Open Access
ARTICLE
Hanaa Nafea1, Awais Qasim2, Sana Abdul Sattar2, Adeel Munawar3, Muhammad Nadeem Ali4, Byung-Seo Kim4,*
1 College of Computer Science and Engineering, Taibah University, Al-Madinah Al-Munawwarah, 42353, Saudi Arabia
2 Department of Computer Science, GC University Lahore, Lahore, 54000, Pakistan
3 Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, 12121, Thailand
4 Department of Software and Communication Engineering, Hongik University, Sejong-City, 30016, Republic of Korea
* Corresponding Author: Byung-Seo Kim. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.072281
Received 23 August 2025; Accepted 29 October 2025; Published online 01 December 2025
View
Download
Like
Deep Learning-Based Program-Wide Binary Code Similarity for Smart Contracts
Yuan Zhuang, Baobao Wang, Jianguo...Privacy Data Management Mechanism Based on Blockchain and Federated Learning
Mingsen Mo, Shan Ji, Xiaowan Wang,...Augmenting IoT Intrusion Detection System Performance Using Deep Neural Network
Nasir Sayed, Muhammad Shoaib,...Optimization Scheme of Trusted Task Offloading in IIoT Scenario Based on DQN
Xiaojuan Wang, Zikui Lu, Siyuan...Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
Yongjie Yang, Shanshan Tu, Raja...