Sergey Volkov’s research while affiliated with Peoples' Friendship University of Russia and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (5)


Training Multilingual and Adversarial Attack-Robust Models for Hate Detection on Social Media
  • Article

November 2022

·

6 Reads

·

3 Citations

Procedia Computer Science

Anastasia Ryzhova

·

Dmitry Devyatkin

·

Sergey Volkov

·

Vladimir Budzko

Social media provide plenty of textual information in various languages. This information can contain or provoke hatred towards different social or religious groups. In this paper, we study methods to process short text messages in English, Hindi, and Russian and identify such intolerance with cross-lingual Transformer models. Moreover, these models can be easily adapted to analyze other languages. We fine-tuned these models with several training techniques to build accurate hate speech detectors that are robust to adversarial attacks. Additional preprocessing was carried out for all datasets to improve the quality of model training. Also, for one of the training datasets, we applied the text attack algorithm that replaces some words with synonyms. For some languages, such an attack can greatly reduce the quality of the model. Experiment results show that mixing adversarial examples to a training dataset and combining deep models to randomized ensembles allows not only to reduce test error on attacked data for languages from the dataset (Hindi, Russian) but also to achieve better accuracy in other languages.


Data Driven Detection of Technological Trajectories

July 2021

·

14 Reads

·

1 Citation

Communications in Computer and Information Science

The paper presents a text mining approach to identifying and analyzing technological trajectories. The main problem addressed is the selection of documents related to a particular technology. These documents are needed to detect a trajectory of technology. The approach includes new keyword and keyphrase detection method, word2vec embeddings-based similar document search method and fuzzy logic-based methodology for revealing technology dynamics. USPTO patent database was used for experiments. The database contains more than 4.7 million documents from 1996 to 2020. Self-driving car technology was chosen as an example. The result of the experiment shows that the developed methods are useful for effective searching and analyzing information about given technologies.


Figure 1. Neural network with GRU layers.
Using GRU based deep neural network for intrusion detection in software-defined networks
  • Article
  • Full-text available

September 2020

·

488 Reads

·

22 Citations

IOP Conference Series Materials Science and Engineering

This paper considers the possibility of using machine learning methods in solving the problem of intrusion detection in software-defined networks (SDN). The work is devoted to the research and development of a network attack classifier, which is a core of the intrusion detection systems. To evaluate the methods, an existing data set was used, which includes network traffic records with a several different network attack scenarios. A comparison of machine learning methods implementing neural networks on a selected data set is presented. Based on the results, it can be concluded that the task of intrusion detection in software-defined networks can be successfully solved using deep neural networks.

Download

Network attacks classification using Long Short-term memory based neural networks in Software-Defined Networks

January 2020

·

173 Reads

·

12 Citations

Procedia Computer Science

SDN (Software-Defined Network) is a network in which the control plane functionality is separated from the packet forwarding layer. The paper is devoted to the study of the SDN security. A comparison of neural networks with various parameters on existing dataset is presented. CSE-CIC-IDS2018 dataset [12] provided by Canadian Institute for Cybersecurity (CIC) on AWS (Amazon Web Services) was chosen. It contains of the most relevant types of network attacks. Results show that a simple neural network, such as a multi-layer perceptron, can be used to provide basic protection against most attacks. To provide more reliable protection, complex neural networks should be used. The presented LSTM-based model showed a very good result of intrusion detection.


Towards Automated Identification of Technological Trajectories

October 2019

·

37 Reads

·

2 Citations

Communications in Computer and Information Science

Sergey S. Volkov

·

·

·

[...]

·

Natalia V. Toganova

The paper presents a text mining approach to identifying technological trajectories. The main problem addressed is the selection of documents related to a particular technology. These documents are needed to identify a trajectory of the technology. Two different methods were compared (based on word2vec and lexical-morphological and syntactic search). The aim of developed approach is to retrieve more information about a given technology and about technologies that could affect its development. We present the results of experiments on a dataset containing over 4.4 million of documents as a part of USPTO patent database. Self-driving car technology was chosen as an example. The result of the research shows that the developed methods are useful for automated information retrieval as the first stage of the analysis and identification of technological trajectories.

Citations (2)


... S. S. Volkov et al. 13 used Long Short-Term Memory (LSTM) based neural networks to build their model. They used the CSE-CICIDS2018 dataset for training and testing. ...

Reference:

Intrusion detection in software defined network using deep learning approaches
Network attacks classification using Long Short-term memory based neural networks in Software-Defined Networks

Procedia Computer Science

... In addition, complex network structures may lead to overfitting problems. Gated recurrent unit (GRU) [35][36][37][38] has relatively high computational efficiency due to its relatively simple structure. However, the detection effect of GRU may be affected in complex network environments. ...

Using GRU based deep neural network for intrusion detection in software-defined networks

IOP Conference Series Materials Science and Engineering