Michael Fire
YOU?
Author Swipe
View article: Framework of Voting Prediction of Parliament Members
Framework of Voting Prediction of Parliament Members Open
Tracking lawmakers’ voting behavior is vital for government transparency. Although many parliaments publish voting records online, these datasets are often complex and difficult to analyze. This research presents the Voting Prediction Fram…
View article: Framework of Voting Prediction of Parliament Members
Framework of Voting Prediction of Parliament Members Open
Keeping track of how lawmakers vote is essential for government transparency. While many parliamentary voting records are available online, they are often difficult to interpret, making it challenging to understand legislative behavior acr…
View article: Dark LLMs: The Growing Threat of Unaligned AI Models
Dark LLMs: The Growing Threat of Unaligned AI Models Open
Large Language Models (LLMs) rapidly reshape modern life, advancing fields from healthcare to education and beyond. However, alongside their remarkable capabilities lies a significant threat: the susceptibility of these models to jailbreak…
View article: Behind the Byline: A Large-Scale Study of Scientific Author Contributions
Behind the Byline: A Large-Scale Study of Scientific Author Contributions Open
Understanding how co-authors distribute credit is critical for accurately assessing scholarly collaboration. In this study, we uncover the implicit structures within scientific teamwork by systematically analyzing author contributions acro…
View article: Analyzing key users’ behavior trends in volunteer-based networks
Analyzing key users’ behavior trends in volunteer-based networks Open
The use of online social platforms and networks has surged over the past decade and continues to grow in popularity. In many social networks, volunteers play a central role, and their behavior in volunteer-based networks has been studied e…
View article: VANPY: Voice Analysis Framework
VANPY: Voice Analysis Framework Open
Voice data is increasingly being used in modern digital communications, yet there is still a lack of comprehensive tools for automated voice analysis and characterization. To this end, we developed the VANPY (Voice Analysis in Python) fram…
View article: Automatic Classification of EEG Signals, Based on Image Interpretation of Spatio-Temporal Information
Automatic Classification of EEG Signals, Based on Image Interpretation of Spatio-Temporal Information Open
Brain-Computer Interface (BCI) applications provide a direct way to map human brain activity onto the control of external devices, without a need for physical movements. These systems, crucial for medical applications and also useful for n…
View article: Network-based anomaly detection algorithm reveals proteins with major roles in human tissues
Network-based anomaly detection algorithm reveals proteins with major roles in human tissues Open
Background Proteins act through physical interactions with other molecules to maintain organismal health. Protein–protein interaction (PPI) networks have proved to be a powerful framework for obtaining insight into protein functions, cellu…
View article: Shaping History: Advanced Machine Learning Techniques for the Analysis and Dating of Cuneiform Tablets over Three Millennia
Shaping History: Advanced Machine Learning Techniques for the Analysis and Dating of Cuneiform Tablets over Three Millennia Open
Cuneiform tablets, emerging in ancient Mesopotamia around the late fourth millennium BCE, represent one of humanity's earliest writing systems. Characterized by wedge-shaped marks on clay tablets, these artifacts provided insight into Meso…
View article: A Novel Method for News Article Event-Based Embedding
A Novel Method for News Article Event-Based Embedding Open
Embedding news articles is a crucial tool for multiple fields, such as media bias detection, identifying fake news, and making news recommendations. However, existing news embedding methods are not optimized to capture the latent context o…
View article: Ethnic representation analysis of commercial movie posters
Ethnic representation analysis of commercial movie posters Open
In the last decades, global awareness toward the importance of diverse representation has been increasing. The lack of diversity and discrimination toward minorities did not skip the film industry. Here, we examine ethnic bias in the film …
View article: Network-based anomaly detection algorithm reveals proteins with major roles in human tissues
Network-based anomaly detection algorithm reveals proteins with major roles in human tissues Open
Background Anomaly detection in graphs is critical in various domains, notably in medicine and biology, where anomalies often encapsulate pivotal information. Here, we focused on network analysis of molecular interactions between proteins,…
View article: Open framework for analyzing public parliaments data
Open framework for analyzing public parliaments data Open
Open information about government organizations should interest all citizens who care about their governments’ functionality. Large-scale open governmental data open new opportunities for citizens and researchers to monitor their governmen…
