Εκπαίδευση - Σπουδές

Διδακτορική Διατριβή, Επαλήθευση Συγγραφέα (Επιβλέπων καθηγητής, Σταματάτος Ευστάθιος).

Μεταπτυχιακό, Τεχνολογίες και Διαχείριση Πληροφοριακών και Επικοινωνιακών Συστημάτων, Τμήμα Μηχανικών Πληροφοριακών
& Επικοινωνιακών Συστημάτων, Πανεπιστήμιο Αιγαίου.

Πτυχίο Φυσικής, Τμήμα Φυσικής, Πανεπιστήμιο Ιωαννίνων.

Ερευνητικά Ενδιαφέροντα

Εξόρυξη κειμένων
Ευφυής ανάκτηση πληροφορίας
Επεξεργασία φυσικής γλώσσας
Μηχανική μάθηση

Διδασκαλία

Φροντιστήριο του μαθήματος "Φυσική" (Α' Εξάμηνο)

Φροντιστήριο του μαθήματος "Πιθανότητες και Στατιστική" (Β'Εξάμηνο)

Δημοσιεύσεις σε Διεθνή Περιοδικά (Journals)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


[1]
N. Potha, Improved Algorithms for Extrinsic Author Verification, Knowledge and Information Systems, 2019, Knowledge and Information Systems, Springer. ,
[2]
N. Potha, E. Stamatatos, Improving author verification based on topic modeling, Journal of the Association for Information Science and Technology , Vol. 70, No. 10, pp. 1074-1088, 2019, Wiley Online Library, https://doi.org/10.1002/asi.24183
[3]
N. Potha, M. Maragoudakis, D. Lyras, A Biology-Inspired, Data Mining Framework for Extracting Patterns in Sexual Cyberbullying Data, Knowledge-Based Systems, 2016, Elsevier, (to_appear), http://dx.doi.org/10.1016/j.knosys...., indexed in SCI-E, IF = 2.947

Επιστημονικά Συνέδρια (Conferences)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


N. Potha, E. Stamatatos, Dynamic Ensemble Selection for Author Verification, 41st European Conference on Information Retrieval (ECIR), pp. 102-115, Apr, 2019, Germany, Springer, http://dx.doi.org/10.1007/978-3-030...
 

Abstract
Author verification is a fundamental task in authorship analysis and associated with significant applications in humanities, cyber-security, and social media analytics. In some of the relevant studies, there is evidence that heterogeneous ensembles can provide very reliable solutions, better than any individual verification model. However, there is no systematic study of examining the application of ensemble methods in this task. In this paper, we start from a large set of base verification models covering the main paradigms in this area and study how they can be combined to build an accurate ensemble. We propose a simple stacking ensemble as well as a dynamic ensemble selection approach that can use the most reliable base models for each verification case separately. The experimental results in ten benchmark corpora covering multiple languages and genres verify the suitability of ensembles for this task and demonstrate the effectiveness of our method, in some cases improving the best reported results by more than 10%.

N. Potha, E. Stamatatos, Intrinsic Author Verification Using Topic Modeling, 10th Hellenic Conference on Artificial Intelligence (SETN), Jul, 2018, Patras, Greece, ACM, https://doi.org/10.1145/3200947.320...
 

Abstract
Author verification is a fundamental task in authorship analysis and associated with important applications in humanities and forensics. In this paper, we propose the use of an intrinsic profile-based verification method that is based on latent semantic indexing (LSI). Our proposed approach is easy-to-follow and language independent. Based on experiments using benchmark corpora from the PAN shared task in author verification, we demonstrate that LSI is both more effective and more stable than latent Dirichlet allocation in this task. Moreover, LSI models are able to outperform existing approaches especially when multiple texts of known authorship are available per verification instance and all documents belong to the same thematic area and genre. We also study several feature types and similarity measures to be combined with the proposed topic models.

N. Potha, E. Stamatatos, An Improved Impostors Method for Authorship Verification, CLEAF, Jones, G.J.F., Lawless, S., Gonzalo, J., Kelly, L., Goeuriot, L., Mandl, Th., Cappellato, L., Ferro, N. , (eds), pp. 138-144, Sep, 2017, Dublin, Ireland, Springer, Cham, https://doi.org/10.1007/978-3-319-6...
 

Abstract
Authorship verification has gained a lot of attention during the last years mainly due to the focus of PAN@CLEF shared tasks. A verification method called Impostors, based on a set of external (impostor) documents and a random subspace ensemble, is one of the most successful approaches. Variations of this method gained top-performing positions in recent PAN evaluation campaigns. In this paper, we propose a modification of the Impostors method that focuses on both appropriate selection of impostor documents and enhanced comparison of impostor documents with the documents under investigation. Our approach achieves competitive performance on PAN corpora, outperforming previous versions of the Impostors method.

[4]
N. Potha, M. Maragoudakis, Time Series Forecasting in Cyberbullying Data, 16th international conference on Engineering Applications of Neural Networks, EANN 2015, (eds), Dec, 2015, Rodos, Greece
[5]
N. Potha, E. Stamatatos, A Profile-based Method for Authorship Verification, 8th Hellenic Conference on Artificial Intelligence (SETN), pp. 313-326, Dec, 2014, Springer, http://dx.doi.org/10.1007/978-3-319...
N. Potha, M. Maragoudakis, Cyberbullying Detection using Time Series Modeling, IEEE ICDM 2014 - SENTIRE: 4th edition of Sentiment Elicitation from Natural Text for Information Retrieval and Extraction, (to_appear), Dec, 2014
 

Abstract
Cyberbullying is a new phenomenon resulting from the advance of new communication technologies including the Internet, cell phones and Personal Digital Assistants. It is a challenging bullying problem occurring in a new territory. Online bullying can be particularly damaging and upsetting because it's usually anonymous or hard to trace. In this paper, the proposed method is utilizing a dataset of real world conversations (i.e. pairs of questions and answers between cyber predator and the victim), in which each predator question is manually annotated in terms of severity using a numeric label. We approach the issue as a sequential data modelling approach, in which the predator’s questions are formulated using a Singular Value Decomposition representation. The motivation of this procedure is to study the accuracy of predicting the level of cyberbullying attack using classification methods and also to examine potential patterns between the lingustic style of each predator. More specifically, unlike previous approaches that consider a fixed window of a cyber-predator’s questions within a dialogue, we exploit the whole question set and model it as a signal, whose magnitude depends on the degree of bullying content. Using feature weighting and dimensionality reduction techniques, each signal is straightforwardly parsed by a neural network that forecasts the level of insult within a question given a window between two and three previous questions. Throughout the time series modeling experiments, an interesting discovery was made. By applying SVD on the time series data and taking into account the second dimension (since the first is usually modeling trivial dependencies between instances and attributes) we observed that its plot was very similar to the plot of the class attribute. By applying a Dynamic Time Warping algorithm, the similarity of the aforementioned signals was proved to exist, providing an immediate indicator for the severity of cyberbullying within a given dialogue.

Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Κεφάλαια σε Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Επιμέλεια Πρακτικών Διεθνών Συνεδρίων


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.