{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:05:49Z","timestamp":1777129549428,"version":"3.51.4"},"reference-count":152,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T00:00:00Z","timestamp":1750118400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T00:00:00Z","timestamp":1750118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01192-9","type":"journal-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:29:56Z","timestamp":1750177796000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Big Data Analytics in IoT, social media, NLP, and information security: trends, challenges, and applications"],"prefix":"10.1186","volume":"12","author":[{"given":"Kamal","family":"Taha","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,17]]},"reference":[{"key":"1192_CR1","doi-asserted-by":"crossref","unstructured":"Huang Z, Destech Publicat I. Research on the innovation of E-business talents training mode under the background of big data. Intern conference on E-commerce and contemporary economic development. DEStech Transactions on Economics Business and Management, 2018. p. 48\u201352.","DOI":"10.12783\/dtem\/eced2018\/23932"},{"key":"1192_CR2","doi-asserted-by":"publisher","first-page":"3343","DOI":"10.1007\/s10586-022-03568-5","volume":"25","author":"AC Ikegwu","year":"2022","unstructured":"Ikegwu AC, Nweke HF, Anikwe CV, et al. Big Data Analytics for data-driven industry: a review of data sources, tools, challenges, solutions, and research directions. Cluster Comput. 2022;25:3343\u201387.","journal-title":"Cluster Comput"},{"key":"1192_CR3","doi-asserted-by":"crossref","unstructured":"Sagiroglu S, Sinanc D. Big data: a review. presented in international conference: collaboration technologies and systems (CTS). IEEE Xplore, 2013.","DOI":"10.1109\/CTS.2013.6567202"},{"key":"1192_CR4","doi-asserted-by":"crossref","unstructured":"Narayanan V, Vijayakumar VB, Venkatraman SR, Baruah PK. Semantic node embeddings of distributed graphs using apache spark.\u00a02016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, India, 2016; pp. 709\u2013713.","DOI":"10.1109\/PDGC.2016.7913214"},{"key":"1192_CR5","doi-asserted-by":"publisher","first-page":"122147","DOI":"10.1016\/j.eswa.2023.122147","volume":"238","author":"ESM El-kenawy","year":"2024","unstructured":"El-kenawy ESM, Khodadadi N, Mirjalili S, Abdelhamid AA, Eid MM, Ibrahim A. Greylag goose optimization: nature-inspired optimization algorithm. Expert Syst Appl. 2024;238:122147.","journal-title":"Expert Syst Appl"},{"issue":"10","key":"1192_CR6","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1016\/j.arth.2019.06.018","volume":"34","author":"PN Ramkumar","year":"2019","unstructured":"Ramkumar PN, Haeberle HS, Patterson BM, Krebs VE. Artificial intelligence and arthroplasty at a single institution: real-world applications of machine learning to big data, value-based care, mobile health, and remote patient monitoring. J Arthroplasty. 2019;34(10):2204\u20139.","journal-title":"J Arthroplasty"},{"key":"1192_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/s11063-025-11732-2","volume":"57","author":"DE Mathew","year":"2025","unstructured":"Mathew DE, Ebem DU, Ikegwu AC, et al. Recent emerging techniques in explainable artificial intelligence to enhance the interpretable and understanding of AI models for human. Neural Process Lett. 2025;57:16.","journal-title":"Neural Process Lett"},{"key":"1192_CR8","doi-asserted-by":"publisher","first-page":"107293","DOI":"10.1109\/ACCESS.2022.3209825","volume":"10","author":"S Mahadevkar","year":"2022","unstructured":"Mahadevkar S, et al. A review on machine learning styles in computer vision\u2014techniques and future directions. IEEE Access. 2022;10:107293\u2013329.","journal-title":"IEEE Access"},{"issue":"1","key":"1192_CR9","first-page":"865","volume":"73","author":"DS Khafaga","year":"2022","unstructured":"Khafaga DS, Alhussan AA, El-kenawy ESM, Ibrahim A, Elkhalik SHA, El-Mashad SY, Abdelhamid AA. Improved prediction of metamaterial antenna bandwidth using adaptive optimization of LSTM. Comput, Mater Cont. 2022;73(1):865\u201381.","journal-title":"Comput, Mater Cont"},{"issue":"8","key":"1192_CR10","doi-asserted-by":"publisher","first-page":"4544","DOI":"10.1109\/JBHI.2024.3350666","volume":"28","author":"X Yang","year":"2024","unstructured":"Yang X, Yang G, Chu J. GraphCL-DTA: a graph contrastive learning with molecular semantics for drug-target binding affinity prediction. IEEE J Biomed Health Inform. 2024;28(8):4544\u201352.","journal-title":"IEEE J Biomed Health Inform"},{"key":"1192_CR11","doi-asserted-by":"publisher","first-page":"126470","DOI":"10.1016\/j.foodchem.2020.126470","volume":"318","author":"D Zhang","year":"2020","unstructured":"Zhang D, Gong L, Ding S, Tian Y, Jia C, Liu D, Hu QN. FRCD: a comprehensive food risk component database with molecular scaffold, chemical diversity, toxicity, and biodegradability analysis. Food Chem. 2020;318:126470.","journal-title":"Food Chem"},{"key":"1192_CR12","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.foodcont.2018.06.003","volume":"93","author":"Y Bouzembrak","year":"2018","unstructured":"Bouzembrak Y, Steen B, Neslo R, Linge J, Mojtahed V, Marvin HJP. Development of food fraud media monitoring system based on text mining. Food Control. 2018;93:283\u201396.","journal-title":"Food Control"},{"issue":"1","key":"1192_CR13","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.foodcont.2013.01.051","volume":"33","author":"R Liu","year":"2013","unstructured":"Liu R, Pieniak Z, Verbeke W. Consumers\u2019 attitudes and behaviour towards safe food in China: a review. Food Control. 2013;33(1):93\u2013104.","journal-title":"Food Control"},{"key":"1192_CR14","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.foodcont.2014.05.033","volume":"46","author":"R Liu","year":"2014","unstructured":"Liu R, Pieniak Z, Verbeke W. Food-related hazards in China: consumers\u2019 perceptions of risk and trust in information sources. Food Control. 2014;46:291\u20138.","journal-title":"Food Control"},{"issue":"3","key":"1192_CR15","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/s10115-014-0808-1","volume":"45","author":"H Nguyen","year":"2015","unstructured":"Nguyen H, Woon Y-K, Ng W-K. A survey on data stream clustering and classification. Knowl Inf Syst. 2015;45(3):535\u201369.","journal-title":"Knowl Inf Syst"},{"issue":"2","key":"1192_CR16","first-page":"289","volume":"47","author":"L Zhang","year":"2017","unstructured":"Zhang L, Lin J, Karim R. Sliding window-based fault detection from high-dimensional data streams. IEEE Trans Syst, Man Cybern Syst. 2017;47(2):289\u2013303.","journal-title":"IEEE Trans Syst, Man Cybern Syst"},{"issue":"2","key":"1192_CR17","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TCYB.2018.2869658","volume":"50","author":"I Tsimperidis","year":"2020","unstructured":"Tsimperidis I, Yoo P, Taha K, Mylonas A, Katos V. R2BN: an adaptive model for keystroke-dynamics-based educational level classification. IEEE Trans Cybern. 