Home / Journals / CMC / Vol.88, No.1, 2026
Special Issues
Table of Content
cover

On the Cover

Structural optimization is a fundamental step in density functional theory (DFT) calculations, typically driven by the Broyden–Fletcher–Goldfarb–Shanno (BFGS) optimizer. However, the standard BFGS algorithm relies on a local quadratic approximation of the potential energy surface (PES), which frequently breaks down in highly non-quadratic regimes typical of complex surface adsorption systems and defective bulk materials. This breakdown leads to “Hessian pollution”, a phenomenon where higher-order anharmonicities introduce spurious off-diagonal inter-atomic couplings that distort curvature estimates and significantly stall convergence. Herein, we propose a physics-inspired algorithmic intervention to the BFGS method that systematically suppresses this pollution. Once the maximum residual force drops below a specific activation threshold (e.g., 0.5 or 0.1 eV/Å), our approach conditionally resets all off-diagonal Hessian blocks, and introduces an isotropic background stiffness strategy where these blocks can be repopulated with a small positive constant rather than zeroed completely. This balances the robust stability of diagonal dominance with accelerated convergence speed. Implemented as an add-on to the Atomic Simulation Environment (ASE) Library, the method is lightweight, transferable, and compatible with standard DFT codes. Tests across diverse chemical systems, including atomic and molecular adsorbates (O*, H*, CO*) on Pt(111) surfaces and defective bulk oxides (WO3–x), demonstrate substantial reductions in the number of required force calls without biasing the final optimized geometry. It offers a practical tool for high-throughput DFT workflows that eliminates the need for domain-specific training. This method is available via our open-source package, Hessian-Engineered Relaxation Optimizer (HERO).
The cover image was provided by the authors and partially created using AI. It contains no copyrighted elements or misleading representations.

View this paper

  • Open AccessOpen Access

    REVIEW

    Graph and Transformer-Based Deep Learning Paradigms for DDoS Detection: A Systematic and Critical Survey

    Noor Mueen Mohammed Ali Hayder1,2, Seyed Amin Hosseini Seno2,*, Mehdi Ebady Manaa3,4, Hamid Noori2, Davood Zabihzadeh5
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078546 - 08 May 2026
    (This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
    Abstract With the rapid expansion of networked systems, Distributed Denial-of-Service (DDoS) attacks have become a major threat to Internet security and service availability. Due to their limited scalability, incapacity to capture temporal and relational relationships, and decreased detection accuracy under dynamic and high-volume network traffic, traditional machine learning algorithms frequently fail in large-scale DDoS scenarios. This encourages the application of deep learning techniques that can simulate intricate relationships. This survey systematically reviews graph-based deep learning and Transformer models for DDoS detection. We categorize methods for transforming network traffic into graph representations and analyze key architectures, including… More >

  • Open AccessOpen Access

    REVIEW

    A Challenge-Driven Survey on UAV-Based Target Tracking

    Lingyu Jin1,2, Rui Wang1,2, Bo Huang1,2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.080050 - 08 May 2026
    Abstract Unmanned Aerial Vehicle (UAV) target tracking is one of the key technologies in aerial intelligent perception systems, playing a vital role in applications such as traffic monitoring, border patrol, disaster response, search and rescue, environmental monitoring, and military reconnaissance. Compared with generic object tracking tasks, UAV platforms exhibit significant differences in imaging perspectives, target scales, motion patterns, and onboard computing capabilities, which pose unique challenges for UAV target tracking, including small targets and drastic scale variations, platform motion and motion blur, complex backgrounds and frequent occlusions, low-light conditions at night, as well as real-time and… More >

  • Open AccessOpen Access

    REVIEW

    The Semantic Design Space of Retrieval-Augmented Recommender Systems: A Systematic Review of LLM-Based Approaches

