Bitcoin concepts, threats, and machine-learning security solutions

M Rahouti, K Xiong, N Ghani - Ieee Access, 2018 - ieeexplore.ieee.org
The concept of Bitcoin was first introduced by an unknown individual (or a group of people)
named Satoshi Nakamoto before it was released as open-source software in 2009. Bitcoin is …

Clustering approaches for high‐dimensional databases: A review

M Mittal, LM Goyal, DJ Hemanth… - … Reviews: Data Mining …, 2019 - Wiley Online Library
Data mining is an inevitable task in most of the emerging computing technologies as it
debilitates the complexity of datasets by rendering a better insight. Moreover, it entails the …

Learning vector-quantized item representation for transferable sequential recommenders

Y Hou, Z He, J McAuley, WX Zhao - … of the ACM Web Conference 2023, 2023 - dl.acm.org
Recently, the generality of natural language text has been leveraged to develop transferable
recommender systems. The basic idea is to employ pre-trained language models (PLM) to …

Landslide susceptibility prediction based on a semi-supervised multiple-layer perceptron model

F Huang, Z Cao, SH Jiang, C Zhou, J Huang, Z Guo - Landslides, 2020 - Springer
Conventional supervised and unsupervised machine learning models used for landslide
susceptibility prediction (LSP) have many drawbacks, such as an insufficient number of …

K-means properties on six clustering benchmark datasets

P Fränti, S Sieranoja - Applied intelligence, 2018 - Springer
This paper has two contributions. First, we introduce a clustering basic benchmark. Second,
we study the performance of k-means using this benchmark. Specifically, we measure how …

[PDF][PDF] Comparative analysis of k-means and fuzzy c-means algorithms

S Ghosh, SK Dubey - … Journal of Advanced Computer Science and …, 2013 - Citeseer
In the arena of software, data mining technology has been considered as useful means for
identifying patterns and trends of large volume of data. This approach is basically used to …

Understanding of internal clustering validation measures

Y Liu, Z Li, H Xiong, X Gao, J Wu - 2010 IEEE international …, 2010 - ieeexplore.ieee.org
Clustering validation has long been recognized as one of the vital issues essential to the
success of clustering applications. In general, clustering validation can be categorized into …

A study of probabilistic password models

J Ma, W Yang, M Luo, N Li - 2014 IEEE Symposium on Security …, 2014 - ieeexplore.ieee.org
A probabilistic password model assigns a probability value to each string. Such models are
useful for research into understanding what makes users choose more (or less) secure …

Understanding and enhancement of internal clustering validation measures

Y Liu, Z Li, H Xiong, X Gao, J Wu… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Clustering validation has long been recognized as one of the vital issues essential to the
success of clustering applications. In general, clustering validation can be categorized into …

Fast density clustering strategies based on the k-means algorithm

L Bai, X Cheng, J Liang, H Shen, Y Guo - Pattern Recognition, 2017 - Elsevier
Clustering by fast search and find of density peaks (CFSFDP) is a state-of-the-art density-
based clustering algorithm that can effectively find clusters with arbitrary shapes. However, it …