View article: Analyzing Key Users' behavior trends in Volunteer-Based Networks
Analyzing Key Users' behavior trends in Volunteer-Based Networks Open
Online social networks usage has increased significantly in the last decade and continues to grow in popularity. Multiple social platforms use volunteers as a central component. The behavior of volunteers in volunteer-based networks has be…
View article: Short Run Transit Route Planning Decision Support System Using a Deep Learning-Based Weighted Graph
Short Run Transit Route Planning Decision Support System Using a Deep Learning-Based Weighted Graph Open
Public transport routing plays a crucial role in transit network design, ensuring a satisfactory level of service for passengers. However, current routing solutions rely on traditional operational research heuristics, which can be time-con…
View article: Malicious source code detection using a translation model
Malicious source code detection using a translation model Open
Modern software development often relies on open-source code sharing. Open-source code reuse, however, allows hackers to access wide developer communities, thereby potentially affecting many products. An increasing number of such "supply c…
View article: Large-Scale Shill Bidder Detection in E-commerce
Large-Scale Shill Bidder Detection in E-commerce Open
User feedback is one of the most effective methods to build and maintain trust in electronic commerce platforms. Unfortunately, dishonest sellers often bend over backward to manipulate users' feedback or place phony bids in order to increa…
View article: Interruptions detection in video conferences
Interruptions detection in video conferences Open
In recent years, video conferencing (VC) popularity has skyrocketed for a wide range of activities. As a result, the number of VC users surged sharply. The sharp increase in VC usage has been accompanied by various newly emerging privacy a…
View article: Open Framework for Analyzing Public Parliaments Data
Open Framework for Analyzing Public Parliaments Data Open
Open information of government organizations is a subject that should interest all citizens who care about the functionality of their governments. Large-scale open governmental data open the door to new opportunities for citizens and resea…
View article: Malicious Source Code Detection Using Transformer
Malicious Source Code Detection Using Transformer Open
Open source code is considered a common practice in modern software development. However, reusing other code allows bad actors to access a wide developers' community, hence the products that rely on it. Those attacks are categorized as sup…
View article: Ethnic Representation Analysis of Commercial Movie Posters
Ethnic Representation Analysis of Commercial Movie Posters Open
In the last decades, global awareness towards the importance of diverse representation has been increasing. Lack of diversity and discrimination toward minorities did not skip the film industry. Here, we examine ethnic bias in the film ind…
View article: Large-Scale Shill Bidder Detection in E-commerce
Large-Scale Shill Bidder Detection in E-commerce Open
User feedback is one of the most effective methods to build and maintain trust in electronic commerce platforms. Unfortunately, dishonest sellers often bend over backward to manipulate users' feedback or place phony bids in order to increa…
View article: Co-Membership-based Generic Anomalous Communities Detection
Co-Membership-based Generic Anomalous Communities Detection Open
Nowadays, detecting anomalous communities in networks is an essential task in research, as it helps discover insights into community-structured networks. Most of the existing methods leverage either information regarding attributes of vert…
View article: Trends in computer science research within European countries
Trends in computer science research within European countries Open
No abstract available.
View article: CompanyName2Vec: Company Entity Matching Based on Job Ads
CompanyName2Vec: Company Entity Matching Based on Job Ads Open
Entity Matching is an essential part of all real-world systems that take in structured and unstructured data coming from different sources. Typically no common key is available for connecting records. Massive data cleaning and integration …
View article: Automatic Large Scale Detection of Red Palm Weevil Infestation using Aerial and Street View Images
Automatic Large Scale Detection of Red Palm Weevil Infestation using Aerial and Street View Images Open
The spread of the Red Palm Weevil has dramatically affected date growers, homeowners and governments, forcing them to deal with a constant threat to their palm trees. Early detection of palm tree infestation has been proven to be critical …
View article: Using Data Mining for Infrastructure and Safety Violations Discovery in Cities
Using Data Mining for Infrastructure and Safety Violations Discovery in Cities Open
In city planning and maintenance, the abilty to quickly identify infrastructure violations - such as missing or misplaced fire hydrants - can be crucial for maintaining a safe city; it can even save lives. In this work, we aim to provide a…