default search action
Lisa Kaati
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c45]Amendra Shrestha, Lisa Kaati, Nazar Akrami:
Linguistic Alignments: Detecting Similarities in Language Use in Written Communication. ASONAM 2023: 619-623 - [c44]Amendra Shrestha, Lisa Kaati, Nazar Akrami, Kevin Lindén, Arvin Moshfegh:
Harmful Communication: Detection of Toxic Language and Threats on Swedish. ASONAM 2023: 624-630 - [c43]Lisa Kaati, Amendra Shrestha, Nazar Akrami:
General Risk Index : A Measure for Predicting Violent Behavior Through Written Communication. IEEE Big Data 2023: 4065-4070 - 2022
- [c42]Lisa Kaati, Amendra Shrestha, Nazar Akrami:
Predicting Targeted Violence from Social Media Communication. ASONAM 2022: 383-390 - [c41]Lisa Kaati, Amendra Shrestha, Nazar Akrami:
A Machine Learning Approach to Identify Toxic Language in the Online Space. ASONAM 2022: 396-402 - 2021
- [c40]Johan Fernquist, Björn Pelzer, Lukas Lundmark, Lisa Kaati, Fredrik Johansson:
Similarity ranking using handcrafted stylometric traits in a swedish context. ASONAM 2021: 635-642 - [c39]Amendra Shrestha, Nazar Akrami, Lisa Kaati, Julia Kupper, Matthew R. Schumacher:
Words of Suicide: Identifying Suicidal Risk in Written Communications. IEEE BigData 2021: 2144-2150 - 2020
- [c38]Amendra Shrestha, Nazar Akrami, Lisa Kaati:
Introducing Digital-7 Threat Assessment of Individuals in Digital Environments. ASONAM 2020: 720-726 - [c37]Lukas Lundmark, Fredrik Johansson, Björn Pelzer, Lisa Kaati, Johan Fernquist:
The Applicability of Authorship Verification to Swedish Discussion Forums. IEEE BigData 2020: 1805-1812
2010 – 2019
- 2019
- [c36]Tor Berglind, Björn Pelzer, Lisa Kaati:
Levels of hate in online environments. ASONAM 2019: 842-847 - [c35]Nazar Akrami, Johan Fernquist, Tim Isbister, Lisa Kaati, Björn Pelzer:
Automatic Extraction of Personality from Text: Challenges and Opportunities. IEEE BigData 2019: 3156-3164 - [c34]Johan Fernquist, Oskar Lindholm, Lisa Kaati, Nazar Akrami:
A Study on the Feasibility to Detect Hate Speech in Swedish. IEEE BigData 2019: 4724-4729 - [c33]Amendra Shrestha, Lisa Kaati, Nazar Akrami:
PRAT - a Tool for Assessing Risk in Written Communication. IEEE BigData 2019: 4755-4762 - [c32]Johan Fernquist, Ola Svenonius, Lisa Kaati, Fredrik Johansson:
Extracting Account Attributes for Analyzing Influence on Twitter. EISIC 2019: 62-69 - [i2]Nazar Akrami, Johan Fernquist, Tim Isbister, Lisa Kaati, Björn Pelzer:
Automatic Extraction of Personality from Text: Challenges and Opportunities. CoRR abs/1910.09916 (2019) - 2018
- [c31]Johan Fernquist, Lisa Kaati:
Online Monitoring of Large Events. EISIC 2018: 47-53 - [c30]Johan Fernquist, Lisa Kaati, Ralph Schroeder:
Political Bots and the Swedish General Election. ISI 2018: 124-129 - [c29]Björn Pelzer, Lisa Kaati, Nazar Akrami:
Directed Digital Hate. ISI 2018: 205-210 - [r2]Lisa Kaati:
Analysis and Mining of Tags, (Micro)Blogs, and Virtual Communities. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - [i1]Tim Isbister, Magnus Sahlgren, Lisa Kaati, Milan Obaidi, Nazar Akrami:
Monitoring Targeted Hate in Online Environments. CoRR abs/1803.04757 (2018) - 2017
- [c28]Amendra Shrestha, Lisa Kaati, Katie Cohen:
A Machine Learning Approach towards Detecting Extreme Adopters in Digital Communities. DEXA Workshops 2017: 1-5 - [c27]Tim Isbister, Lisa Kaati, Katie Cohen:
Gender Classification with Data Independent Features in Multiple Languages. EISIC 2017: 54-60 - [c26]Johan Fernquist, Torbjorn Fangstrom, Lisa Kaati:
IoT Data Profiles: The Routines of Your Life Reveals Who You Are. EISIC 2017: 61-67 - [c25]Lisa Kaati, Adam Ruul:
Interpretable Probabilistic Divisive Clustering of Large Node-Attributed Networks. EISIC 2017: 68-75 - [c24]Lisa Kaati, Elias Lundeqvist, Amendra Shrestha, Maria Svensson:
Author Profiling in the Wild. EISIC 2017: 155-158 - 2016
- [c23]Michael Ashcroft, Fredrik Johansson, Lisa Kaati, Amendra Shrestha:
Multi-domain Alias Matching Using Machine Learning. ENIC 2016: 77-84 - [c22]Lisa Kaati, Amendra Shrestha, Tony Sardella:
Identifying Warning Behaviors of Violent Lone Offenders in Written Communication. ICDM Workshops 2016: 1053-1060 - [c21]Leo Figea, Lisa Kaati, Ryan Scrivens:
