Search Results for author: Mohammed Ali Al-Garadi

Found 12 papers, 0 papers with code

Pre-trained Transformer-based Classification and Span Detection Models for Social Media Health Applications

no code implementations NAACL (SMM4H) 2021 Yuting Guo, Yao Ge, Mohammed Ali Al-Garadi, Abeed Sarker

This paper describes our approach for six classification tasks (Tasks 1a, 3a, 3b, 4 and 5) and one span detection task (Task 1b) from the Social Media Mining for Health (SMM4H) 2021 shared tasks.

Classification

Emory at WNUT-2020 Task 2: Combining Pretrained Deep Learning Models and Feature Enrichment for Informative Tweet Identification

no code implementations EMNLP (WNUT) 2020 Yuting Guo, Mohammed Ali Al-Garadi, Abeed Sarker

This paper describes the system developed by the Emory team for the WNUT-2020 Task 2: “Identifi- cation of Informative COVID-19 English Tweet”.

Task 2

Evaluating Large Language Models for Health-Related Text Classification Tasks with Public Social Media Data

no code implementations27 Mar 2024 Yuting Guo, Anthony Ovadje, Mohammed Ali Al-Garadi, Abeed Sarker

We developed three approaches for leveraging LLMs for text classification: employing LLMs as zero-shot classifiers, us-ing LLMs as annotators to annotate training data for supervised classifiers, and utilizing LLMs with few-shot examples for augmentation of manually annotated data.

Data Augmentation text-classification +1

Machine Learning Applications in Studying Mental Health Among Immigrants and Racial and Ethnic Minorities: A Systematic Review

no code implementations18 Apr 2023 Khushbu Khatri Park, Abdulaziz Ahmed, Mohammed Ali Al-Garadi

Publications were excluded if they were narrative or did not exclusively focus on a minority population from the respective country.

Survey of Machine Learning Based Intrusion Detection Methods for Internet of Medical Things

no code implementations19 Feb 2022 Ayoub Si-Ahmed, Mohammed Ali Al-Garadi, Narhimene Boustia

In this context, using Intrusion Detection Systems (IDS) based on Machine Learning (ML) can bring a complementary security solution adapted to the unique characteristics of IoMT systems.

BIG-bench Machine Learning Intrusion Detection

Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future Directions

no code implementations23 Oct 2018 Reza Shakeri, Mohammed Ali Al-Garadi, Ahmed Badawy, Amr Mohamed, Tamer Khattab, Abdulla Al-Ali, Khaled A. Harras, Mohsen Guizani

We present and propose state-of-the-art algorithms to address design challenges with both quantitative and qualitative methods and map these challenges with important CPS applications to draw insightful conclusions on the challenges of each application.

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

no code implementations29 Jul 2018 Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani

Consequently, ML/DL methods are important in transforming the security of IoT systems from merely facilitating secure communication between devices to security-based intelligence systems.

Cannot find the paper you are looking for? You can Submit a new open access paper.