Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,003,237 papers from all fields of science
Search
Sign In
Create Free Account
Tokenization (data security)
Known as:
Token
, Tokenization
Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Adaptive Redaction
Atari BASIC
Big data
CAP theorem
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
DataStories at SemEval-2017 Task 4: Deep LSTM with Attention for Message-level and Topic-based Sentiment Analysis
Christos Baziotis
,
N. Pelekis
,
C. Doulkeridis
International Workshop on Semantic Evaluation
2017
Corpus ID: 26538892
In this paper we present two deep-learning systems that competed at SemEval-2017 Task 4 “Sentiment Analysis in Twitter”. We…
Expand
Highly Cited
2017
Highly Cited
2017
The Simpler The Better: A Unified Approach to Predicting Original Taxi Demands based on Large-Scale Online Platforms
Yongxin Tong
,
Yuqiang Chen
,
+5 authors
Weifeng Lv
Knowledge Discovery and Data Mining
2017
Corpus ID: 1286512
Taxi-calling apps are gaining increasing popularity for their efficiency in dispatching idle taxis to passengers in need. To…
Expand
Highly Cited
2014
Highly Cited
2014
Predicting crime using Twitter and kernel density estimation
M. Gerber
Decision Support Systems
2014
Corpus ID: 1669156
Review
2010
Review
2010
Book Reviews: Introduction to Arabic Natural Language Processing by Nizar Y. Habash
Nizar Habash
International Conference on Computational Logic
2010
Corpus ID: 62391688
Abstract This book provides system developers and researchers in natural language processing and computational linguistics with…
Expand
Highly Cited
2006
Highly Cited
2006
An Algorithm for Anomaly-based Botnet Detection
J. Binkley
,
Suresh Singh
Workshop on Steps to Reducing Unwanted Traffic on…
2006
Corpus ID: 13404255
We present an anomaly-based algorithm for detecting IRC-based botnet meshes. The algorithm combines an IRC mesh detection…
Expand
Review
2005
Review
2005
Pulse: Mining Customer Opinions from Free Text
Michael Gamon
,
Anthony Aue
,
Simon Corston-Oliver
,
Eric K. Ringger
International Symposium on Intelligent Data…
2005
Corpus ID: 18600000
We present a prototype system, code-named Pulse, for mining topics and sentiment orientation jointly from free text customer…
Expand
Highly Cited
2004
Highly Cited
2004
Automatic Tagging of Arabic Text: From Raw Text to Base Phrase Chunks
Mona T. Diab
,
K. Hacioglu
,
Dan Jurafsky
North American Chapter of the Association for…
2004
Corpus ID: 15202196
To date, there are no fully automated systems addressing the community's need for fundamental language processing tools for…
Expand
Highly Cited
2002
Highly Cited
2002
Approaches to language identification using Gaussian mixture models and shifted delta cepstral features
P. Torres-Carrasquillo
,
E. Singer
,
M. A. Kohler
,
Richard J. Greene
,
D. Reynolds
,
J. Deller
Interspeech
2002
Corpus ID: 7572673
Published results indicate that automatic language identification (LID) systems that rely on multiple-language phone recognition…
Expand
Highly Cited
2001
Highly Cited
2001
Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis
D. Song
,
S. Berezin
,
A. Perrig
Journal of computing and security
2001
Corpus ID: 6313952
We propose a new efficient automatic verification technique, Athena, for security protocol analysis. It uses a new efficient…
Expand
Highly Cited
1994
Highly Cited
1994
What is a word, What is a sentence? Problems of Tokenization
G. Grefenstette
,
P. Tapanainen
1994
Corpus ID: 22436434
Any linguistic treatment of freely occurring text must provide an answer to what is considered as a token. In arti(cid:12)cial…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE