Open Access
ARTICLE
Simin Tang1,2,3,4, Zhiyong Zhang1,2,3,4,*, Junyan Pan1,2,3,4, Gaoyuan Quan1,2,3,4, Weiguo Wang5, Junchang Jing6
1 Information Engineering College, Henan University of Science and Technology, Luoyang, 471023, China
2 Henan International Joint Laboratory of Cyberspace Security Applications, Henan University of Science and Technology, Luoyang, 471023, China
3 Henan Intelligent Manufacturing Big Data Development Innovation Laboratory, Henan University of Science and Technology, Luoyang, 471023, China
4 Institute of Artificial Intelligence Innovations, Henan University of Science and Technology, Luoyang, 471023, China
5 Education Technology Department, New H3C Technologies Co., Ltd., Beijing, 100102, China
6 College of Computer and Information Engineering, Henan Normal University, Xinxiang, 453007, China
* Corresponding Author: Zhiyong Zhang. Email:
(This article belongs to the Special Issue: Artificial Intelligence Methods and Techniques to Cybersecurity)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.073798
Received 25 September 2025; Accepted 05 December 2025; Published online 31 December 2025
View
Download
Like
Stock Prediction Based on Technical Indicators Using Deep Learning Model
Manish Agrawal, Piyush Kumar Shukla,...Stock Market Trading Based on Market Sentiments and Reinforcement Learning
K. M. Ameen Suhail, Syam Sankar,...Automatic Unusual Activities Recognition Using Deep Learning in Academia
Muhammad Ramzan, Adnan Abid, Shahid...A Hybrid Feature Selection Framework for Predicting Students Performance
Maryam Zaffar, Manzoor Ahmed Hashmani,...Deep Learning with Backtracking Search Optimization Based Skin Lesion Diagnosis Model
C. S. S. Anupama, L. Natrayan,...