2020;50(2):525\u201335.","journal-title":"IEEE Trans Cybern"},{"key":"1192_CR18","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2024.2343982","author":"SJ Bhasha","year":"2024","unstructured":"Bhasha SJ, Panda S. Data privacy preservation and authentication scheme for secured IoMT communication using enhanced heuristic approach with deep learning. Cybern Syst. 2024. https:\/\/doi.org\/10.1080\/01969722.2024.2343982.","journal-title":"Cybern Syst"},{"issue":"13","key":"1192_CR19","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.14778\/2733004.2733010","volume":"7","author":"P Gupta","year":"2014","unstructured":"Gupta P, et al. Real-time Twitter recommendation: online motif detection in large dynamic graphs. Proc VLDB Endowment. 2014;7(13):1379\u201380.","journal-title":"Proc VLDB Endowment"},{"issue":"7","key":"1192_CR20","doi-asserted-by":"publisher","first-page":"3409","DOI":"10.1016\/j.eswa.2013.11.035","volume":"41","author":"L Liu","year":"2014","unstructured":"Liu L, Xu J, Liao SS, Chen H. A real-time personalized route recommendation system for self-drive tourists based on vehicle to vehicle communication. Expert Syst Appl. 2014;41(7):3409\u201317.","journal-title":"Expert Syst Appl"},{"issue":"13","key":"1192_CR21","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.14778\/2733004.2733027","volume":"7","author":"H Wang","year":"2014","unstructured":"Wang H, et al. R3: a real-time route recommendation system. Proc VLDB Endowment. 2014;7(13):1549\u201352.","journal-title":"Proc VLDB Endowment"},{"key":"1192_CR22","doi-asserted-by":"crossref","unstructured":"McCord M, Chuah M. Spam detection on Twitter using traditional classifiers,\u201d in Proc. 8th Int. Conf. Auton. Trusted Comput, Banff, AB, Canada, 2011; pp. 175\u2013186.","DOI":"10.1007\/978-3-642-23496-5_13"},{"issue":"12","key":"1192_CR23","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.14778\/3402755.3402795","volume":"4","author":"X Jin","year":"2011","unstructured":"Jin X, Lin C, Luo J, Han J. A data mining-based spam detection system for social media networks. Proc VLDB Endowment. 2011;4(12):1458\u201361.","journal-title":"Proc VLDB Endowment"},{"key":"1192_CR24","doi-asserted-by":"publisher","DOI":"10.5421\/MOR.030205","author":"M Elshabrawy","year":"2025","unstructured":"Elshabrawy M. A review on waste management techniques for sustainable energy production. Metaheur Optim Rev. 2025. https:\/\/doi.org\/10.5421\/MOR.030205.","journal-title":"Metaheur Optim Rev"},{"key":"1192_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/01969722.2024.2343988","volume":"55","author":"N Subramanian","year":"2024","unstructured":"Subramanian N, Nikkath Bushra S, Shobana G, Radhika S. An optimal modified bidirectional generative adversarial network for security authentication in cloud Environment. Cybern Syst. 2024;55:1\u201333.","journal-title":"Cybern Syst"},{"key":"1192_CR26","doi-asserted-by":"crossref","unstructured":"Talia D. Toward cloud-based big-data analytics. IEEE Computer Science, 2013; pp. 98\u2013101.","DOI":"10.1109\/MC.2013.162"},{"key":"1192_CR27","doi-asserted-by":"crossref","unstructured":"Agrawal D, Das S, El Abbadi A. Big data and cloud computing: current state and future opportunities. In Proceedings of the 14th international conference on extending database technology. ACM, 2011; pp. 530\u2013533.","DOI":"10.1145\/1951365.1951432"},{"issue":"3","key":"1192_CR28","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1109\/JBHI.2013.2248742","volume":"17","author":"K Taha","year":"2013","unstructured":"Taha K. Determining the semantic similarities among gene ontology terms. IEEE J Biomed Health Inform. 2013;17(3):512\u201325.","journal-title":"IEEE J Biomed Health Inform"},{"issue":"6","key":"1192_CR29","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1109\/TCBB.2014.2344668","volume":"11","author":"K Taha","year":"2014","unstructured":"Taha K. Determining semantically related significant genes. IEEE\/ACM Trans Comput Biol Bioinform. 2014;11(6):1119\u201330.","journal-title":"IEEE\/ACM Trans Comput Biol Bioinform"},{"key":"1192_CR30","doi-asserted-by":"publisher","first-page":"5","DOI":"10.58496\/BJAI\/2023\/002","volume":"2023","author":"OM Alyasiri","year":"2023","unstructured":"Alyasiri OM, Ali AH. Exploring GPT-4\u2019s characteristics through the 5Vs of big data: a brief perspective. Babylonian J Artif Intell. 2023;2023:5\u20139.","journal-title":"Babylonian J Artif Intell"},{"key":"1192_CR31","doi-asserted-by":"crossref","unstructured":"Alyasiri OM, Akhtom D, Alrasheedy MN. An Overview of GPT-4\u2019s characteristics through the lens of 10V's of big data. 2023 3rd International Conference on Intelligent Cybernetics Technology & Applications (ICICyTA), Denpasar, Bali, Indonesia, 2023; pp. 201\u2013206","DOI":"10.1109\/ICICyTA60173.2023.10429032"},{"key":"1192_CR32","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s42162-024-00307-5","volume":"7","author":"AC Ikegwu","year":"2024","unstructured":"Ikegwu AC, Nweke HF, Mkpojiogu E, et al. Recently emerging trends in big data analytic methods for modeling and combating climate change effects. Energy Inform. 2024;7:6.","journal-title":"Energy Inform"},{"key":"1192_CR33","first-page":"123456","volume":"9","author":"H Wu","year":"2021","unstructured":"Wu H, Zhu Z, Zeng Z. Intelligent intrusion detection for internet of things security: a deep convolutional generative adversarial network-enabled approach. IEEE Access. 2021;9:123456\u201367.","journal-title":"IEEE Access"},{"issue":"4","key":"1192_CR34","first-page":"556","volume":"48","author":"F Meng","year":"2022","unstructured":"Meng F. The convolutional neural network text classification algorithm in the information management of smart tourism based on internet of things. J Inf Sci. 2022;48(4):556\u201367.","journal-title":"J Inf Sci"},{"key":"1192_CR35","first-page":"108","volume":"475","author":"H Xin","year":"2022","unstructured":"Xin H, Wang Z, Li J. Depression detection via BERT-CNN and BERT-BiLSTM on reddit. Neurocomputing. 2022;475:108\u201321.","journal-title":"Neurocomputing"},{"key":"1192_CR36","first-page":"116431","volume":"193","author":"F Anzum","year":"2022","unstructured":"Anzum F, Banu A, Sultana R. Emotion detection from micro-blogs using novel input representation. Expert Syst Appl. 2022;193:116431.","journal-title":"Expert Syst Appl"},{"issue":"18","key":"1192_CR37","doi-asserted-by":"publisher","first-page":"3274","DOI":"10.3390\/math10183274","volume":"10","author":"G Atteia","year":"2022","unstructured":"Atteia G, Abdel Samee N, El-Kenawy ESM, Ibrahim A. CNN-hyperparameter optimization for diabetic maculopathy diagnosis in optical coherence tomography and fundus retinography. Mathematics. 2022;10(18):3274.","journal-title":"Mathematics"},{"key":"1192_CR38","doi-asserted-by":"crossref","unstructured":"Miao Y, Yu H, Song J. Medical big data statistical management system based on decision tree algorithm.\u00a02022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Beijing, China, 2022; pp. 2041-2046","DOI":"10.1109\/IAEAC54830.2022.9929535"},{"key":"1192_CR39","unstructured":"Narkhede H, Khodke S, Patil S. Fake news detection system using decision tree algorithm and compare textual property with support vector machine algorithm. Conference: 2022 international conference on business analytics for technology and security (ICBATS). 