Jovana Dobreva

Jovana Dobreva
Ss. Cyril and Methodius University in Skopje · Faculty of Computer Science and Engineering

About

11
Publications
1,911
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7
Citations
Citations since 2017
11 Research Items
7 Citations
201720182019202020212022202301234
201720182019202020212022202301234
201720182019202020212022202301234
201720182019202020212022202301234

Publications

Publications (11)
Article
Natural language processing (NLP) is an area of artificial intelligence that applies information technologies to process the human language, understand it to a certain degree, and use it in various applications. This area has rapidly developed in the last few years and now employs modern variants of deep neural networks to extract relevant patterns...
Preprint
Full-text available
Natural language processing (NLP) is an area of artificial intelligence that applies information technologies to process the human language, understand it to a certain degree, and use it in various applications. This area has rapidly developed in the last few years and now employs modern variants of deep neural networks to extract relevant patterns...
Chapter
Full-text available
Contextualized language models are becoming omnipresent in the field of Natural Language Processing (NLP). Their learning representation capabilities show dominant results in almost all downstream NLP tasks. The main challenge that low-resource languages face is the lack of language-specific language models since their pre-training process requires...
Chapter
Full-text available
Today, data security is a significant problem in data communication. Sometimes we do not realize how susceptible we are to cyberattacks and the theft of critical information, including everything, from social network passwords to complete identities. Any system, no matter how sophisticated it is, is vulnerable and susceptible to attack. Steganograp...
Chapter
Nowadays, people are not aware of how vulnerable they are to cyber-attacks and theft of personal and sensitive information, from stealing social media passwords to stealing a person’s full identity. People are not aware that their communication with the outside world can be intercepted and all sensitive and secret information stolen from them, whil...
Conference Paper
Full-text available
This research aims to analyse the terminology and topics that social networks users used to express their experiences with the COVID-19 pandemic. We used three datasets concerning different aspects of the COVID-19 pandemic to accomplish this goal. The first dataset is the smallest one and contains around 3,798 tweets regarding COVID-19 Onset, and i...
Chapter
Drug repurposing, which is concerned with the study of the effectiveness of existing drugs on new diseases, has been growing in importance in the last few years. One of the core methodologies for drug repurposing is text-mining, where novel biological entity relationships are extracted from existing biomedical literature and publications, whose num...
Article
Full-text available
Giving the right access, limiting resources, and recognizing a user's identity are important steps that need to be taken into consideration before entering a certain network. These steps are executed by authentication and authorization. In this paper, we put our focus on authentication algorithms HOTP and TOTP as two algorithms for generating one-t...
Chapter
Analyzing long text articles in the pharmaceutical domain, for the purpose of knowledge extraction and recognizing entities of interest, is a tedious task. In our previous research efforts, we were able to develop a platform which successfully extracts entities and facts from pharmaceutical texts and populates a knowledge graph with the extracted k...
Conference Paper
Full-text available
The usage of machine learning is expanding over all scientific fields and this branch is becoming more and more popular in the last years. In this paper we consider application of machine learning in the cryptanalysis, precisely in cryptanalysis of DES algorithm. This algorithm works in 16 rounds and we make two analyses: one for only one round and...

Network

Cited By