    Minhyeok Choi1, Imran Ahsan2, Hyunwook Yu1, Taeyoung Choe1, Mucheol Kim1,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079504 - 08 May 2026
    Abstract Large language models (LLMs) are increasingly integrated into recommender systems to support semantic reasoning, natural language understanding, and user-adaptive personalization. However, their reliance on static parametric knowledge and fixed representations limits robustness in dynamic environments, particularly under long-tail and cold-start conditions. Retrieval-augmented architectures have emerged to address these limitations by grounding LLMs in external, non-parametric knowledge sources. This systematic literature review synthesizes 138 peer-reviewed studies published between 2023 and 2025 in conferences and journals, focusing on retrieval-augmented and LLM-enhanced recommendation. We analyze these works through a three-dimensional framework covering: (i) domain application, (ii) semantic feature… More >

  • Open AccessOpen Access

    REVIEW

    IoT-Driven Intelligent Transportation System in the Era of 6G and AI: A Review

    Muhammet Ali Karabulut1, A. F. M. Shahen Shah2, Al-Sakib Khan Pathan3,*, Phillip G. Bradford4
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.077625 - 08 May 2026
    Abstract Today, technological progress is broad and deep. The next generation networks and systems will integrate features, technologies, and models requiring smooth cooperation between new and old technologies. This survey’s uniqueness is that it considers an integrated, hybrid and heterogeneous future where Internet of Things (IoT), Sixth-Generation (6G) mobile communications technology, and Artificial Intelligence (AI) will work together, providing a smart and connected Intelligent Transportation System (ITS). This smart ITS will give better road safety and optimized travel. Currently, there is a scarcity of surveys focusing particularly on smart ITS that is expected soon. In this More >

  • Open AccessOpen Access

    REVIEW

    Machine Learning-Enabled NTN-Assisted IoT: Mapping the Security Landscape

    Oluwatosin Ahmed Amodu1, Zurina Mohd Hanapi1,*, Raja Azlina Raja Mahmood1, Faten A. Saif2, Huda Althumali3, Chedia Jarray4, Umar Ali Bukar5, Mohammed Sani Adam6
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.074678 - 08 May 2026
    Abstract Non-terrestrial networks (NTNs), encompassing unmanned aerial vehicles (UAVs), low-/high-altitude platforms (LAPs/HAPs), and satellite systems, are increasingly enabling Internet of Things (IoT) applications beyond the limits of terrestrial infrastructure. By combining UAV mobility with satellite and HAP coverage, NTN-assisted IoT supports diverse use cases, including remote sensing, smart cities, intelligent transportation, and emergency response. This paper presents a systematic mapping of machine learning (ML) research in NTN-assisted IoT with a focus on security-related aspects. A keyword co-occurrence analysis of over 2000 publications identifies twelve thematic clusters, including three clusters directly related to security, privacy, and trust.… More >

  • Open AccessOpen Access

    REVIEW

    A Review of Applications and Challenges of Large Language Models for Foundry Intelligence in the Casting Industry

    Yutong Guo1,2, Jianying Yang1,3, Chao Yang1,3,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.077820 - 08 May 2026
    Abstract Large language models (LLMs) and related foundation-model workflows are emerging as promising tools for advancing foundry intelligence across the casting value chain. This review examines their applications in material design and property prediction, process parameter optimization and intelligent control, and defect detection and quality tracing in casting environments. The surveyed studies indicate that LLM-enabled systems can help integrate unstructured technical knowledge with multimodal industrial data. This integration supports composition design, simulation-assisted process optimization, diagnostic reasoning, and knowledge-grounded decision support. However, current evidence shows that the transition from pilot demonstrations to robust industrial deployment remains constrained More >

  • Open AccessOpen Access

    REVIEW

    Applying Deep Learning to Defect Detection in Steel Manufacturing

    Duane G. Noé1, Ku-Chin Lin2, Chang-Lin Chuang3, Yung-Tsung Cheng3,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.077838 - 08 May 2026
    (This article belongs to the Special Issue: Development and Application of Deep Learning based Object Detection)
    Abstract Steel manufacturing requires high-throughput and high-reliability surface inspection to minimize safety risks, scrap rates, and downstream quality reductions. Conventional rule-based vision and manual inspection are often impeded in real production environments by variable illumination, complex textures, subtle defect morphology, and stringent latency constraints imposed by production-line operation. Deep learning (DL) has become a dominant paradigm for the detection and classification of defects when inspecting steel, but many previous studies have performed broad architectural overviews without explicitly connecting model and pipeline choices to deployment-critical factors such as processing speed, hardware availability, annotation cost, and robustness during… More >

  • Open AccessOpen Access

    ARTICLE

    HERO (Hessian-Engineered Relaxation Optimizer): Suppressing “Hessian Pollution” for Accelerated First-Principles Structural Relaxation

    Mingzhe Li1,2,3,4, Piao Ma2,4, Limin Li4, Weijie Yang1,*, Hao Li3,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079131 - 08 May 2026
    Abstract Structural optimization is a fundamental step in density functional theory (DFT) calculations, typically driven by the Broyden–Fletcher–Goldfarb–Shanno (BFGS) optimizer. However, the standard BFGS algorithm relies on a local quadratic approximation of the potential energy surface (PES), which frequently breaks down in highly non-quadratic regimes typical of complex surface adsorption systems and defective bulk materials. This breakdown leads to “Hessian pollution”, a phenomenon where higher-order anharmonicities introduce spurious off-diagonal inter-atomic couplings that distort curvature estimates and significantly stall convergence. Herein, we propose a physics-inspired algorithmic intervention to the BFGS method that systematically suppresses this pollution. Once… More >

  • Open AccessOpen Access

    ARTICLE

    DenT: Dense-Transformer for Label-Free Microscopy Image Segmentation

    Chan-Min Hsu1, Shang-Ru Yang1, Yi-Ju Lee1, An-Chi Wei1,2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.076098 - 08 May 2026
    (This article belongs to the Special Issue: Advancements in Pattern Recognition through Machine Learning: Bridging Innovation and Application)
    Abstract U-Net, a fully convolutional neural network (FCNN) with U-shaped features, has demonstrated significant success in biomedical image segmentation. However, the locality of convolution operations in the U-Net limits its ability to learn long-range dependencies. Transformers, originally developed for natural language processing, have recently been adapted for image segmentation because of their global self-attention mechanisms. Inspired by the long-range feature learning capability of transformers, we propose Dense-Transformer (DenT), an architecture designed for volumetric microscopy image segmentation. DenT incorporates transformers as encoders within each convolutional layer to capture global contextual information. Additionally, dense skip connections at multiple More >

  • Open AccessOpen Access

    ARTICLE

    LiRA-CLIP: Training-Free Posterior-Predictive Uncertainty for Few-Shot CLIP Classification

    Mustafa Qaid Khamisi1, Zuping Zhang1,*, Mohammed Al-Habib1, Muhammad Asim2, Sajid Shah2
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.077556 - 08 May 2026
    Abstract Large Vision-Language models (VLMs) such as Contrastive Language-Image Pretraining (CLIP) have transformed open world image recognition. Nevertheless, few-shot classification, particularly in the extremely low-shot regime, requires not only high accuracy but also reliably calibrated uncertainty for decisions with high confidence. Existing training-free CLIP adapters are primarily designed to increase accuracy and efficiency; integrate the zero-shot text logits with the few-shot feature caches, but not definitely model predictive uncertainty and therefore often exhibit considerable miscalibration and weak selective performance. Bayesian adapters move in the direction of probabilistic modeling by placing priors over adapter parameters and employing… More >

  • Open AccessOpen Access

    ARTICLE

    Peer-to-Peer IoT Authentication Protocol Based on PUF and Multiple Reference Fuzzy Extractor

    Qingyao Gu1,2,#, Mengqi Hu2,#, Zerui Zhao2, Liquan Chen2,*, Huiyu Fang2
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078873 - 08 May 2026
    Abstract With the rapid development of the Internet of Things (IoT), the widespread adoption of applications such as smart homes and industrial IoT has raised the demand for secure authentication and key agreement among resource-constrained devices over open communication channels. Traditional authentication protocols often rely on centralized servers for key distribution, which results in high communication overhead and exposes systems to single-point-of-failure risks. Moreover, IoT devices are typically constrained in computational resources and are vulnerable to hardware cloning. These limitations necessitate lightweight yet robust security mechanisms. To address these challenges, we propose a lightweight peer-to-peer authentication More >

  • Open AccessOpen Access

    ARTICLE

    Threat Analysis and Assessment Based on a Collaboration Interface for Manned-Unmanned Teaming Systems

    Gaeul Kim1, Dohoon Kim2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078931 - 08 May 2026
    (This article belongs to the Special Issue: Intelligent Perception, Decision-making and Security Control for Unmanned Systems in Complex Environments)
    Abstract Manned-Unmanned Teaming (MUM-T) is an operational system where manned and unmanned systems perform missions through a collaboration interface, expanding beyond defense into civilian domains. The core of MUM-T lies in the organic interaction between manned and unmanned systems. The Collaboration Interface enabling this interaction becomes a primary target for cyber attacks due to its reliance on wireless networks. Compromising the reliability of the collaboration interface goes beyond simple communication failures; it directly leads to mission failure and aircraft safety issues. Therefore, systematic threat analysis and assessment tailored to this specific domain are essential. This study… More >

  • Open AccessOpen Access

    ARTICLE

    WiFi-Based Indoor Intrusion Detection via Two-Level Gait Feature Fusion Model

    Lijun Cui1, Yongjie Niu2, Yuxiang Sun1, Xiaokang Gu1, Jing Guo1, Pengfei Xu1,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079691 - 08 May 2026
    Abstract Indoor intrusion detection is essential for various applications, including security systems and smart homes. Recently, WiFi-based detection has gained popularity due to its low cost and non-invasive nature. Current Channel State Information (CSI) based frameworks primarily use deep learning to extract gait signatures; however, their performance depends heavily on extensive labeled datasets. These methods struggle to differentiate between unlabeled and labeled data that exhibit similar features. To address this challenge, we propose a novel Two-level Feature Fusion model for Indoor Intrusion Detection (TFF-IID) utilizing commercial WiFi CSI. The model adopts a two-level structure to learn… More >

  • Open AccessOpen Access

    ARTICLE

    DeepEchoNet: A Lightweight Architecture for Low Resolution Monocular Depth Estimation

    Giulio Caporro1, Paolo Russo2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079331 - 08 May 2026
    (This article belongs to the Special Issue: Advances in Efficient Vision Transformers: Architectures, Optimization, and Applications)
    Abstract Monocular depth estimation (MDE) has become a practical alternative to active range sensing in many indoor scenarios, enabled by supervised deep learning models that predict dense depth maps from a single RGB image. However, most modern MDE systems assume mid-to-high resolution inputs and non-trivial compute budgets, limiting their direct applicability in embedded and bandwidth-constrained settings. This paper studies low resolution MDE, focusing on 96×96 inputs, where geometric cues are strongly degraded and naively downsizing high-resolution architectures often leads to unstable training and poor accuracy. We propose DeepEchoNet, a lightweight hybrid CNN-transformer model tailored to operate natively More >

    Graphic Abstract

    DeepEchoNet: A Lightweight Architecture for Low Resolution Monocular Depth Estimation

  • Open AccessOpen Access

    ARTICLE

    A Graph-Based Spatio-Temporal Attention Network for Stress–Strain Behavior Prediction of Copper-Based Composites

    Chuhan Zhang1, Jinguo You1,*, Jialin Xu1, Mingqian Li1, Xiaofeng Chen2, Jingmei Tao2, Caiju Li2, Jianhong Yi2
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079587 - 08 May 2026
    (This article belongs to the Special Issue: Advances in Computational Materials Science: Focusing on Atomic-Scale Simulations and AI-Driven Innovations)
    Abstract With the rapid development of artificial intelligence and data-driven modeling, deep learning has become an effective tool for analyzing scientific discovery such as predicting material behaviors. Graphene-reinforced copper-based composites, which exhibit excellent mechanical, electrical, and thermal properties, have attracted extensive attention in advanced engineering applications; however, accurate prediction of their stress–strain behavior still relies heavily on computationally expensive molecular dynamics simulations or experiments. In this work, we propose a Graph-based Spatio-Temporal Attention Network, termed GraphSTAN, for stress–strain behavior prediction of copper-based composites. Specifically, atomic-scale initial microstructures are encoded as graphs and integrated with static physical More >