2021."},{"key":"1192_CR40","doi-asserted-by":"publisher","DOI":"10.5421\/JAIM.090102","author":"KS Gaber","year":"2025","unstructured":"Gaber KS, Singla MK. Predictive analysis of groundwater resources using random forest regression. J Artif Intell Metaheur. 2025. https:\/\/doi.org\/10.5421\/JAIM.090102.","journal-title":"J Artif Intell Metaheur"},{"key":"1192_CR41","doi-asserted-by":"crossref","unstructured":"Wang J, Li B, Zeng Y. XGBoost-based android malware detection.\u00a02017 13th International Conference on Computational Intelligence and Security (CIS). 2017; 268\u2013272.","DOI":"10.1109\/CIS.2017.00065"},{"key":"1192_CR42","doi-asserted-by":"publisher","first-page":"65675","DOI":"10.1109\/ACCESS.2023.3281893","volume":"11","author":"N Hussen","year":"2023","unstructured":"Hussen N, Elghamrawy SM, Salem M, El-Desouky AI. A fully streaming big data framework for cyber security based on optimized deep learning algorithm. IEEE Access. 2023;11:65675\u201388.","journal-title":"IEEE Access"},{"key":"1192_CR43","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/8734201","author":"F Hemmati","year":"2023","unstructured":"Hemmati F, Zarei N, Bagheri E. A taxonomy of Big Data Analytics for social media: techniques, platforms, and challenges. Hindawi J Comput Netw Commun. 2023. https:\/\/doi.org\/10.1155\/2023\/8734201.","journal-title":"Hindawi J Comput Netw Commun"},{"key":"1192_CR44","doi-asserted-by":"publisher","first-page":"102285","DOI":"10.1016\/j.cose.2021.102285","volume":"106","author":"MA Rahman","year":"2021","unstructured":"Rahman MA, Reza K. Privacy-preserving Big Data Analytics in social media: techniques and challenges. Comput Secur. 2021;106:102285. https:\/\/doi.org\/10.1016\/j.cose.2021.102285.","journal-title":"Comput Secur"},{"key":"1192_CR45","doi-asserted-by":"publisher","first-page":"100494","DOI":"10.1016\/j.iot.2021.100494","volume":"17","author":"M Fawzy","year":"2022","unstructured":"Fawzy M, Hussein A, Zolkipli MF. Big Data Analytics in the Internet of Things: a taxonomy and survey. Internet Things. 2022;17:100494. https:\/\/doi.org\/10.1016\/j.iot.2021.100494.","journal-title":"Internet Things"},{"key":"1192_CR46","doi-asserted-by":"publisher","first-page":"76","DOI":"10.4236\/jis.2023.141006","volume":"14","author":"A Abdallah","year":"2023","unstructured":"Abdallah A, Talib A. Classification of big data security based on ontology web language. J Inf Secur. 2023;14:76\u201391. https:\/\/doi.org\/10.4236\/jis.2023.141006.","journal-title":"J Inf Secur"},{"issue":"6","key":"1192_CR47","first-page":"2021","volume":"7","author":"H Song","year":"2023","unstructured":"Song H. Big data in cybersecurity: a survey of applications and future trends. J Reliab Intell Environ. 2023;7(6):2021.","journal-title":"J Reliab Intell Environ"},{"issue":"4","key":"1192_CR48","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/3590963","volume":"23","author":"L Deng","year":"2023","unstructured":"Deng L, Xu G, Pi J, Zhu H, Zhou X. Unpaired self-supervised learning for industrial cyber-manufacturing spectrum blind deconvolution. ACM Trans Internet Technol. 2023;23(4):52.","journal-title":"ACM Trans Internet Technol"},{"issue":"2","key":"1192_CR49","first-page":"80","volume":"7","author":"Y Han","year":"2023","unstructured":"Han Y, Sano A. Semi-supervised learning for wearable-based momentary stress detection in the wild. Proc ACM Interact Mob Wearable Ubiquitous Technol. 2023;7(2):80.","journal-title":"Proc ACM Interact Mob Wearable Ubiquitous Technol"},{"key":"1192_CR50","doi-asserted-by":"crossref","unstructured":"Zhang R, Zhao X, Li Y, Zheng S, Ma R, Tian M, Xue Y, Wang Y, Guan H. Privacy-aware offloading strategy via self-supervised feature mapping in the end-edge-cloud system. ACM Trans Sen Netw. 2024.","DOI":"10.1145\/3685931"},{"issue":"1","key":"1192_CR51","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TBDATA.2019.2892462","volume":"7","author":"J Xu","year":"2021","unstructured":"Xu J, Zhu S, Guo H, Wu S. automated labeling for robotic autonomous navigation through multi-sensory semi-supervised learning on big data. IEEE Trans Big Data. 2021;7(1):93\u2013101.","journal-title":"IEEE Trans Big Data"},{"issue":"6","key":"1192_CR52","doi-asserted-by":"publisher","first-page":"5330","DOI":"10.1109\/TWC.2023.3325735","volume":"23","author":"Y Wang","year":"2024","unstructured":"Wang Y, Li Y, Shi Q, Wu Y-C. ENGNN: a general edge-update empowered GNN architecture for radio resource management in wireless networks. IEEE Trans Wireless Commun. 2024;23(6):5330\u201344.","journal-title":"IEEE Trans Wireless Commun"},{"key":"1192_CR53","doi-asserted-by":"publisher","DOI":"10.1145\/3665141","author":"B Zhou","year":"2024","unstructured":"Zhou B, Zhou H, Wang W, Chen L, Ma J, Zheng Z. HDM-GNN: a heterogeneous dynamic multi-view graph neural network for crime prediction. ACM Trans Sen Netw Just Accept. 2024. https:\/\/doi.org\/10.1145\/3665141.","journal-title":"ACM Trans Sen Netw Just Accept"},{"issue":"8","key":"1192_CR54","doi-asserted-by":"publisher","first-page":"13837","DOI":"10.1109\/JIOT.2023.3340880","volume":"11","author":"B Xie","year":"2024","unstructured":"Xie B, Hu C, Huang H, Yu J, Xia H. DCI-PFGL: decentralized cross-institutional personalized federated graph learning for IoT service recommendation. IEEE Internet Things J. 2024;11(8):13837\u201350.","journal-title":"IEEE Internet Things J"},{"issue":"12","key":"1192_CR55","doi-asserted-by":"publisher","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","volume":"9","author":"X Zhou","year":"2022","unstructured":"Zhou X, Liang W, Li W, Yan K, Shimizu S, Wang KI-K. Hierarchical Adversarial attacks against graph-neural-network-based IoT network intrusion detection system. IEEE Internet Things J. 2022;9(12):9310\u20139.","journal-title":"IEEE Internet Things J"},{"key":"1192_CR56","doi-asserted-by":"publisher","first-page":"19288","DOI":"10.1109\/JSTARS.2024.3479212","volume":"17","author":"G Zhang","year":"2024","unstructured":"Zhang G, Zhang L, Zhang Z, Deng J, Bian L, Yang C. DECT: diffusion-enhanced CNN\u2013transformer for multisource remote sensing data classification. IEEE J Sel Top Appl Earth Observ Remote Sens. 2024;17:19288\u2013301.","journal-title":"IEEE J Sel Top Appl Earth Observ Remote Sens"},{"key":"1192_CR57","doi-asserted-by":"publisher","first-page":"11804","DOI":"10.1109\/ACCESS.2023.3242116","volume":"11","author":"Y Cui","year":"2023","unstructured":"Cui Y, Lei D. Optimizing internet of things-based intelligent transportation system\u2019s information acquisition using deep learning. IEEE Access. 