalides, D. (2020). Mandola: A Big-Data Processing and Visualization Platform for Monitoring and Detecting Online Hate Speech. ACM Transactions on Internet Technology (TOIT), vol. 20, no. 2, pp. 1--21. DOI: 10.1145/3371276
-
[37]
Gangwani, P., et al. (2026). Evaluating Convolutional Autoencoders for Anomaly Detection on Space-Filling Curve-Transformed Control Flow Data. IEEE Access, vol. 14, pp. 4292--4304. DOI: 10.1109/ACCESS.2026.3651178
-
[38]
Ababneh, J., et al. (2026). Enhancing DevOps Continuous Monitoring Phase: Hybrid Intrusion Detection and Ensemble Learning System (HIDELS). IEEE Access, vol. 14, pp. 4733--4755. DOI: 10.1109/ACCESS.2026.3650793
-
[39]
Noetzold, D., et al. (2023). DN25: An Adaptive Quantum Cryptography Protocol for Secure and Efficient Communication. Revista de I+D Tecnológico, vol. 19, no. 1. Available at: https://revistas.unilasalle.edu.br/index.php/idt/article/view/8429 . (Accessed in: 17 Jan 2026)
2023
-
[40]
Modha, S. (2020). Detecting and Visualizing Hate Speech in Social Media: A Cyber Watchdog for Surveillance. Expert Systems with Applications, vol. 161, p. 113725. DOI: 10.1016/j.eswa.2020.113725
-
[41]
Seman, L. O., et al. (2023). Ensemble Learning Methods Using the Hodrick--Prescott Filter for Fault Forecasting in Insulators of the Electrical Power Grids. International Journal of Electrical Power & Energy Systems, vol. 152, p. 109269. DOI: 10.1016/j.ijepes.2023.109269
-
[42]
Yamasaki, M., et al. (2024). Optimized Hybrid Ensemble Learning Approaches Applied to Very Short-Term Load Forecasting. International Journal of Electrical Power & Energy Systems, vol. 155, p. 109579. DOI: 10.1016/j.ijepes.2023.109579
-
[43]
Stefenon, S. F., et al. (2023b). Aggregating Prophet and Seasonal Trend Decomposition for Time Series Forecasting of Italian Electricity Spot Prices. Energies, vol. 16, no. 3, p. 1371. DOI: 10.3390/en16031371
-
[44]
Begnum, M., & Vinterhagen, A. (2020). Evaluating the Redis In-Memory Cache for Distributed Storage Systems. Journal of Computer and Communications, vol. 8, no. 12, pp. 1--15. DOI: 10.4236/jcc.2020.812001
-
[45]
Gao, P., et al. (2018). Performance Evaluation of Redis Cache in Web Service. 2018 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1--6. DOI: 10.1109/ICCW.2018.8403584
-
[46]
Bagaskara, A. E., et al. (2020). Performance Analysis of Message Broker for Communication in Fog Computing. ICITEE 2020, pp. 98--103. DOI: 10.1109/ICITEE49829.2020.9271733
-
[47]
Abdelwahab, S., & Hamdaoui, B. (2016). Fogmq: A Message Broker System for Enabling Distributed, Internet-Scale IoT Applications Over Heterogeneous Cloud Platforms. arXiv preprint arXiv:1610.00620. DOI: 10.48550/arXiv.1610.00620
work page internal anchor Pith review Pith/arXiv arXiv doi:10.48550/arxiv.1610.00620 2016
-
[48]
de Oliveira, D. L., et al. (2019). Performance Evaluation of MQTT Brokers in the Internet of Things for Smart Cities. SpliTech 2019, pp. 1--6. DOI: 10.23919/SpliTech.2019.8783166
-
[49]
Moreno, S. R., et al. (2024). Enhancing Wind Speed Forecasting Through Synergy of Machine Learning, Singular Spectral Analysis, and Variational Mode Decomposition. Energy, vol. 292, p. 130493. DOI: 10.1016/j.energy.2024.130493
-
[50]
