References:
[1] A. C. Graesser, S. D’Mello, X. Hu, Z. Cai, A. Olney, and B.
Morgan, ”AutoTutor,” in Applied natural language processing:
Identification, investigation and resolution : IGI Global, 2012, pp.
169-187.
[2] M. Ahmadi, ”Hidden fear: Evaluating the effectiveness of
messages on social media,” Arizona State University, 2020.
[3] M. Mousavi, H. Davulcu, M. Ahmadi, R. Axelrod, R. Davis, and S.
Atran, ”Effective Messaging on Social Media: What Makes Online Content
Go Viral?,” in Proceedings of the ACM Web Conference 2022 , 2022,
pp. 2957-2966.
[4] P. Hajibabaee et al. , ”Offensive language detection on
social media based on text classification,” in 2022 IEEE 12th
Annual Computing and Communication Workshop and Conference (CCWC) ,
2022: IEEE, pp. 0092-0098.
[5] M. Ahmadi and B. S. Ghahfarokhi, ”Preserving privacy in location
based mobile coupon systems using anonymous authentication scheme,” in2016 13th International Iranian Society of Cryptology Conference
on Information Security and Cryptology (ISCISC) , 2016: IEEE, pp. 60-65.
[6] N. Mazher and I. Ashraf, ”A Survey on data security models in
cloud computing,” International Journal of Engineering Research
and Applications (IJERA), vol. 3, no. 6, pp. 413-417, 2013.
[7] M. G. K. Sriram, ”SECURITY CHALLENGES OF BIG DATA COMPUTING.”