2023;11:11804\u201310.","journal-title":"IEEE Access"},{"issue":"4","key":"1192_CR58","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1109\/JIOT.2021.3112159","volume":"10","author":"Y Wu","year":"2023","unstructured":"Wu Y, Nie L, Wang S, Ning Z, Li S. Intelligent intrusion detection for internet of things security: a deep convolutional generative adversarial network-enabled approach. IEEE Internet Things J. 2023;10(4):3094\u2013106.","journal-title":"IEEE Internet Things J"},{"key":"1192_CR59","doi-asserted-by":"publisher","first-page":"149308","DOI":"10.1109\/ACCESS.2024.3465027","volume":"12","author":"S Jia","year":"2024","unstructured":"Jia S, Chu S, Hou Q, Liu J. Application of remote sensing image change detection algorithm in extracting damaged buildings in earthquake disaster. IEEE Access. 2024;12:149308\u201319.","journal-title":"IEEE Access"},{"key":"1192_CR60","doi-asserted-by":"publisher","first-page":"37515","DOI":"10.1109\/ACCESS.2023.3266514","volume":"11","author":"R Chatterjee","year":"2023","unstructured":"Chatterjee R, Chatterjee A, Pradhan MR, Acharya B, Choudhury T. A deep learning-based efficient firearms monitoring technique for building secure smart cities. IEEE Access. 2023;11:37515\u201324.","journal-title":"IEEE Access"},{"key":"1192_CR61","doi-asserted-by":"publisher","first-page":"3570","DOI":"10.1109\/ACCESS.2024.3349386","volume":"12","author":"L Meng","year":"2024","unstructured":"Meng L. The convolutional neural network text classification algorithm in the information management of smart tourism based on internet of things. IEEE Access. 2024;12:3570\u201380.","journal-title":"IEEE Access"},{"key":"1192_CR62","doi-asserted-by":"publisher","first-page":"95623","DOI":"10.1109\/ACCESS.2022.3204114","volume":"10","author":"A Pal","year":"2022","unstructured":"Pal A, Chowdhury A, Satakshi HS, Narman AC, Kumar M. Random partition based adaptive distributed kernelized SVM for big data. IEEE Access. 2022;10:95623\u201337.","journal-title":"IEEE Access"},{"key":"1192_CR63","doi-asserted-by":"publisher","first-page":"89791","DOI":"10.1109\/ACCESS.2023.3307512","volume":"11","author":"A Tarawneh","year":"2023","unstructured":"Tarawneh A, Alamri ES, Al-Saedi NN, Alauthman M, Hassanat AB. CTELC: a constant-time ensemble learning classifier based on KNN for big data. IEEE Access. 2023;11:89791\u2013802.","journal-title":"IEEE Access"},{"key":"1192_CR64","doi-asserted-by":"crossref","unstructured":"Kikuchi H, Ito S, Ikegami K, Shindo S. Diseases prediction from officially anonymized medical and healthcare big data. 2022 IEEE international conference on big data (Big Data), Osaka, Japan, 2022; pp. 1\u201311.","DOI":"10.1109\/BigData55660.2022.10075547"},{"key":"1192_CR65","doi-asserted-by":"publisher","first-page":"15917","DOI":"10.1109\/ACCESS.2024.3358196","volume":"12","author":"M Rhesa","year":"2024","unstructured":"Rhesa M, Revathi S. DBKNN and radial-ANFIS model for energy efficient wireless sensor network. IEEE Access. 2024;12:15917\u201329.","journal-title":"IEEE Access"},{"key":"1192_CR66","doi-asserted-by":"publisher","first-page":"25261","DOI":"10.1007\/s11042-023-16591-4","volume":"83","author":"R Soni","year":"2024","unstructured":"Soni R, Roy P, Nagwanshi KK. WKNN-FDCNN method for big data driven traffic flow prediction in ITS. Multimed Tools Appl. 2024;83:25261\u201386.","journal-title":"Multimed Tools Appl"},{"key":"1192_CR67","doi-asserted-by":"publisher","first-page":"106247","DOI":"10.1016\/j.bspc.2024.106247","volume":"94","author":"A Zamani","year":"2024","unstructured":"Zamani A, et al. Implementation of machine learning techniques with big data and IoT to create effective prediction models for health informatics. Biomed Signal Process Control. 2024;94:106247.","journal-title":"Biomed Signal Process Control"},{"issue":"10","key":"1192_CR68","doi-asserted-by":"publisher","first-page":"2727","DOI":"10.1109\/TSMC.2017.2700889","volume":"47","author":"S Ram\u00edrez-Gallego","year":"2017","unstructured":"Ram\u00edrez-Gallego S, Krawczyk B, Garc\u00eda S, Wo\u017aniak M, Ben\u00edtez JM, Herrera F. Nearest neighbor classification for high-speed big data streams using spark. IEEE Trans Syst, Man, Cybern Syst. 2017;47(10):2727\u201339.","journal-title":"IEEE Trans Syst, Man, Cybern Syst"},{"issue":"9","key":"1192_CR69","doi-asserted-by":"publisher","first-page":"2235","DOI":"10.3390\/en11092235","volume":"11","author":"Z Jiang","year":"2018","unstructured":"Jiang Z, Lin R, Yang F. A hybrid machine learning model for electricity consumer categorization using smart meter data. Energies. 2018;11(9):2235.","journal-title":"Energies"},{"key":"1192_CR70","doi-asserted-by":"publisher","first-page":"115293","DOI":"10.1016\/j.eswa.2021.115293","volume":"183","author":"A Shokrzade","year":"2021","unstructured":"Shokrzade A, Ramezani M, Tab FA, Mohammad MA. A novel extreme learning machine based kNN classification method for dealing with big data. Expert Syst Appl. 2021;183:115293.","journal-title":"Expert Syst Appl"},{"key":"1192_CR71","doi-asserted-by":"crossref","unstructured":"Mummoju P, Wolff A, Perdacher M, Plant C, B\u00f6hm C. Enhancing k-Means algorithm with tensor processing unit. 2022 IEEE international conference on big data (Big Data), Osaka, Japan, 2022; pp. 194\u2013200,","DOI":"10.1109\/BigData55660.2022.10020427"},{"key":"1192_CR72","doi-asserted-by":"publisher","first-page":"134446","DOI":"10.1109\/ACCESS.2023.3333753","volume":"11","author":"O Kenger","year":"2023","unstructured":"Kenger O, Kenger ZD, \u00d6zceylan E, Mrugalska B. Clustering of cities based on their smart performances: a comparative approach of fuzzy C-means, K-Means, and K-medoids. IEEE Access. 2023;11:134446\u201359.","journal-title":"IEEE Access"},{"key":"1192_CR73","doi-asserted-by":"crossref","unstructured":"Ichou S, Hammoudi S, Cuzzocrea A, Meziane A, Benna A. Towards Big Data Analytics over mobile user data using machine learning. 2023 IEEE international conference on big data (BigData), Sorrento, Italy, 2023; pp. 5365\u20135371.","DOI":"10.1109\/BigData59044.2023.10386730"},{"key":"1192_CR74","doi-asserted-by":"publisher","first-page":"76634","DOI":"10.1109\/ACCESS.2024.3404993","volume":"12","author":"N Zhang","year":"2024","unstructured":"Zhang N, Zhu L. Abnormal electricity consumption detection method for smart grid using fusion matrix completion and improved clustering algorithm. IEEE Access. 2024;12:76634\u201347.","journal-title":"IEEE Access"},{"key":"1192_CR75","doi-asserted-by":"crossref","unstructured":"Cascavilla G, Zwart R, Tamburri DA, Cuzzocrea A. Explaining IoT attacks: an effective and efficient semi-supervised learning framework. 