References:
[1] A. C. Graesser, S. D’Mello, X. Hu, Z. Cai, A. Olney, and B. Morgan, ”AutoTutor,” in Applied natural language processing: Identification, investigation and resolution : IGI Global, 2012, pp. 169-187.
[2] M. Ahmadi, ”Hidden fear: Evaluating the effectiveness of messages on social media,” Arizona State University, 2020.
[3] M. Mousavi, H. Davulcu, M. Ahmadi, R. Axelrod, R. Davis, and S. Atran, ”Effective Messaging on Social Media: What Makes Online Content Go Viral?,” in Proceedings of the ACM Web Conference 2022 , 2022, pp. 2957-2966.
[4] P. Hajibabaee et al. , ”Offensive language detection on social media based on text classification,” in 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) , 2022: IEEE, pp. 0092-0098.
[5] M. Ahmadi and B. S. Ghahfarokhi, ”Preserving privacy in location based mobile coupon systems using anonymous authentication scheme,” in2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC) , 2016: IEEE, pp. 60-65.
[6] N. Mazher and I. Ashraf, ”A Survey on data security models in cloud computing,” International Journal of Engineering Research and Applications (IJERA), vol. 3, no. 6, pp. 413-417, 2013.
[7] M. G. K. Sriram, ”SECURITY CHALLENGES OF BIG DATA COMPUTING.”