Results 91 to 100 of about 70,489 (181)

PhishCluster: Real-Time, Density-Based Discovery of Malicious URL Campaigns from Semantic Embeddings

open access: yesInformation
The proliferation of algorithmically generated malicious URLs has overwhelmed traditional threat intelligence systems, necessitating a paradigm shift from reactive, single-instance analysis to proactive, automated campaign discovery.
Dimitrios Karapiperis   +2 more
doaj   +1 more source

Analysis of approximate nearest neighbor searching with clustered point sets

open access: yes, 1999
We present an empirical analysis of data structures for approximate nearest neighbor searching. We compare the well-known optimized kd-tree splitting method against two alternative splitting methods.
Maneewongvatana, Songrit   +1 more
core   +2 more sources

Subspace Approximation for Approximate Nearest Neighbor Search in NLP

open access: yes, 2017
Most natural language processing tasks can be formulated as the approximated nearest neighbor search problem, such as word analogy, document similarity, machine translation. Take the question-answering task as an example, given a question as the query, the goal is to search its nearest neighbor in the training dataset as the answer.
openaire   +2 more sources

scSpecies: enhancement of network architecture alignment in comparative single-cell studies. [PDF]

open access: yesGenome Biol
Schächter C   +5 more
europepmc   +1 more source

A refined SMOTE-ENN optimization method based on machine learning for heart rate variability data classification. [PDF]

open access: yesFront Digit Health
Zhang B   +10 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy