Jovana Dobreva

Jovana Dobreva
Ss. Cyril and Methodius University in Skopje · Faculty of Computer Science and Engineering

About

16
Publications
4,593
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
26
Citations

Publications

Publications (16)
Article
Full-text available
Natural language processing (NLP) is an area of artificial intelligence that applies information technologies to process the human language, understand it to a certain degree, and use it in various applications. This area has rapidly developed in the last few years and now employs modern variants of deep neural networks to extract relevant patterns...
Article
Full-text available
With the rapid development of technology, the demand for mobile devices is increasing more than laptops, because their main features are large memory, great cameras, low price, and easy availability. Today, we keep too much information on our devices which is very important for our life with this there is possibility that our device has been stolen...
Preprint
Full-text available
Natural language processing (NLP) is an area of artificial intelligence that applies information technologies to process the human language, understand it to a certain degree, and use it in various applications. This area has rapidly developed in the last few years and now employs modern variants of deep neural networks to extract relevant patterns...
Chapter
Full-text available
Contextualized language models are becoming omnipresent in the field of Natural Language Processing (NLP). Their learning representation capabilities show dominant results in almost all downstream NLP tasks. The main challenge that low-resource languages face is the lack of language-specific language models since their pre-training process requires...
Chapter
Full-text available
Today, data security is a significant problem in data communication. Sometimes we do not realize how susceptible we are to cyberattacks and the theft of critical information, including everything, from social network passwords to complete identities. Any system, no matter how sophisticated it is, is vulnerable and susceptible to attack. Steganograp...
Chapter
Nowadays, people are not aware of how vulnerable they are to cyber-attacks and theft of personal and sensitive information, from stealing social media passwords to stealing a person’s full identity. People are not aware that their communication with the outside world can be intercepted and all sensitive and secret information stolen from them, whil...
Conference Paper
Full-text available
This research aims to analyse the terminology and topics that social networks users used to express their experiences with the COVID-19 pandemic. We used three datasets concerning different aspects of the COVID-19 pandemic to accomplish this goal. The first dataset is the smallest one and contains around 3,798 tweets regarding COVID-19 Onset, and i...
Chapter
Drug repurposing, which is concerned with the study of the effectiveness of existing drugs on new diseases, has been growing in importance in the last few years. One of the core methodologies for drug repurposing is text-mining, where novel biological entity relationships are extracted from existing biomedical literature and publications, whose num...
Article
Full-text available
Giving the right access, limiting resources, and recognizing a user's identity are important steps that need to be taken into consideration before entering a certain network. These steps are executed by authentication and authorization. In this paper, we put our focus on authentication algorithms HOTP and TOTP as two algorithms for generating one-t...
Chapter
Analyzing long text articles in the pharmaceutical domain, for the purpose of knowledge extraction and recognizing entities of interest, is a tedious task. In our previous research efforts, we were able to develop a platform which successfully extracts entities and facts from pharmaceutical texts and populates a knowledge graph with the extracted k...
Conference Paper
Full-text available
The usage of machine learning is expanding over all scientific fields and this branch is becoming more and more popular in the last years. In this paper we consider application of machine learning in the cryptanalysis, precisely in cryptanalysis of DES algorithm. This algorithm works in 16 rounds and we make two analyses: one for only one round and...

Network

Cited By