Hincti: A cyber threat intelligence modeling and identification system based on heterogeneous information network

Y Gao, X Li, H Peng, B Fang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber attacks have become increasingly complicated, persistent, organized, and
weaponized. Faces with this situation, drives a rising number of organizations across the …

Development of technology opportunity analysis based on technology landscape by extending technology elements with BERT and TRIZ

J Wang, Z Zhang, L Feng, KY Lin, P Liu - Technological Forecasting and …, 2023 - Elsevier
Technology opportunity analysis (TOA) has been the subject of many prior studies, most of
which have focused on deconstructing and restructuring the original knowledge structure in …

A novel topic clustering algorithm based on graph neural network for question topic diversity

Y Wu, X Wang, W Zhao, X Lv - Information Sciences, 2023 - Elsevier
In community question answering, many questions have no topic labeling or the topic
labeling is very diverse, which has become the biggest obstacle to building the bridge …

On the modeling of cyber-attacks associated with social engineering: A parental control prototype

P Zambrano, J Torres, L Tello-Oquendo… - Journal of Information …, 2023 - Elsevier
Nowadays, the psychological techniques used to harass, intimidate, threaten, steal
information are more common due to free access to technological resources and the …

Hierarchical Deep Document Model

Y Yang, JP Lalor, A Abbasi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Topic modeling is a commonly used text analysis tool for discovering latent topics in a text
corpus. However, while topics in a text corpus often exhibit a hierarchical structure (eg …

[PDF][PDF] 概率主题模型综述

韩亚楠, 刘建伟罗雄麟 - 计算机学报, 2021 - 159.226.43.17
摘要主题模型是当下文本挖掘中最主要的技术之一, 广泛应用于数据挖掘,
文本分类以及社区发现等. 由于其出色的降维能力和灵活的易扩展性, 成为自然语言处理领域的 …

Enhancing factorization machines with generalized metric learning

Y Guo, Z Cheng, J Jing, Y Lin, L Nie… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Factorization Machines (FMs) are effective in incorporating side information to overcome the
cold-start and data sparsity problems in recommender systems. Traditional FMs adopt the …

An orthogonal-space-learning-based method for selecting semantically helpful reviews

G Chen, S Xiao, C Zhang, W Wang - Electronic Commerce Research and …, 2022 - Elsevier
Customers in the online purchase context always bear the burden of enormous reviews. In
this study, we endeavor to effectively identify and select a helpful review subset from original …

Evaluating Topic Models with OpenAI Embeddings: A Comparative Analysis on Variable-Length Texts Using Two Datasets

A Wahbeh, M Al-Ramahi, O El-Gayar… - 2025 - scholarspace.manoa.hawaii.edu
Topic modeling is a crucial unsupervised machine learning technique for identifying themes
within unstructured text. This study compares traditional topic modeling methods, like Latent …

[PDF][PDF] BEHAVIOR OF ONLINE ATTACKERS FROM THE PERSPECTIVE OF SOCIAL ENGINEERING

LES Crespo - 2023 - doctoradoinformatica.epn.edu.ec
In the context of cybersecurity, social engineering describes a type of attack in which the
attacker exploit human vulnerabilities to breach the security goals of cyberspace elements …