2022 IEEE international conference on big data (Big Data), Osaka, Japan, 2022, pp. 5662\u20135671.","DOI":"10.1109\/BigData55660.2022.10020894"},{"key":"1192_CR76","doi-asserted-by":"crossref","unstructured":"Mao H. Research on short-term traffic flow prediction method based on improved extreme learning machine (ELM). In Proceedings of the 5th International Conference on Computer Information and Big Data Applications (CIBDA '24). NY, USA, 2024;1258\u20131261","DOI":"10.1145\/3671151.3671371"},{"issue":"6","key":"1192_CR77","doi-asserted-by":"publisher","first-page":"2337","DOI":"10.1109\/TNNLS.2017.2654357","volume":"29","author":"M Duan","year":"2018","unstructured":"Duan M, Li K, Liao X, Li K. A parallel multiclassification algorithm for big data using an extreme learning machine. IEEE Trans Neural Netw Learn Syst. 2018;29(6):2337\u201351.","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"1","key":"1192_CR78","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/TSMC.2017.2757029","volume":"50","author":"S Deng","year":"2020","unstructured":"Deng S, Wang B, Huang S, Yue C, Zhou J, Wang G. Self-adaptive framework for efficient stream data classification on storm. IEEE Trans Syst, Man, and Cybern Syst. 2020;50(1):123\u201336.","journal-title":"IEEE Trans Syst, Man, and Cybern Syst"},{"key":"1192_CR79","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1016\/j.neucom.2013.09.075","volume":"149","author":"J Xin","year":"2015","unstructured":"Xin J, Wang Z, Luxuan Q, Wang G. Elastic extreme learning machine for big data classification. Neurocomputing. 2015;149:464\u201371.","journal-title":"Neurocomputing"},{"key":"1192_CR80","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1007\/s42979-024-03435-7","volume":"5","author":"S Ahmad","year":"2024","unstructured":"Ahmad S. Intelligent crowd density classification using improved metaheuristics with transfer learning model on smart cities. SN Comput Sci. 2024;5:1064.","journal-title":"SN Comput Sci"},{"key":"1192_CR81","doi-asserted-by":"crossref","unstructured":"Talusan J, Mukhopadhyay A, Freudberg D, Dubey A. On designing day ahead and same day ridership level prediction models for City-Scale transit networks using noisy APC data. IEEE Intern. Conf. on Big Data (Big Data), Osaka, Japan, 2022; pp. 5598\u20135606.","DOI":"10.1109\/BigData55660.2022.10020390"},{"key":"1192_CR82","doi-asserted-by":"crossref","unstructured":"Cruz E, Munasinghe T. Exploring power outage prediction using weather and socioeconomic data in the southeastern part of the United States.\u00a02023 IEEE international conference on big data (BigData), Sorrento, Italy, 2023; pp. 6138\u20136142.","DOI":"10.1109\/BigData59044.2023.10386519"},{"issue":"2","key":"1192_CR83","doi-asserted-by":"publisher","DOI":"10.1145\/3591469","volume":"1","author":"X Zhou","year":"2023","unstructured":"Zhou X, Sun A, Liu Y, Zhang J, Miao C. SelfCF: a simple framework for self-supervised collaborative filtering. ACM Trans Recomm Syst. 2023;1(2): 9.","journal-title":"ACM Trans Recomm Syst"},{"issue":"9","key":"1192_CR84","doi-asserted-by":"publisher","DOI":"10.1145\/3597211","volume":"17","author":"S Jiang","year":"2023","unstructured":"Jiang S, He W, Cui L, Yonghui X, Liu L. Modeling long- and short-term user preferences via self-supervised learning for next POI recommendation. ACM Trans Knowl Discov Data. 2023;17(9): 125.","journal-title":"ACM Trans Knowl Discov Data"},{"issue":"8","key":"1192_CR85","doi-asserted-by":"publisher","DOI":"10.1145\/3673658","volume":"18","author":"M Li","year":"2024","unstructured":"Li M, Liu K, Liu H, Zhao Z, Ward TE, Xindong W. Heterogeneous meta-path graph learning for higher-order social recommendation. ACM Trans Knowl Discov Data. 2024;18(8): 197.","journal-title":"ACM Trans Knowl Discov Data"},{"key":"1192_CR86","doi-asserted-by":"crossref","unstructured":"Sang L, Liu M, Zhang Y, Huang Y, Zhang Y. Bi-directional transfer graph contrastive learning for social recommendation. In\u00a0IEEE Transactions on Big Data, 2025.","DOI":"10.1109\/TBDATA.2024.3387340"},{"issue":"6","key":"1192_CR87","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1109\/TBDATA.2024.3453761","volume":"10","author":"D Du","year":"2024","unstructured":"Du D, Lai P-Y, Wang Y-F, Liao D-Z, Chen M. AKGNN: attribute knowledge graph neural networks recommendation for corporate volunteer activities. IEEE Trans Big Data. 2024;10(6):720\u201330.","journal-title":"IEEE Trans Big Data"},{"issue":"6","key":"1192_CR88","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.14778\/3447689.3447704","volume":"14","author":"J Gao","year":"2021","unstructured":"Gao J, Chen J, Li Z, Zhang J. ICS-GNN: lightweight interactive community search via graph neural network. Proc VLDB Endow. 2021;14(6):1006\u201318. https:\/\/doi.org\/10.14778\/3447689.3447704.","journal-title":"Proc VLDB Endow"},{"issue":"3","key":"1192_CR89","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/3572403","volume":"17","author":"Y Yang","year":"2023","unstructured":"Yang Y, Yang R, Li Y, Cui K, Yang Z, Wang Y, Jie X, Xie H. RoSGAS: adaptive social bot detection with reinforced self-supervised GNN architecture search. ACM Trans Web. 2023;17(3):15.","journal-title":"ACM Trans Web"},{"issue":"2","key":"1192_CR90","doi-asserted-by":"publisher","DOI":"10.1145\/3698193","volume":"43","author":"D Zhang","year":"2025","unstructured":"Zhang D, Zheng S, Zhu Y, Yuan H, Gong J, Tang J. MCAP: low-pass GNNs with matrix completion for academic recommendations. ACM Trans Inf Syst. 2025;43(2): 33.","journal-title":"ACM Trans Inf Syst"},{"issue":"2","key":"1192_CR91","doi-asserted-by":"publisher","DOI":"10.1145\/3711666","volume":"3","author":"Z Liu","year":"2025","unstructured":"Liu Z, Wang C, Zheng S, Cheng W, Zheng K, Song Y, Mou N. Pone-GNN: integrating positive and negative feedback in graph neural networks for recommender systems. ACM Trans Recomm Syst. 2025;3(2): 25.","journal-title":"ACM Trans Recomm Syst"},{"issue":"3","key":"1192_CR92","doi-asserted-by":"publisher","first-page":"715","DOI":"10.14778\/3712221.3712237","volume":"18","author":"W Fan","year":"2024","unstructured":"Fan W, Fan L, Lin D, Xie M. Explaining GNN-based recommendations in logic. Proc VLDB Endow. 2024;18(3):715\u201328.","journal-title":"Proc VLDB Endow"},{"issue":"3","key":"1192_CR93","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.1109\/TII.2021.3091435","volume":"18","author":"Y-H Chen","year":"2022","unstructured":"Chen Y-H, Huang L, Wang C-D, Lai J-H. Hybrid-order gated graph neural network for session-based recommendation. IEEE Trans Industr Inf. 2022;18(3):1458\u201367.","journal-title":"IEEE Trans Industr Inf"},{"key":"1192_CR94","doi-asserted-by":"crossref","unstructured":"Khaled S, El-Tazi N, Mokhtar HMO. Detecting fake accounts on social media.\u00a02018 ieee international conference on big data (Big Data), Seattle, WA, USA, 2018;pp. 3672\u20133681.","DOI":"10.1109\/BigData.2018.8621913"},{"key":"1192_CR95","doi-asserted-by":"publisher","first-page":"99339","DOI":"10.1109\/ACCESS.2023.3313169","volume":"11","author":"B Aditya","year":"2023","unstructured":"Aditya B, Mohanty SN. Heterogenous social media analysis for efficient deep learning fake-profile identification. IEEE Access. 2023;11:99339\u201351.","journal-title":"IEEE Access"},{"key":"1192_CR96","doi-asserted-by":"publisher","first-page":"161203","DOI":"10.1109\/ACCESS.2024.3488081","volume":"12","author":"C Xin","year":"2024","unstructured":"Xin C, Zakaria LQ. Integrating bert with CNN and BiLSTM for explainable detection of depression in social media contents. IEEE Access. 2024;12:161203\u201312.","journal-title":"IEEE Access"},{"key":"1192_CR97","doi-asserted-by":"crossref","unstructured":"Kanavos A, Vonitsanos G, Mylonas P. Clustering high-dimensional social media datasets utilizing graph mining.