Fernandes, F., et al. (2022). Long Short-Term Memory Stacking Model to Predict the Number of Cases and Deaths Caused by COVID-19. Journal of Intelligent & Fuzzy Systems, vol. 42, no. 6, pp. 6221--6234. DOI: 10.3233/JIFS-212788
-
[51]
Stefenon, S. F., et al. (2022). Analysis of the Ultrasonic Signal in Polymeric Contaminated Insulators Through Ensemble Learning Methods. IEEE Access, vol. 10, pp. 33980--33991. DOI: 10.1109/ACCESS.2022.3161506
-
[52]
Stefenon, S. F., et al. (2021). Photovoltaic Power Forecasting Using Wavelet Neuro-Fuzzy for Active Solar Trackers. Journal of Intelligent & Fuzzy Systems, vol. 40, no. 1, pp. 1083--1096. DOI: 10.3233/JIFS-201279
-
[53]
Sopelsa Neto, N. F., et al. (2022). Fault Prediction Based on Leakage Current in Contaminated Insulators Using Enhanced Time Series Forecasting Models. Sensors, vol. 22, no. 16, p. 6121. DOI: 10.3390/s22166121
-
[54]
Stefenon, S. F., et al. (2019). Fault Diagnosis of Insulators From Ultrasound Detection Using Neural Networks. Journal of Intelligent & Fuzzy Systems, vol. 37, no. 5, pp. 6655--6664. DOI: 10.3233/JIFS-190013
-
[55]
Fersini, E., et al. (2018). Overview of the Task on Automatic Misogyny Identification at IberEval 2018. CEUR-WS, vol. 2150. Available at: https://ceur-ws.org/Vol-2150/overview-AMI.pdf . (Accessed in: 17 Jan 2026)
2018
-
[56]
A., et al
Álvarez-Carmona, M. A., et al. (2018). Overview of MEX-A3T at IberEval 2018: Authorship and Aggressiveness Analysis in Mexican Spanish Tweets. CEUR-WS, vol. 2150. Available at: https://ceur-ws.org/Vol-2150/overview-mex-a3t.pdf . (Accessed in: 17 Jan 2026)
2018
- [57]
-
[58]
Waseem, Z. (2016). Are You a Racist or Am I Seeing Things? Annotator Influence on Hate Speech Detection on Twitter. Available at: https://aclanthology.org/W16-5618 . (Accessed in: 17 Jan 2026)
2016
-
[59]
Zulqarnain, M., et al. (2020). A Comparative Review on Deep Learning Models for Text Classification. Indonesian Journal of Electrical Engineering and Computer Science, vol. 19, no. 1, pp. 325--335. DOI: 10.11591/ijeecs.v19.i1.pp325-335
-
[60]
Hastie, T., et al. (2009). The Elements of Statistical Learning. Springer. DOI: 10.1198/tech.2003.s770
-
[61]
Cortes, C., & Vapnik, V. (1995). Support-Vector Networks. Machine Learning, vol. 20, pp. 273--297. Available at: https://ise.ncsu.edu/wp-content/uploads/sites/9/2022/08/Cortes-Vapnik1995\_Article\_Support-vectorNetworks.pdf . (Accessed in: 17 Jan 2026)
1995
-
[62]
Chen, X., et al. (2001). An Admission Control Scheme for Predictable Server Response Time for Web Accesses. Proc. SIGMETRICS, pp. 545--554. DOI: 10.1145/371920.372156
-
[63]
Kalischko, T., & Riedl, R. (2021). Electronic Performance Monitoring in the Digital Workplace: Conceptualization, Review of Effects and Moderators, and Future Research Opportunities. Frontiers in Psychology, vol. 12, p. 633031. DOI: 10.3389/fpsyg.2021.633031
-
[64]
Sherif, K., et al. (2021). Empowering Employees: the Other Side of Electronic Performance Monitoring. Journal of Information, Communication and Ethics in Society, vol. 19, no. 2, pp. 207--221. DOI: 10.1108/JICES-04-2020-0038
-
[65]
Wieser, L., et al. (2023). When Are Employers Interested in Electronic Performance Monitoring? Results from a Factorial Survey Experiment. IZA Discussion Paper No. 16694. Available at: https://www.iza.org/publications/dp/16694 . (Accessed in: 17 Jan 2026)
