Learn about the Siamese Networks, a class of deep learning architectures that are employed by designing two identical sub-networks.
Here's what I've written (so far):
Baeldung on Computer Science
- All
- Security (6)
- Machine Learning (6)
- Deep Learning (5)
- Computer Vision (5)
- Software Architecture (3)
- Networking (2)
- Programming (1)
- Graphs (1)
- Data Structures (1)
- Concurrency (1)
- Artificial Intelligence (1)
Neural Networks: Pooling Layers
Filed under Machine Learning
Learn about pooling, a machine-learning technique widely used to reduce input size.
What Is Wardriving?
Filed under Security
Learn about the term wardriving.
Deep Neural Networks: Padding
Filed under Deep Learning
Learn about padding, a machine learning technique used in image processing to improve model performance and simplify data processing.
Multithreading Vs. Hyperthreading
Filed under Concurrency
Explore the most important aspects of multithreading and hyperthreading.
Difference Between Reinforcement Learning and Optimal Control
Filed under Machine Learning
Explore the differences between reinforcement learning and optimal control.
What Are Bridges in a Graph?
Filed under Graphs
Learn about bridges in graphs.
Differences Between a Parametric and Non-parametric Model
Filed under Machine Learning
Learn about parametric and non-parametric models in machine learning.
What Is Maxout in a Neural Network?
Filed under Deep Learning
Explore the maxout activation function, discuss an example, and analyze its main advantages and disadvantages.
Different Network Topologies Explained
Filed under Networking
Explore various network topologies.
Differences Between Luong Attention and Bahdanau Attention
Filed under Deep Learning, Machine Learning
Explore the Luong and Bahdanau attention methods.
How Does a Blockchain Work?
Filed under Security, Software Architecture
Explore blockchain technology and see how it works.
Computer Vision: Differences Between Low-Level and High-Level Features
Filed under Computer Vision
Walk through low and high-level features in computer vision.
Machine Learning: Flexible and Inflexible Models
Filed under Machine Learning
Learn about model flexibility in machine learning.
Social Engineering
Filed under Security
Learn about Social Engineering, an effective method used by cybercriminals to access the sensitive information of others.
VAE Vs. GAN For Image Generation
Filed under Computer Vision
Learn about VAE and GAN.
What is Steganography?
Filed under Security
Learn about steganography.
Distributed Systems: Consensus
Filed under Networking, Software Architecture
Explore the concept of Consensus in distributed systems.
What are Restricted Boltzmann Machines?
Filed under Machine Learning
Explore Restricted Boltzman Machines.
Differences Between a Data Type and a Data Structure
Filed under Data Structures, Programming
Explore data types and data structures, along with their fundamental differences.
What is Privilege Escalation?
Filed under Security
Explore privilege escalation attacks.
What are Data Warehouses?
Filed under Software Architecture
Learn about Data Warehouses.
Neural Network and Deep Belief Network
Filed under Artificial Intelligence
Explore Deep Belief Networks.
Generative Adversarial Networks: Discriminator’s Loss and Generator’s Loss
Filed under Deep Learning
Explore GAN’s two main neural networks, the generator and the discriminator, and understand how they play a competitive min-max game trying to replicate a probability distribution.
Fast R-CNN: What is the Purpose of the ROI Layers?
Filed under Computer Vision
Explore the RoI pooling layers and their impact on the speed and accuracy of Fast R-CNN.
What Is a Backdoor?
Filed under Security
Explore the concept of a backdoor.
Object Detection: SSD Vs. YOLO
Filed under Computer Vision
Compare two main object detection algorithms, SSD and YOLO.