Open Access
ARTICLE
Ruidong Chen1,#, Guopeng Wang2,#, Jingyuan Yang1, Ziyu Wang1, Fang Zou1, Jia Sun1, Xingpeng Tang1, Ting Chen1,*
1 School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, 611731, China
2 Zhejiang Institute of Marine Economic Development, Zhejiang Ocean University, Zhoushan, 316022, China
* Corresponding Author: Ting Chen. Email:
# These authors contributed equally to this work
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.068878
Received 09 June 2025; Accepted 05 November 2025; Published online 08 December 2025
View
Download
Like
Effectiveness Assessment of the Search-Based Statistical Structural Testing
Yang Shi, Xiaoyu Song, Marek Perkowski,...Improved KNN Imputation for Missing Values in Gene Expression Data
Phimmarin Keerin, Tossapon BoongoenWindows 10's Browser Forensic Analysis for Tracing P2P Networks’ Anonymous Attacks
Saima Kauser, Tauqeer Safdar Malik,...Cyber Security Analysis and Evaluation for Intrusion Detection Systems
Yoosef B. Abushark, Asif Irshad...Robust and High Accuracy Algorithm for Detection of Pupil Images
Waleed El Nahal, Hatim G. Zaini,...