\u00a02022 IEEE international conference on big data (Big Data), Osaka, Japan, 2022; pp. 3871\u20133880.","DOI":"10.1109\/BigData55660.2022.10020692"},{"key":"1192_CR98","doi-asserted-by":"crossref","unstructured":"Wu J, Teng E, Cao Z. Twitter Bot detection through unsupervised machine learning.\u00a02022 IEEE international conference on big data (Big Data), Osaka, Japan, 2022; pp. 5833\u20135839.","DOI":"10.1109\/BigData55660.2022.10020983"},{"key":"1192_CR99","doi-asserted-by":"crossref","unstructured":"Zarzour H, Al-Sharif Z, Al-Ayyoub M, Jararweh Y. A new collaborative filtering recommendation algorithm based on dimensionality reduction and clustering techniques. IEEE Intern. Conference on Information and Communication Systems (ICICS), 2018; pp: 102\u2013106.","DOI":"10.1109\/IACS.2018.8355449"},{"issue":"1","key":"1192_CR100","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.jdec.2022.08.006","volume":"1","author":"Y Li","year":"2022","unstructured":"Li Y, Lin Z, Xiao S. Using social media big data for tourist demand forecasting: a new machine learning analytical approach. J Digit Econ. 2022;1(1):32\u201343.","journal-title":"J Digit Econ"},{"key":"1192_CR101","doi-asserted-by":"crossref","unstructured":"Thangamani R, Vimaladevi M, Mohammed Rifath J, Harini G, Hari S. Fake social media detection using machine learning.\u00a02024 15th International conference on computing communication and networking technologies (ICCCNT), Kamand, India, 2024, pp. 1\u20138","DOI":"10.1109\/ICCCNT61001.2024.10725280"},{"key":"1192_CR102","doi-asserted-by":"publisher","first-page":"19512","DOI":"10.1109\/ACCESS.2023.3248506","volume":"11","author":"F Anzum","year":"2023","unstructured":"Anzum F, Gavrilova ML. Emotion detection from micro-blogs using novel input representation. IEEE Access. 2023;11:19512\u201322.","journal-title":"IEEE Access"},{"key":"1192_CR103","doi-asserted-by":"crossref","unstructured":"Tekumalla R, Banda J. An empirical study on characterizing natural disasters in class imbalanced social media data using weak supervision. 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 2022; pp. 4824\u20134832.","DOI":"10.1109\/BigData55660.2022.10020594"},{"key":"1192_CR104","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.knosys.2018.10.019","volume":"164","author":"A Fern\u00e1ndez-Garc\u00edaa","year":"2018","unstructured":"Fern\u00e1ndez-Garc\u00edaa A, Iribarne L, Corral A, Criado J, Wang JZ. A recommender system for component-based applications using machine learning techniques. Knowl-Based Syst. 2018;164:68\u201384.","journal-title":"Knowl-Based Syst"},{"key":"1192_CR105","doi-asserted-by":"crossref","unstructured":"Assefi M, Behravesh E, Liu G, Tafti AP. Big data machine learning using apache spark MLlib.\u00a02017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 2017, pp. 3492\u20133498.","DOI":"10.1109\/BigData.2017.8258338"},{"issue":"8","key":"1192_CR106","doi-asserted-by":"publisher","first-page":"3229","DOI":"10.1007\/s13369-016-2410-1","volume":"42","author":"A Sattar","year":"2017","unstructured":"Sattar A, Ghazanfar MA, Iqbal M. Building accurate and practical recommender system algorithms using machine learning classifier and collaborative filtering. Arab J Sci Eng. 2017;42(8):3229\u201347.","journal-title":"Arab J Sci Eng"},{"key":"1192_CR107","doi-asserted-by":"crossref","unstructured":"Oshnoudi A, Neysiani BS, Nemaakhsh N. Improving recommender systems performances using user dimension expansion by Movies\u2019Genres and voting-based ensemble machine learning technique. 7th Intern. Conf. on Web Research (ICWR), 2021; pp. 175\u2013181","DOI":"10.1109\/ICWR51868.2021.9443146"},{"key":"1192_CR108","doi-asserted-by":"publisher","first-page":"114820","DOI":"10.1109\/ACCESS.2024.3445533","volume":"12","author":"C Yang","year":"2024","unstructured":"Yang C, Wu L, Xu J, Ren Y, Tian B, Wei Z. Graph learning framework for data link anomaly detection. IEEE Access. 2024;12:114820\u20138.","journal-title":"IEEE Access"},{"issue":"3","key":"1192_CR109","doi-asserted-by":"publisher","DOI":"10.1145\/3550299","volume":"6","author":"H Haresamudram","year":"2022","unstructured":"Haresamudram H, Essa I, Pl\u00f6tz T. Assessing the state of self-supervised human activity recognition using wearables. Proc ACM Interact Mob Wearable Ubiquitous Technol. 2022;6(3): 116.","journal-title":"Proc ACM Interact Mob Wearable Ubiquitous Technol"},{"issue":"1","key":"1192_CR110","volume":"20","author":"X Lou","year":"2023","unstructured":"Lou X, Tinghui W, Haifeng H, Chen D. Self-supervised consistency based on joint learning for unsupervised person re-identification. ACM Trans Multimedia Comput Commun Appl. 2023;20(1): 27.","journal-title":"ACM Trans Multimedia Comput Commun Appl"},{"issue":"3","key":"1192_CR111","doi-asserted-by":"publisher","DOI":"10.1145\/3665795","volume":"19","author":"O Tunde-Onadele","year":"2024","unstructured":"Tunde-Onadele O, Lin Y, Gu X, He J, Latapie H. Self-supervised machine learning framework for online container security attack detection. ACM Trans Auton Adapt Syst. 2024;19(3): 16.","journal-title":"ACM Trans Auton Adapt Syst"},{"issue":"3","key":"1192_CR112","volume":"41","author":"T Toan Nguyen","year":"2023","unstructured":"Toan Nguyen T, Quach NDK, Nguyen TT, Huynh TT, Vu VH, Nguyen PL, Jo J, Nguyen QVH. Poisoning GNN-based recommender systems with generative surrogate-based attacks. ACM Trans Inf Syst. 2023;41(3): 58.","journal-title":"ACM Trans Inf Syst"},{"issue":"6","key":"1192_CR113","volume":"14","author":"L Shuaiyi","year":"2023","unstructured":"Shuaiyi L, Wang K, Wei Y, Liu H, Fan Q, Wang B. GNN-based advanced feature integration for ICS anomaly detection. ACM Trans Intell Syst Technol. 2023;14(6): 106.","journal-title":"ACM Trans Intell Syst Technol"},{"issue":"1","key":"1192_CR114","doi-asserted-by":"crossref","DOI":"10.1145\/3655631","volume":"16","author":"G Medda","year":"2024","unstructured":"Medda G, Fabbri F, Marras M, Boratto L, Fenu G. GNNUERS: fairness explanation in GNNs for recommendation via counterfactual reasoning. ACM Trans Intell Syst Technol. 2024;16(1): 6.","journal-title":"ACM Trans Intell Syst Technol"},{"key":"1192_CR115","doi-asserted-by":"publisher","DOI":"10.1145\/3672401","author":"J Wen","year":"2024","unstructured":"Wen J, Jiang N, Li L, Zhou J, Li Y, Zhan H, Kou G, Weihao G, Zhao J. TA-detector: a GNN-based anomaly detector via trust relationship. ACM Trans Multimedia Comput Commun Appl Just Accept. 