Open Access
ARTICLE
Ruidong Chen1,#, Guopeng Wang2,#, Jingyuan Yang1, Ziyu Wang1, Fang Zou1, Jia Sun1, Xingpeng Tang1, Ting Chen1,*
1 School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, 611731, China
2 Zhejiang Institute of Marine Economic Development, Zhejiang Ocean University, Zhoushan, 316022, China
* Corresponding Author: Ting Chen. Email:
# These authors contributed equally to this work
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.068878
Received 09 June 2025; Accepted 05 November 2025; Published online 08 December 2025
View
Download
Like
Few-Shot Object Detection Based on the Transformer and High-Resolution Network
Dengyong Zhang, Huaijian Pu, Feng...A Dual Attention Encoder-Decoder Text Summarization Model
Nada Ali Hakami, Hanan Ahmed Hosni...A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation
Al-Hussien Seddik, Mohammed Salah,...A Defect Detection Method for the Primary Stage of Software Development
Qiang Zhi, Wanxu Pu, Jianguo Ren,...JShellDetector: A Java Fileless Webshell Detector Based on Program Analysis
Xuyan Song, Yiting Qin, Xinyao...