2020-12-08: Twitter Added Labels On Its Old User Interface
Figure 1: A screen capture where all the tweets in the view-port are filled with “Fact-check label” (left) and “Violated Twitter Rules” label (right).To curb the spread of misinformation on their...
View Article2020-12-21: Machine Learning on Browser with TensorFlow
What is TensorFlow and TensorFlow.js TensorFlow is an open-source library developed for machine learning, which is widely used for deep neural networks. The library provides functionalities for...
View Article2020-12-23: UI Automation: a new prospect in accessibility
Fig: Pipeline for Accessibility APIUI Automation (UIA) is an ordered tree of automation elements with a single interface for navigating the tree. This framework enables a portal to the user by...
View Article2020-12-28: Nutri-Assist: A Personal Voice-Enabled Assistant to Find Food...
This Fall I took the CS 795/895 Natural Language Processing offered by Dr. Ashok. This was a research-focused and project-based course where we were briefly introduced to the tools and techniques in...
View Article2020-12-29: Tools and libraries for matching Arabic names written in English
Tools and libraries for matching Arabic names written in English Introduction: While working on my research, I needed to find a way to scan a set of Arabic and non-Arabic names written in English to...
View Article2020-12-29: #WebArchiveWednesday Tweets from @WebSciDL in 2020
#WebArchiveWednesday began in 2019, first with @TroveAustraliapromoting the Australian Web Archive, and then later adopted by the IIPC for World Digital Preservation Day 2019. The IIPC generated some...
View Article2020-12-30: UI Automation: A walkthrough with UI Automation
Fig: a demonstration of UI Automation in NotepadEssential criteria for accessibility assistance in the application are programmatic access and keyboard access. To test accessibility for people with...
View Article2021-01-05: Summary of "BRON--Linking Attack Tactics, Techniques, and...
Figure 1: Visualization of BRON with Vulnerabilities and Affected Product Configurations (Source: Hemberg et al.)Cyber threats, like the recent SolarWinds Sunburst attack, are harmful and hard to...
View Article2021-01-09: Embedded Tweets From @realDonaldTrump: They Won’t Break, But They...
.wrap { white-space: pre-wrap; /* css-3 */ white-space: -moz-pre-wrap; /* Mozilla, since 1999 */ white-space: -pre-wrap; /* Opera 4-6 */ white-space: -o-pre-wrap; /* Opera 7 */ word-wrap: break-word;...
View Article2021-01-11: Trip report to SDP (First Workshop on Scholarly Document...
The First Workshop on Scholarly Document Processing (SDP 2020) was collocated with EMNLP 2020 on Nov. 19, 2020. This workshop is organized for research on mining scientific literature. The SDP workshop...
View Article2021-01-14: Review of WS-DL's 2020
Is there a more definitive 2020 academic image than a Zoom window? Despite the challenges of Covid-19's impact on education, the Web Science and Digital Libraries (WS-DL) Research Group had a...
View Article2021-01-15: Six WS-DL classes Offered for Spring 2021
https://xkcd.com/1264/Six courses from the Web Science and Digital Libraries (WS-DL) Group will be offered in Spring 2021. Because of Covid-19, most of these classes will either be completely on-line...
View Article2021-01-19: Summary of "Latent Feature Vulnerability Rankings of CVSS Vectors"
Figure 1: CVSS Score Metrics. (Source: Balbix)The Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and severity of software vulnerabilities. These...
View Article2021-01-20: Between the Election Day and the suspension of @realDonaldTrump,...
Figure 1: Daily Twitter follower growth rate for @joebiden and @realDonaldTrumpOn January 6, 2021, the US Congress certified Joe Biden as the 46th US President. On January 8, 2021, Twitter permanently...
View Article2020-01-20: 366 dots in 2020 - top news stories of 2020
Fig. 1 (Click image to expand) 366 dots in 2020 - Top news stories for 366 days in 2020. Each dot represents the average degree of the Giant Connected Component (GCC) with the largest average degree...
View Article2020-01-22 Twitter rewrites your URLs, but assumes you’ll never rewrite...
Figure 1: The tweet replayed in Internet Archives’s Wayback Machine has the t.co URI-M (“/web/20210106213519/https://t.co/Pm2PKV0Fp3”) displayed in the memento.URLs shared on Twitter are automatically...
View Article2021-01-26: Summary of "CVExplorer: Multidimensional Visualization for Common...
Figure 1: Overview of 110,766 CVEs reported from 1998 to 2018 obtained from the NVD. Layers are severity classification: low, medium, high, and critical. (Source: Pham et al.)Computing network...
View Article2021-02-13: Summary of "Latent Feature Vulnerability Ranking of CVSS...
A critique of the summary of "Latent Feature Vulnerability Rankings of CVSS Vectors" (cc @correnmccoyhttps://t.co/Hmjph1CfNv— Sciuridae Hero (@attritionorg) January 20, 2021 When an academic researcher...
View Article2021-02-09: The 1st AAAI Workshop on Scientific Document Understanding (SDU...
The AAAI-21 Workshop on Scientific Document Understanding (SDU) was co-located with the 35th AAAI Conference on Artificial Intelligence. This is another workshop focusing on scientific documents,...
View Article2021-02-20: Creation Time and Published Time Are Not the Same: Estimating the...
Figure 01: A capture of an Instagram post highlighting the “shortcode” for a post and its published time. During the process of examining how the published datetime of a post can be extracted with the...
View Article