Alert button
Picture for Ahmad Diab

Ahmad Diab

Alert button

Classifying Conspiratorial Narratives At Scale: False Alarms and Erroneous Connections

Add code
Bookmark button
Alert button
Mar 29, 2024
Ahmad Diab, Rr. Nefriana, Yu-Ru Lin

Viaarxiv icon

A Weakly Supervised Classifier and Dataset of White Supremacist Language

Add code
Bookmark button
Alert button
Jun 27, 2023
Michael Miller Yoder, Ahmad Diab, David West Brown, Kathleen M. Carley

Figure 1 for A Weakly Supervised Classifier and Dataset of White Supremacist Language
Figure 2 for A Weakly Supervised Classifier and Dataset of White Supremacist Language
Figure 3 for A Weakly Supervised Classifier and Dataset of White Supremacist Language
Figure 4 for A Weakly Supervised Classifier and Dataset of White Supremacist Language
Viaarxiv icon

Domain-robust VQA with diverse datasets and methods but no target labels

Add code
Bookmark button
Alert button
Mar 29, 2021
Mingda Zhang, Tristan Maidment, Ahmad Diab, Adriana Kovashka, Rebecca Hwa

Figure 1 for Domain-robust VQA with diverse datasets and methods but no target labels
Figure 2 for Domain-robust VQA with diverse datasets and methods but no target labels
Figure 3 for Domain-robust VQA with diverse datasets and methods but no target labels
Figure 4 for Domain-robust VQA with diverse datasets and methods but no target labels
Viaarxiv icon

Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

Add code
Bookmark button
Alert button
Jul 28, 2016
Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian

Figure 1 for Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence
Figure 2 for Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence
Figure 3 for Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence
Figure 4 for Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence
Viaarxiv icon

Product Offerings in Malicious Hacker Markets

Add code
Bookmark button
Alert button
Jul 26, 2016
Ericsson Marin, Ahmad Diab, Paulo Shakarian

Figure 1 for Product Offerings in Malicious Hacker Markets
Figure 2 for Product Offerings in Malicious Hacker Markets
Figure 3 for Product Offerings in Malicious Hacker Markets
Viaarxiv icon