Open Access
ARTICLE
Ying Yao1, Le Tian1,2,3, Yuxiang Hu1,2,3,*, Pengshuai Cui1,2,3
1 Information Engineering University, Zhengzhou, China
2 National Key Laboratory of Advanced Communication Networks, Zhengzhou, China
3 Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China
* Corresponding Author: Yuxiang Hu. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2026.075747
Received 07 November 2025; Accepted 15 January 2026; Published online 06 February 2026
View
Download
Like
Deep Learning-Based Program-Wide Binary Code Similarity for Smart Contracts
Yuan Zhuang, Baobao Wang, Jianguo...Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
Yongjie Yang, Shanshan Tu, Raja...Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment
Salaheddine Kably, Tajeddine Benbarrad,...Load Balancing Based on Multi-Agent Framework to Enhance Cloud Environment
Shrouk H. Hessen, Hatem M. Abdul-kader,...