2023
-
[66]
Channi, H. K. (2024). Role of Data Acquisition, Sensors, and Actuators in Mechatronics Industry. Computational Intelligent Techniques in Mechatronics, pp. 83--107. DOI: 10.1002/9781394175437.ch3
-
[67]
Kilic, I., & Yaman, O. (2024). Classification of Spyware from Network Packets with Decision Trees Using Recursive Feature Elimination (RFE). pp. 1--4. DOI: 10.1109/SIU61531.2024.10600885
-
[68]
Rossetto, A. G. M., et al. (2024). Enhancing Monitoring Performance: A Microservices Approach to Monitoring with Spyware Techniques and Prediction Models. Sensors, vol. 24, no. 13. DOI: 10.3390/s24134212
-
[69]
Krieter, P., et al. (2024). Following Topics Across All Apps and Media Formats: Mobile Keyword Tracking as a Privacy-Friendly Data Source in Mobile Media Research. pp. 126--131. DOI: 10.1145/3631700.3664879
-
[70]
Malik, J. S., et al. (2024). Deep learning for hate speech detection: a comparative study. International Journal of Data Science and Analytics, vol. 9, no. 4, pp. 123--139. DOI: 10.1007/s41060-024-00650-6
-
[71]
Abu Bakar, R., & Kijsirikul, B. (2023). Enhancing Network Visibility and Security with Advanced Port Scanning Techniques. Sensors, vol. 23, no. 17. DOI: 10.3390/s23177541
-
[72]
Noetzold, D. (2024). spyware-API. Available at: https://github.com/DarlanNoetzold/spyware-API . (Accessed in: 17 Jan 2026)
2024
-
[73]
Samudera, B. D., et al. (2024). Sentiment Analysis of User Reviews on BSI Mobile and Action Mobile Applications on the Google Play Store Using Multinomial Naive Bayes Algorithm. International Journal of Engineering, Science and Information Technology, vol. 4, no. 4, pp. 101--112. DOI: 10.52088/ijesty.v4i4.581
-
[74]
Javaheri, D., et al. (2024). Cybersecurity threats in FinTech: A systematic review. Expert Systems with Applications, vol. 241, p. 122697. DOI: 10.1016/j.eswa.2023.122697
-
[75]
Heckler, W. F., et al. (2023). Thoth: An intelligent model for assisting individuals with suicidal ideation. Expert Systems with Applications, vol. 233, p. 120918. DOI: 10.1016/j.eswa.2023.120918
-
[76]
Wulandari, S. (2023). Spyware-Based Keylogger Design for Monitoring Smartphone User Activities Using the Smart Keylogger Application. Progressive Information, Security, Computer, and Embedded System, vol. 1, no. 2, pp. 149--157. DOI: 10.61255/pisces.v1i2.98
-
[77]
Ramos, G., et al. (2024). A comprehensive review on automatic hate speech detection in the age of the transformer. Social Network Analysis and Mining, vol. 14, no. 204. DOI: 10.1007/s13278-024-01361-3
-
[78]
Zheng, Z., et al. (2010). Distributed QoS Evaluation for Real-World Web Services. pp. 83--90. DOI: 10.1109/ICWS.2010.10
-
[79]
Aydemir, O. (2020). A New Performance Evaluation Metric for Classifiers: Polygon Area Metric. Journal of Classification. DOI: 10.1007/s00357-020-09362-5
-
[80]
Chen, L., et al. (2024). Uncertainty-Aware Cross-Modal Alignment for Hate Speech Detection. Available at: https://aclanthology.org/2024.lrec-main.1475/ . (Accessed in: 17 Jan 2026)
2024
-
[81]
Smith, J., et al. (2024). PREDICT: Multi-Agent-based Debate Simulation for Generalized Hate Speech Detection. Available at: https://aclanthology.org/2024.emnlp-main.1166/ . (Accessed in: 17 Jan 2026)
2024
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.