Meny

Totalförsvarets forskningsinstitut

Våra vetenskapliga publikationer

Här samlar vi vetenskapliga publikationer kopplade till den forskning som bedrivs i Data science-gruppen

2019

  • Berglind, T., Pelzer, B. & Kaati, L. (2019). Levels of Hate in Online Environments. FOSINT-SI/ASONAM 2019, Vancouver
  • Fernquist, J. (2019). A Four Feature Types Approach for Detecting Bot and Gender of Twitter Users. CLEF (Working Notes) 2019
  • Isbister, T. & Johansson, F. (2019). Dick-Preston and Morbo at SemEval-2019 Task 4: Transfer Learning for Hyperpartisan News Detection. SemEval@NAACL-HLT 2019, 939-943
  • Johansson, F. & Isbister, T. (2019). FOI Cross-Domain Authorship Attribution for Criminal Investigations. CLEF (Working Notes) 2019
  • Pelzer, B. (2019). Celebrity Profiling with Transfer Learning. CLEF (Working Notes) 2019

2018

  • Fernquist, J., Kaati, L. & Schroeder, R. (2018). Political Bots and the Swedish General Election, IEEE Intelligence and Security Informatics (ISI) 2018
  • Pelzer, B., Kaati, L. & Akrami, N. (2018). Directed Digital Hate. IEEE Intelligence and Security Informatics (ISI) 2018
  • Fernquist, J. & Kaati, L. (2018). Online Monitoring of Large Events, IEEE European Intelligence and Security Informatics Conference (EISIC) 2018
  • Isbister, T., Sahlgren, M., Kaati, L., Obaidi, M. & Akrami, N. (2018). Monitoring Targeted Hate in Online Environments. European Language Resources Association
  • Sahlgren, M., Isbister, T. & Olsson, F. (2018). Learning Representations for Detecting Abusive Language. Proceedings of the 2nd Workshop on Abusive Language Online (ALW2), 115-123
  • Akrami, N., Shrestha, A, Berggren, M., Kaati, L., Obaidi, M. & Cohen, K. (2018). Assessment of risk in written communication. Introducing the Profile Risk Assessment Tool (PRAT). Europol report. https://www.europol.europa.eu/publications-documents/assessment-of-risk-in-written-communication

2017

  • Isbister, T., Kaati, L. & Cohen, K. (2017). Gender Classification with Data Independent Features in Multiple Languages. European Intelligence and Security Informatics Conference (EISIC), 2017 54-60
  • Fernquist, J., Kaati, L. & Fängström, T. (2017). IoT Data Profiles: The routines of Your Life Reveals Who You Are. European Intelligence and Security Informatics Conference (EISIC).
  • Kaati, L., Lundeqvist, E., Shrestha, A., Svensson, M. (2017) Author Profiling in the Wild. European Intelligence and Security Informatics Conference (EISIC), 155-158.
  • Kaati, L., Ruul, A. (2017) Interpretable probabilistic divisive clustering of large node-attributed networks. European Intelligence and Security Informatics Conference (EISIC), 68-75.

2016

  • Cohen, K., Kaati, L., & Shrestha. A. (2016). Linguistic analysis of lone offender manifestos. In International Conference on CyberCrime and Computer Forensics
  • Kaati, L., Shrestha, A., Sardella, T. (2016). Identifying warning behaviors of violent lone offenders, Proceedings of the 16th ICDM Workshops.
  • Kaati, L., Shrestha, A., Cohen, K., & Lindquist, S. (2016). Automatic detection of xenophobic narratives: A case study on Swedish alternative media. Intelligence and Security Informatics (ISI) 2016. IEEE International Conference on IEEE, Tuscon.

2015

  • Kaati,L., Omer, E., Prucha, N. & Shrestha, A. (2015). Detecting Multipliers of Jihadism on Twitter. 2015 IEEE International Conference on Data Mining Workshop (ICDMW), 954-960.
  • Ashcroft, M. Kaati, L., Meyer, M. (2015) A Step Towards Detecting Online Grooming--Identifying Adults Pretending to be Children. European Intelligence and Security Informatics Conference (EISIC) 98-104.

2014

  • Cohen, K., Johansson, F., Kaati, L., & Mork, J.C. (2014). Detecting linguistic markers for radical violence in social media. Terrorism and Political Violence, 26, 246-256.
  • Atig, MF., Cassel, S., Kaati, L., Shrestha, A. (2014) Activity profiles in online social media. Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining

2013

  • Brynielsson, J., Horndahl, A., Johansson, F., Kaati, L., Mårtenson, C., & Svenson, P. (2013). Harvesting and analysis of weak signals for detecting lone wolf terrorists. Security Informatics, 2, 1-15
  • Johansson, F., Kaati, L., Shrestha, A. (2013) Detecting multiple aliases in social media. Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining

Senast uppdaterad: 2019-10-23