Zum Hauptinhalt springen

Showing 1–7 of 7 results for author: Best, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.05241  [pdf, other

    cs.CV cs.LG

    BenthicNet: A global compilation of seafloor images for deep learning applications

    Authors: Scott C. Lowe, Benjamin Misiuk, Isaac Xu, Shakhboz Abdulazizov, Amit R. Baroi, Alex C. Bastos, Merlin Best, Vicki Ferrini, Ariell Friedman, Deborah Hart, Ove Hoegh-Guldberg, Daniel Ierodiaconou, Julia Mackin-McLaughlin, Kathryn Markey, Pedro S. Menandro, Jacquomo Monk, Shreya Nemani, John O'Brien, Elizabeth Oh, Luba Y. Reshitnyk, Katleen Robert, Chris M. Roelfsema, Jessica A. Sameoto, Alexandre C. G. Schimel, Jordan A. Thomson , et al. (4 additional authors not shown)

    Abstract: Advances in underwater imaging enable the collection of extensive seafloor image datasets that are necessary for monitoring important benthic ecosystems. The ability to collect seafloor imagery has outpaced our capacity to analyze it, hindering expedient mobilization of this crucial environmental information. Recent machine learning approaches provide opportunities to increase the efficiency with… ▽ More

    Submitted 11 July, 2024; v1 submitted 8 May, 2024; originally announced May 2024.

  2. arXiv:2312.00023  [pdf, other

    cs.CR

    Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data

    Authors: Bill Kay, Sinan G. Aksoy, Molly Baird, Daniel M. Best, Helen Jenne, Cliff Joslyn, Christopher Potvin, Gregory Henselman-Petrusek, Garret Seppala, Stephen J. Young, Emilie Purvine

    Abstract: In this position paper, we argue that when hypergraphs are used to capture multi-way local relations of data, their resulting topological features describe global behaviour. Consequently, these features capture complex correlations that can then serve as high fidelity inputs to autoencoder-driven anomaly detection pipelines. We propose two such potential pipelines for cybersecurity data, one that… ▽ More

    Submitted 9 November, 2023; originally announced December 2023.

    MSC Class: 55N31

  3. arXiv:2311.08391  [pdf, other

    cs.CL

    A Material Lens on Coloniality in NLP

    Authors: William Held, Camille Harris, Michael Best, Diyi Yang

    Abstract: Coloniality, the continuation of colonial harms beyond "official" colonization, has pervasive effects across society and scientific fields. Natural Language Processing (NLP) is no exception to this broad phenomenon. In this work, we argue that coloniality is implicitly embedded in and amplified by NLP data, algorithms, and software. We formalize this analysis using Actor-Network Theory (ANT): an a… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  4. arXiv:2310.02876  [pdf, other

    cs.CL cs.CY

    Hate Speech Detection in Limited Data Contexts using Synthetic Data Generation

    Authors: Aman Khullar, Daniel Nkemelu, Cuong V. Nguyen, Michael L. Best

    Abstract: A growing body of work has focused on text classification methods for detecting the increasing amount of hate speech posted online. This progress has been limited to only a select number of highly-resourced languages causing detection systems to either under-perform or not exist in limited data contexts. This is majorly caused by a lack of training data which is expensive to collect and curate in… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: Accepted at ACM Journal on Computing and Sustainable Societies

  5. arXiv:2309.08010  [pdf, other

    cs.CG

    Malicious Cyber Activity Detection Using Zigzag Persistence

    Authors: Audun Myers, Alyson Bittner, Sinan Aksoy, Daniel M. Best, Gregory Henselman-Petrusek, Helen Jenne, Cliff Joslyn, Bill Kay, Garret Seppala, Stephen J. Young, Emilie Purvine

    Abstract: In this study we synthesize zigzag persistence from topological data analysis with autoencoder-based approaches to detect malicious cyber activity and derive analytic insights. Cybersecurity aims to safeguard computers, networks, and servers from various forms of malicious attacks, including network damage, data theft, and activity monitoring. Here we focus on the detection of malicious activity u… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  6. arXiv:2303.16828  [pdf, other

    cs.CY

    Tackling Hate Speech in Low-resource Languages with Context Experts

    Authors: Daniel Nkemelu, Harshil Shah, Irfan Essa, Michael L. Best

    Abstract: Given Myanmars historical and socio-political context, hate speech spread on social media has escalated into offline unrest and violence. This paper presents findings from our remote study on the automatic detection of hate speech online in Myanmar. We argue that effectively addressing this problem will require community-based approaches that combine the knowledge of context experts with machine l… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

    Comments: ICTD 2022 Conference paper

  7. arXiv:2208.09941  [pdf, other

    cs.SI

    Why So Inflammatory? Explainability in Automatic Detection of Inflammatory Social Media Users

    Authors: Cuong Nguyen, Daniel Nkemelu, Ankit Mehta, Michael Best

    Abstract: Hate speech and misinformation, spread over social networking services (SNS) such as Facebook and Twitter, have inflamed ethnic and political violence in countries across the globe. We argue that there is limited research on this problem within the context of the Global South and present an approach for tackling them. Prior works have shown how machine learning models built with user-level interac… ▽ More

    Submitted 21 August, 2022; originally announced August 2022.

    Comments: 6 pages. Spotlight paper at PML4DC 2022 workshop, co-located with ICLR 2022