Open Access
ARTICLE
Nouman Ahmad1,*, Changsheng Zhang1, Uroosa Sehar2,3,4
1 School of Software Engineering, Northeastern University, Shenyang, 110819, China
2 College of Information Science and Engineering, Shaoyang University, Shaoyang, 422000, China
3 Provincial Key Laboratory of Informational Service for Rural Area of Southwestern Hunan, Shaoyang University, Shaoyang, 422000, China
4 School of Advanced Integrated Technology, Shenzhen Institute of Advanced Technology Chinese Academy of Sciences, Shenzhen, 518000, China
* Corresponding Author: Nouman Ahmad. Email:
(This article belongs to the Special Issue: Utilizing and Securing Large Language Models for Cybersecurity and Beyond)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.073029
Received 09 September 2025; Accepted 18 November 2025; Published online 12 December 2025
View
Download
Like
Combing Type-Aware Attention and Graph Convolutional Networks for Event Detection
Kun Ding, Lu Xu, Ming Liu, Xiaoxiong...Information Extraction Based on Multi-turn Question Answering for Analyzing Korean Research Trends
Seongung Jo, Heung-Seon Oh, Sanghun...A Federated Named Entity Recognition Model with Explicit Relation for Power Grid
Jingtang Luo, Shiying Yao, Changming...Multi-View & Transfer Learning for Epilepsy Recognition Based on EEG Signals
Jiali Wang, Bing Li, Chengyu Qiu,...