Open Access
ARTICLE
Gang Xu1,2, Lefeng Wang1, Yuwei Huang2, Yong Lu3, Xin Liu4, Weijie Tan5, Zongpeng Li6, Xiu-Bo Chen2,*
1 School of Artificial Intelligence and Computer Science, North China University of Technology, Beijing, 100144, China
2 Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
3 School of Information Engineering, Minzu University of China, Beijing, 100081, China
4 School of Digtial and Intelligence Industry, Inner Mongolia University of Science and Technology, Baotou, 014010, China
5 The State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China
6 Institute for Network Sciences & Cyberspace, Tsinghua University, Beijing, 100084, China
* Corresponding Author: Xiu-Bo Chen. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.074256
Received 07 October 2025; Accepted 21 November 2025; Published online 22 December 2025
View
Download
Like
GRU-based Buzzer Ensemble for Abnormal Detection in Industrial Control Systems
Hyo-Seok Kim, Chang-Gyoon Lim,...Profiling Astronomical Objects Using Unsupervised Learning Approach
Theerapat Sangpetch, Tossapon...Employment Quality Evaluation Model Based on Hybrid Intelligent Algorithm
Xianhui Gu, Xiaokan Wang, Shuang...Application of Time Serial Model in Water Quality Predicting
Jiang Wu, Jianjun Zhang, Wenwu...Augmenting IoT Intrusion Detection System Performance Using Deep Neural Network
Nasir Sayed, Muhammad Shoaib,...