Measuring online affects in a white supremacy forum. ISI 2016: 85-90 - [c20]Lisa Kaati, Amendra Shrestha, Katie Cohen, Sinna Lindquist:
Automatic detection of xenophobic narratives: A case study on Swedish alternative media. ISI 2016: 121-126 - 2015
- [j5]Fredrik Johansson, Lisa Kaati, Amendra Shrestha:
Timeprints for identifying social media users with multiple aliases. Secur. Informatics 4(1): 7 (2015) - [c19]Michael Ashcroft, Lisa Kaati, Maxime Meyer:
A Step Towards Detecting Online Grooming - Identifying Adults Pretending to be Children. EISIC 2015: 98-104 - [c18]Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, Nico Prucha:
Detecting Jihadist Messages on Twitter. EISIC 2015: 161-164 - [c17]Lisa Kaati, Enghin Omer, Nico Prucha, Amendra Shrestha:
Detecting Multipliers of Jihadism on Twitter. ICDM Workshops 2015: 954-960 - 2014
- [c16]Mohamed Faouzi Atig, Sofia Cassel, Lisa Kaati, Amendra Shrestha:
Activity profiles in online social media. ASONAM 2014: 850-855 - [c15]Fredrik Johansson, Lisa Kaati, Amendra Shrestha:
Time Profiles for Identifying Users in Online Environments. JISIC 2014: 83-90 - [r1]Lisa Kaati:
Analysis and Mining of Tags, (Micro)Blogs, and Virtual Communities. Encyclopedia of Social Network Analysis and Mining 2014: 19-25 - 2013
- [j4]Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, Pontus Svenson:
Harvesting and analysis of weak signals for detecting lone wolf terrorists. Secur. Informatics 2(1): 11 (2013) - [c14]Fredrik Johansson, Lisa Kaati, Amendra Shrestha:
Detecting multiple aliases in social media. ASONAM 2013: 1004-1011 - 2012
- [j3]Joel Brynielsson, Lisa Kaati, Pontus Svenson:
Social positions and simulation relations. Soc. Netw. Anal. Min. 2(1): 39-52 (2012) - [c13]Johan Dahlin, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, Pontus Svenson:
Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards. ASONAM 2012: 850-857 - [c12]Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, Pontus Svenson:
Analysis of Weak Signals for Detecting Lone Wolf Terrorists. EISIC 2012: 197-204 - [c11]Ala Berzinji, Lisa Kaati, Ahmed Rezine:
Detecting Key Players in Terrorist Networks. EISIC 2012: 297-302 - [c10]Johanna Björklund, Eric Jonsson, Lisa Kaati:
Aspects of plan operators in a tree automata framework. FUSION 2012: 1462-1467 - 2011
- [c9]Lisa Kaati, Pontus Svenson:
Analysis of Competing Hypothesis for Investigating Lone Wolf Terrorist. EISIC 2011: 295-299 - 2010
- [c8]Joel Brynielsson, Johanna Högberg, Lisa Kaati, Christian Mårtenson, Pontus Svenson:
Detecting Social Positions Using Simulation. ASONAM 2010: 48-55 - [c7]Johanna Högberg, Lisa Kaati:
Weighted unranked tree automata as a framework for plan recognition. FUSION 2010: 1-8 - [c6]Parosh Aziz Abdulla, Jonathan Cederberg, Lisa Kaati:
Analyzing the Security in the GSM Radio Network Using Attack Jungles. ISoLA (1) 2010: 60-74
2000 – 2009
- 2009
- [j2]Parosh Aziz Abdulla, Ahmed Bouajjani, Lukás Holík, Lisa Kaati, Tomás Vojnar:
Composed Bisimulation for Tree Automata. Int. J. Found. Comput. Sci. 20(4): 685-700 (2009) - 2008
- [b1]Lisa Kaati:
Reduction Techniques for Finite (Tree) Automata. Uppsala University, Sweden, 2008 - [c5]Parosh Aziz Abdulla, Ahmed Bouajjani, Lukás Holík, Lisa Kaati, Tomás Vojnar:
Computing Simulations over Tree Automata. TACAS 2008: 93-108 - [c4]Parosh Aziz Abdulla, Ahmed Bouajjani, Lukás Holík, Lisa Kaati, Tomás Vojnar:
Composed Bisimulation for Tree Automata. CIAA 2008: 212-222 - [c3]Parosh Aziz Abdulla, Lukás Holík, Lisa Kaati, Tomás Vojnar:
A Uniform (Bi-)Simulation-Based Framework for Reducing Tree Automata. MEMICS 2008: 27-48 - 2007
- [j1]Parosh Aziz Abdulla, Johanna Högberg, Lisa Kaati:
Bisimulation Minimization of Tree Automata. Int. J. Found. Comput. Sci. 18(4): 699-713 (2007) - 2006
- [c2]Parosh Aziz Abdulla, Lisa Kaati, Johanna Högberg:
Bisimulation Minimization of Tree Automata. CIAA 2006: 173-185 - 2005
- [c1]Parosh Aziz Abdulla, Johann Deneux, Lisa Kaati, Marcus Nilsson:
Minimization of Non-deterministic Automata with Large Alphabets. CIAA 2005: 31-42
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint