research
∙
09/14/2023
TensorFlow Chaotic Prediction and Blow Up
Predicting the dynamics of chaotic systems is one of the most challengin...
research
∙
02/26/2023
Autoencoders as Pattern Filters
We discuss a simple approach to transform autoencoders into "pattern fil...
research
∙
02/06/2023
Secret sharing scheme based on hashing
We propose an adaptive threshold multi secret sharing scheme based solel...
research
∙
11/14/2022
Growing Random Strings in CA
We discuss a class of cellular automata (CA) able to produce long random...
research
∙
05/15/2022
Attack vs Benign Network Intrusion Traffic Classification
Intrusion detection systems (IDS) are used to monitor networks or system...
research
∙
01/18/2022
Sandbox Sample Classification Using Behavioral Indicators of Compromise
Behavioral Indicators of Compromise are associated with various automate...
research
∙
05/31/2021
Diffusion Self-Organizing Map on the Hypersphere
We discuss a diffusion based implementation of the self-organizing map o...
research
∙
02/07/2021
Additive Feature Hashing
The hashing trick is a machine learning technique used to encode categor...
research
∙
12/23/2020
K-Means Kernel Classifier
We combine K-means clustering with the least-squares kernel classificati...
research
∙
02/23/2018
High-Dimensional Vector Semantics
In this paper we explore the "vector semantics" problem from the perspec...
research
∙
01/06/2018
On the inherent competition between valid and spurious inductive inferences in Boolean data
Inductive inference is the process of extracting general rules from spec...
research
∙
06/24/2017
Reservoir Computing on the Hypersphere
Reservoir Computing (RC) refers to a Recurrent Neural Networks (RNNs) fr...
research
∙
03/22/2017