Open Access
ARTICLE
Cheng Yang, Xianghong Tang*, Jianguang Lu, Chaobin Wang
State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China
* Corresponding Author: Xianghong Tang. Email:
(This article belongs to the Special Issue: Artificial Intelligence Methods and Techniques to Cybersecurity)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2026.076126
Received 14 November 2025; Accepted 09 February 2026; Published online 27 February 2026
View
Download
Like
Combing Type-Aware Attention and Graph Convolutional Networks for Event Detection
Kun Ding, Lu Xu, Ming Liu, Xiaoxiong...A Survey on Image Semantic Segmentation Using Deep Learning Techniques
Jieren Cheng, Hua Li, Dengbo Li,...Identification of Anomaly Scenes in Videos Using Graph Neural Networks
Khalid Masood, Mahmoud M. Al-Sakhnini,...Graph Construction Method for GNN-Based Multivariate Time-Series Forecasting
Wonyong Chung, Jaeuk Moon, Dongjun...Image Generation of Tomato Leaf Disease Identification Based on Small-ACGAN
Huaxin Zhou, Ziying Fang, Yilin...