Meny

Totalförsvarets forskningsinstitut

Våra vetenskapliga publikationer

Här samlar vi vetenskapliga publikationer kopplade till den forskning som bedrivs i Data science-gruppen

2019

  • Fernquist, J., Svenonius, O., Kaati L., Johansson, F. (2019) Extracting Account Attributes for Analyzing Influence on Twitter. IEEE European Intelligence and Security Informatics Conference (EISIC) 2019.
  • Akrami, N., Fernquist, F., Isbister, T., Kaati, L., Pelzer, B. (2019) Automatic Extraction of Personality from Text: Challenges and Opportunities. International Workshop on Big Data Analytics for Cyber Threat Hunting In conjunction with the IEEE International Conference on Big Data 2019.
  • Shrestha, A., Kaati, L., Akrami, N. (2019) PRAT - a Tool for Assessing Risk in Written Communication. 3rd International Workshop on Big Data Analytics for Cyber Intelligence and Defense In conjunction with the IEEE International Conference on Big Data 2019.
  • Fernquist, F., Kaati, L., Lindholm, O., Akrami, N. (2019) Online Hate A Study on the Feasibility to Detect Hate Speech in Swedish. 3rd International Workshop on Big Data Analytics for Cyber Intelligence and Defense In conjunction with the IEEE International Conference on Big Data 2019.
  • Berglind, T., Pelzer, B. & Kaati, L. (2019). Levels of Hate in Online Environments. FOSINT-SI/ASONAM 2019, Vancouver
  • Fernquist, J. (2019). A Four Feature Types Approach for Detecting Bot and Gender of Twitter Users. CLEF (Working Notes) 2019
  • Isbister, T. & Johansson, F. (2019). Dick-Preston and Morbo at SemEval-2019 Task 4: Transfer Learning for Hyperpartisan News Detection. SemEval@NAACL-HLT 2019, 939-943
  • Johansson, F. & Isbister, T. (2019). FOI Cross-Domain Authorship Attribution for Criminal Investigations. CLEF (Working Notes) 2019
  • Pelzer, B. (2019). Celebrity Profiling with Transfer Learning. CLEF (Working Notes) 2019

2018

  • Fernquist, J., Kaati, L. & Schroeder, R. (2018). Political Bots and the Swedish General Election, IEEE Intelligence and Security Informatics (ISI) 2018
  • Pelzer, B., Kaati, L. & Akrami, N. (2018). Directed Digital Hate. IEEE Intelligence and Security Informatics (ISI) 2018
  • Fernquist, J. & Kaati, L. (2018). Online Monitoring of Large Events. IEEE European Intelligence and Security Informatics Conference (EISIC) 2018
  • Isbister, T., Sahlgren, M., Kaati, L., Obaidi, M. & Akrami, N. (2018). Monitoring Targeted Hate in Online Environments. European Language Resources Association
  • Sahlgren, M., Isbister, T. & Olsson, F. (2018). Learning Representations for Detecting Abusive Language. Proceedings of the 2nd Workshop on Abusive Language Online (ALW2), 115-123
  • Akrami, N., Shrestha, A., Berggren, M., Kaati, L., Obaidi, M. & Cohen, K. (2018). Assessment of risk in written communication. Introducing the Profile Risk Assessment Tool (PRAT). Europol report. https://www.europol.europa.eu/publications-documents/assessment-of-risk-in-written-communication

2017

  • Isbister, T., Kaati, L. & Cohen, K. (2017). Gender Classification with Data Independent Features in Multiple Languages. European Intelligence and Security Informatics Conference (EISIC), 2017 54-60
  • Fernquist, J., Kaati, L. & Fängström, T. (2017). IoT Data Profiles: The routines of Your Life Reveals Who You Are. European Intelligence and Security Informatics Conference (EISIC).
  • Kaati, L., Lundeqvist, E., Shrestha, A., Svensson, M. (2017) Author Profiling in the Wild. European Intelligence and Security Informatics Conference (EISIC), 155-158.
  • Kaati, L., Ruul, A. (2017) Interpretable probabilistic divisive clustering of large node-attributed networks. European Intelligence and Security Informatics Conference (EISIC), 68-75.

2016

  • Cohen, K., Kaati, L., & Shrestha. A. (2016). Linguistic analysis of lone offender manifestos. In International Conference on CyberCrime and Computer Forensics
  • Kaati, L., Shrestha, A., Sardella, T. (2016). Identifying warning behaviors of violent lone offenders, Proceedings of the 16th ICDM Workshops.
  • Kaati, L., Shrestha, A., Cohen, K., & Lindquist, S. (2016). Automatic detection of xenophobic narratives: A case study on Swedish alternative media. Intelligence and Security Informatics (ISI) 2016. IEEE International Conference on IEEE, Tuscon.

2015

  • Kaati,L., Omer, E., Prucha, N. & Shrestha, A. (2015). Detecting Multipliers of Jihadism on Twitter. 2015 IEEE International Conference on Data Mining Workshop (ICDMW), 954-960.
  • Ashcroft, M. Kaati, L., Meyer, M. (2015) A Step Towards Detecting Online Grooming--Identifying Adults Pretending to be Children. European Intelligence and Security Informatics Conference (EISIC) 98-104.

2014

  • Cohen, K., Johansson, F., Kaati, L., & Mork, J.C. (2014). Detecting linguistic markers for radical violence in social media. Terrorism and Political Violence, 26, 246-256.
  • Atig, MF., Cassel, S., Kaati, L., Shrestha, A. (2014) Activity profiles in online social media. Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining

2013

  • Brynielsson, J., Horndahl, A., Johansson, F., Kaati, L., Mårtenson, C., & Svenson, P. (2013). Harvesting and analysis of weak signals for detecting lone wolf terrorists. Security Informatics, 2, 1-15
  • Johansson, F., Kaati, L., Shrestha, A. (2013) Detecting multiple aliases in social media. Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining

Senast uppdaterad: 2020-01-23