Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
The impact of COVID-19 pandemic to our society may be unprecedented. While an effective cure or vaccine is under development, maintaining social distance is an essential step in defending personal as well as public health. This study...
The advent of high-resolution magnetic resonance imaging (MRI) has enabled in vivo research in a variety of populations and diseases on the structure and function of hippocampal subfields and subdivisions of the parahippocampal gyrus....
CV19 SelfDefense is an mHealth approach to providing mobile phone users with situational awareness during the coronavirus pandemic, with the goal of protecting and defending personal health. Several individual risk reduction measures...
After publication of this supplement article [1], it was brought to our attention that the Results section of the abstract contained a partial sentence.
Computer-mediated deception threatens the security of online users’ private and personal information. Previous research confirms that humans are bad lie detectors, while demonstrating that certain observable linguistic features can...
Background: In the past few years, neural word embeddings have been widely used in text mining. However, the vector representations of word embeddings mostly act as a black box in downstream applications using them, thereby limiting...
Social media users have the freedom to propagate information, but this freedom has come with a price as social media has also become a channel to disseminate false information. It is thus vitally important to detect fake news in social...
In the past few years, neural word embeddings have been widely used in text mining. However, the vector representations of word embeddings mostly act as a black box in downstream applications using them, thereby limiting their...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.