2024. https:\/\/doi.org\/10.1145\/3672401.","journal-title":"ACM Trans Multimedia Comput Commun Appl Just Accept"},{"issue":"4","key":"1192_CR116","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TBDATA.2021.3132672","volume":"8","author":"N Jiang","year":"2022","unstructured":"Jiang N, Duan F, Chen H, Huang W, Liu X. MAFI: GNN-based multiple aggregators and feature interactions network for fraud detection over heterogeneous graph. IEEE Trans Big Data. 2022;8(4):905\u201319.","journal-title":"IEEE Trans Big Data"},{"issue":"6","key":"1192_CR117","doi-asserted-by":"publisher","first-page":"7555","DOI":"10.1109\/TCSS.2024.3403503","volume":"11","author":"C Xiao","year":"2024","unstructured":"Xiao C, Pang S, Xu X, Li X, Trajcevski G, Zhou F. Counterfactual data augmentation with denoising diffusion for graph anomaly detection. IEEE Trans Comput Soc Syst. 2024;11(6):7555\u201367.","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1192_CR118","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2024.3505052","author":"Y Cao","year":"2025","unstructured":"Cao Y, Meng F, Shang X, Gui J, Tang YY. A privacy-preserving large-scale image retrieval framework with vision GNN hashing. IEEE Trans Big Data. 2025. https:\/\/doi.org\/10.1109\/TBDATA.2024.3505052.","journal-title":"IEEE Trans Big Data"},{"issue":"4","key":"1192_CR119","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/TBDATA.2024.3352978","volume":"10","author":"X Hu","year":"2024","unstructured":"Hu X, et al. GAT-COBO: cost-sensitive graph neural network for telecom fraud detection. IEEE Trans Big Data. 2024;10(4):528\u201342.","journal-title":"IEEE Trans Big Data"},{"issue":"4","key":"1192_CR120","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1109\/TBDATA.2023.3234529","volume":"9","author":"P Li","year":"2023","unstructured":"Li P, Yu H, Luo X, Wu J. LGM-GNN: a local and global aware memory-based graph neural network for fraud detection. IEEE Trans Big Data. 2023;9(4):1116\u201327.","journal-title":"IEEE Trans Big Data"},{"key":"1192_CR121","doi-asserted-by":"crossref","unstructured":"Singh A, Negi R, Handa A, Shukla SK. Monitoring application behaviours to detect android malware. 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Abu Dhabi, United Arab Emirates, 2023, pp. 0878-0885","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361467"},{"key":"1192_CR122","doi-asserted-by":"publisher","first-page":"110184","DOI":"10.1016\/j.asoc.2023.110184","volume":"138","author":"Y Wang","year":"2023","unstructured":"Wang Y, Zhang H, Wei Y, Wang H, Peng Y, Bin Z, Li W. An evolutionary computation-based machine learning for network attack detection in big data traffic. Appl Soft Comput. 2023;138:110184.","journal-title":"Appl Soft Comput"},{"key":"1192_CR123","doi-asserted-by":"publisher","first-page":"3405","DOI":"10.1007\/s10586-022-03569-4","volume":"25","author":"S Aurangzeb","year":"2022","unstructured":"Aurangzeb S, Anwar H, Naeem MA, et al. BigRC-EML: big-data based ransomware classification using ensemble machine learning. Cluster Comput. 2022;25:3405\u201322.","journal-title":"Cluster Comput"},{"key":"1192_CR124","doi-asserted-by":"crossref","unstructured":"Peng Y, Lu Y-T, Chen Z-G. An improved error-based pruning algorithm of decision trees on large data sets.\u00a02021 IEEE 6th International Conference on Big Data Analytics (ICBDA), Xiamen, China, 2021; pp. 33\u201337.","DOI":"10.1109\/ICBDA51983.2021.9403001"},{"key":"1192_CR125","doi-asserted-by":"publisher","first-page":"101037","DOI":"10.1016\/j.measen.2024.101037","volume":"32","author":"A Hossain","year":"2024","unstructured":"Hossain A, Islam S. Enhancing DDoS attack detection with hybrid feature selection and ensemble-based classifier: a promising solution for robust cybersecurity. Meas Sens. 2024;32:101037.","journal-title":"Meas Sens"},{"issue":"1","key":"1192_CR126","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1109\/JIOT.2023.3289935","volume":"11","author":"Z Shen","year":"2024","unstructured":"Shen Z, Li S, Zhao X, Zou J. IncreAuth: incremental-learning-based behavioral biometric authentication on smartphones. IEEE Internet Things J. 2024;11(1):1589\u2013603.","journal-title":"IEEE Internet Things J"},{"key":"1192_CR127","doi-asserted-by":"publisher","first-page":"66212","DOI":"10.1109\/ACCESS.2023.3290613","volume":"11","author":"H Xu","year":"2023","unstructured":"Xu H, Sun L, Fan G, Li W, Kuang G. A hierarchical intrusion detection model combining multiple deep learning models with attention mechanism. IEEE Access. 2023;11:66212\u201326.","journal-title":"IEEE Access"},{"issue":"11","key":"1192_CR128","doi-asserted-by":"publisher","first-page":"4664","DOI":"10.1109\/TSMC.2018.2858778","volume":"50","author":"R D\u00edaz-Morales","year":"2020","unstructured":"D\u00edaz-Morales R, Navia-V\u00e1zquez \u00c1. Distributed nonlinear semiparametric support vector machine for big data applications on spark frameworks. IEEE Trans Syst Man, Cybern Syst. 2020;50(11):4664\u201375.","journal-title":"IEEE Trans Syst Man, Cybern Syst"},{"issue":"2","key":"1192_CR129","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/3495164","volume":"13","author":"Y He","year":"2022","unstructured":"He Y, Ye X, Huang JZ, Fournier-Viger P. Bayesian attribute bagging-based extreme learning machine for high-dimensional classification and regression. ACM Trans Intell Syst Technol. 2022;13(2):30.","journal-title":"ACM Trans Intell Syst Technol"},{"key":"1192_CR130","doi-asserted-by":"publisher","first-page":"9313","DOI":"10.1007\/s10489-024-05673-x","volume":"54","author":"G Yang","year":"2024","unstructured":"Yang G, Wu J, Wang L, et al. A novel fusion feature imageization with improved extreme learning machine for network anomaly detection. Appl Intell. 2024;54:9313\u201329.","journal-title":"Appl Intell"},{"key":"1192_CR131","doi-asserted-by":"publisher","first-page":"7269","DOI":"10.1007\/s40747-023-01118-z","volume":"9","author":"N Bacanin","year":"2023","unstructured":"Bacanin N, Zivkovic M, Antonijevic M, et al. Addressing feature selection and extreme learning machine tuning by diversity-oriented social network search: an application for phishing websites detection. Complex Intell Syst. 2023;9:7269\u2013304.","journal-title":"Complex Intell Syst"},{"key":"1192_CR132","doi-asserted-by":"publisher","first-page":"4036","DOI":"10.1109\/TASLP.2024.3451951","volume":"32","author":"C Gong","year":"2024","unstructured":"Gong C, Wang X, Cooper E, Wells D, Wang L, Dang J, Richmond K, Yamagishi J. ZMM-TTS: zero-shot multilingual and multispeaker speech synthesis conditioned on self-supervised discrete speech representations. IEEE\/ACM Trans Audio Speech Lang Proc. 2024;32:4036\u201351.","journal-title":"IEEE\/ACM Trans Audio Speech Lang Proc"},{"key":"1192_CR133","doi-asserted-by":"crossref","unstructured":"Dai Y, Zhang B, Wang S. Distantly supervised biomedical relation extraction via negative learning and noisy student self-training. In\u00a0IEEE\/ACM Transactions on Computational Biology and Bioinformatics, 2024;21(6): 1697\u20131708","DOI":"10.1109\/TCBB.2024.3412174"},{"issue":"5","key":"1192_CR134","doi-asserted-by":"publisher","DOI":"10.1145\/3571736","volume":"17","author":"Y Chen","year":"2023","unstructured":"Chen Y, Rao Y, Chen S, Lei Z, Xie H, Lau RYK, Yin J. Semi-supervised sentiment classification and emotion distribution learning across domains. ACM Trans Knowl Discov Data. 2023;17(5): 74.","journal-title":"ACM Trans Knowl Discov Data"},{"issue":"4","key":"1192_CR135","doi-asserted-by":"publisher","DOI":"10.1145\/3648612","volume":"42","author":"S Li","year":"2024","unstructured":"Li S, Yuan G, Yang M, Shen Y, Li C, Ruifeng X, Zhao X. Improving semi-supervised text classification with dual meta-learning. ACM Trans Inf Syst. 2024;42(4): 109.","journal-title":"ACM Trans Inf Syst"},{"issue":"5","key":"1192_CR136","doi-asserted-by":"publisher","DOI":"10.1145\/3678179","volume":"15","author":"M La Quatra","year":"2024","unstructured":"La Quatra M, Gallipoli G, Cagliero L. Self-supervised text style transfer using cycle-consistent adversarial networks. ACM Trans Intell Syst Technol. 2024;15(5): 110.","journal-title":"ACM Trans Intell Syst Technol"},{"issue":"2","key":"1192_CR137","doi-asserted-by":"publisher","DOI":"10.1145\/3707449","volume":"43","author":"Q Zhang","year":"2025","unstructured":"Zhang Q, Zheng M, Chen S, Liu H, Fang M. Self Data augmentation for open domain question answering. ACM Trans Inf Syst. 2025;43(2): 51.","journal-title":"ACM Trans Inf Syst"},{"issue":"1","key":"1192_CR138","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1109\/TCSS.2023.3263056","volume":"11","author":"M Li","year":"2024","unstructured":"Li M, Sun X, Wang M. Detecting depression with heterogeneous graph neural network in clinical interview transcript. IEEE Trans Comput Soc Syst. 2024;11(1):1315\u201324.","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1192_CR139","doi-asserted-by":"publisher","first-page":"23147","DOI":"10.1007\/s10489-023-04679-1","volume":"53","author":"C Kumar","year":"2023","unstructured":"Kumar C, Abuzar M, Kumar M. MGU-GNN: minimal gated unit based graph neural network for session-based recommendation. Appl Intell. 2023;53:23147\u201365.","journal-title":"Appl Intell"},{"key":"1192_CR140","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/s11280-022-01116-0","volume":"26","author":"S Benslimane","year":"2023","unstructured":"Benslimane S, Az\u00e9 J, Bringay S, et al. A text and GNN based controversy detection method on social media. World Wide Web. 2023;26:799\u2013825.","journal-title":"World Wide Web"},{"key":"1192_CR141","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1038\/s41598-024-83535-9","volume":"15","author":"P Li","year":"2025","unstructured":"Li P, Fu X, Chen J, et al. CoGraphNet for enhanced text classification using word-sentence heterogeneous graph representations and improved interpretability. Sci Rep. 2025;15:356.","journal-title":"Sci Rep"},{"key":"1192_CR142","doi-asserted-by":"crossref","unstructured":"Narkhede A, Patharkar D, Chavan N, Agrawal R, Dhule C. Fake news detection using machine learning algorithm.\u00a02023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI), Greater Noida, India, 2023; pp. 166\u2013170.","DOI":"10.1109\/ICCSAI59793.2023.10421153"},{"issue":"8","key":"1192_CR143","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0255419","volume":"16","author":"D Debao","year":"2021","unstructured":"Debao D, Yinxia M. Analysis of big data job requirements based on K-Means text clustering in China. PLoS ONE. 2021;16(8): e0255419.","journal-title":"PLoS ONE"},{"issue":"7","key":"1192_CR144","doi-asserted-by":"publisher","first-page":"7151","DOI":"10.1109\/TITS.2023.3339772","volume":"25","author":"M Chen","year":"2024","unstructured":"Chen M, Yuan Q, Yang C, Zhang Y. Decoding Urban mobility: application of natural language processing and machine learning to activity pattern recognition, prediction, and temporal transferability examination. IEEE Trans Intell Transp Syst. 2024;25(7):7151\u201373.","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1192_CR145","doi-asserted-by":"crossref","unstructured":"Wangwiwattana C, Tongvivat Y, Semi-automatic short answers clustering and grading with K-Means and Keyword Matching algorithms.\u00a02022 6th International Conference on Information Technology (InCIT), Nonthaburi, Thailand, 2022; pp. 280\u2013284.","DOI":"10.1109\/InCIT56086.2022.10067412"},{"key":"1192_CR146","doi-asserted-by":"crossref","unstructured":"Almada A, Yu Q, Patel P. NLP K-Means Algorithm Incorporated into a Proactive Chatbot to Assist Failing Students.\u00a02022 International Conference on Intelligent Computing and Machine Learning (2ICML), Qingdao, China, 2023; pp. 24\u201330.","DOI":"10.1109\/2ICML58251.2022.00015"},{"key":"1192_CR147","doi-asserted-by":"crossref","unstructured":"Krishan P, Abri F. Classifying perceived emotions based on polarity of arousal and valence from sound events.\u00a02022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 2022; pp. 2849\u20132856.","DOI":"10.1109\/BigData55660.2022.10020353"},{"key":"1192_CR148","doi-asserted-by":"publisher","first-page":"71746","DOI":"10.1109\/ACCESS.2024.3402956","volume":"12","author":"C Ahmadi","year":"2024","unstructured":"Ahmadi C, Chen J-L, Lai Y-C. Enhancing cybersecurity with P-code analysis and XGBoost: a novel approach for malicious VBA macro detection in office documents. IEEE Access. 2024;12:71746\u201360.","journal-title":"IEEE Access"},{"key":"1192_CR149","doi-asserted-by":"crossref","unstructured":"Viswanathan V et al. MIMIC III Text classification with the generalization of BERT transformer model synergized with XGBoost classifier.\u00a014th Intern. Conference on Computing Communication and Networking Technologies (ICCCNT), Delhi, India, 2023;, pp. 1\u20136.","DOI":"10.1109\/ICCCNT56998.2023.10306707"},{"issue":"2","key":"1192_CR150","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1109\/TPAMI.2016.2544315","volume":"39","author":"A Barbu","year":"2017","unstructured":"Barbu A, She Y, Ding L, Gramajo G. Feature selection with annealing for computer vision and big data learning. IEEE Trans Pattern Anal Mach Intell. 2017;39(2):272\u201386.","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1192_CR151","doi-asserted-by":"publisher","first-page":"34512","DOI":"10.1109\/ACCESS.2024.3358422","volume":"12","author":"M Faseeh","year":"2024","unstructured":"Faseeh M, Khan MA, Iqbal N, Qayyum F, Mehmood A, Kim J. Enhancing user experience on Q&A platforms: measuring text similarity based on hybrid CNN-LSTM model for efficient duplicate question detection. IEEE Access. 2024;12:34512\u201326.","journal-title":"IEEE Access"},{"issue":"3","key":"1192_CR152","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1109\/TNNLS.2020.3036192","volume":"33","author":"Z Tan","year":"2022","unstructured":"Tan Z, Chen J, Kang Q, Zhou M, Abusorrah A, Sedraoui K. Dynamic embedding projection-gated convolutional neural networks for text classification. IEEE Trans Neural Netw Learn Syst. 2022;33(3):973\u201382.","journal-title":"IEEE Trans Neural Netw Learn Syst"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01192-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01192-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01192-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:03:19Z","timestamp":1750179799000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01192-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":152,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1192"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01192-9","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"3 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"150"}}