  • Open AccessOpen Access

    ARTICLE

    Thermodynamic and Thermoelastic Properties of SiSn: Data Mining-Based Searches and High Compression Effect

    Rabie Mezouar1,2, Fouad Okba3, Dejan Zagorac4,5,*, Salah Daoud2, Abdelfateh Benmakhlouf 2
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.077724 - 08 May 2026
    Abstract The compression effects on the thermoelastic and thermodynamic properties of cubic zincblende silicon–tin alloy (SiSn) were explored using a multi-methodological approach, deploying data mining methods, theoretical equation-of-state parameters, and the Quasi-Harmonic Debye Model. We analyze the relative volume, isothermal bulk modulus, thermal expansion coefficient, Debye temperature, sound velocity, and microhardness of the SiSn compound under pressures up to 8 GPa. The study commences with the data mining-based searches for a structural model and continues with an analysis of the pressure dependence of the relative volume using the Vinet equation of state, followed by an investigation… More >

  • Open AccessOpen Access

    ARTICLE

    The Influence of the Grain Size Effect on the Mechanical Properties of Metallic Tungsten during Nanoindentation

    Duo Li1, Shuhao Kang1, Yukun Liu2, Yang Shen2, Ruihan Li3, Yuhu Liu1, Shujun Huang4, Xin Wu5, Huan Liu2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078734 - 08 May 2026
    (This article belongs to the Special Issue: Mechanical Behavior of Materials with Advanced Modeling and Characterization)
    Abstract Tungsten plays a critical role in semiconductor electrical interconnects, and a thorough understanding of its mechanical properties is essential for optimizing its processing and performance. However, few studies have explored the effect of grain refinement on the mechanical behavior of tungsten. The work indicates a phenomenological transition around ~7.3 nm within the tested grain-size range that governs the nanoindentation response of tungsten. To establish this, we performed molecular dynamics (MD) simulations of nanoindentation for different grain sizes and analyzed surface pile-up, elastic recovery, atomic displacement, loading force, hardness, stress/strain behavior, dislocation density, and dislocation evolution. More >

  • Open AccessOpen Access

    ARTICLE

    Ratcheting Behavior and Intelligent Prediction Algorithms for Inner Liner Welds of Multi-Layered Pressure Vessels

    Linbin Li1, Ruiyuan Xue1,*, Juyin Zhang2,*, Xueping Wang2, Tiantian Chu1
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079732 - 08 May 2026
    (This article belongs to the Special Issue: Machine Learning in the Mechanics of Materials and Structures)
    Abstract The plastic strain accumulation results of the multi-layered wrapped pressure vessel liner during long-term service are an important basis for its safety performance evaluation. However, the complex welds distributed on the liner bring challenges to the calculation of plastic cumulative strain. To this end, a novel hybrid deep learning framework is proposed for the efficient and precise prediction of ratcheting behavior in the liner welds of multilayered pressure vessels. By employing a BiLSTM network to extract bidirectional temporal dependencies from the strain history and incorporating a Multi-Head Attention (MHA) mechanism for adaptive feature weighting, the… More >

  • Open AccessOpen Access

    ARTICLE

    NeuroChain Sentinel: A Brain-Inspired Anomaly Detection System Using Spiking Neural Networks for Zero-Day Threat Identification in Blockchain Networks

    Shoeb Ali Syed1, Zohaib Mushtaq2,*, Akbare Yaqub3, Saifur Rahman4, Muhammad Irfan4, Saleh Al Dawsari4,5,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.076869 - 08 May 2026
    Abstract Blockchain networks are under mounting pressure from emerging complex zero-day attacks that cannot be prevented with conventional security measures. In this paper, we introduce NeuroChain Sentinel, a new bio-inspired cybersecurity model based on spiking neural networks for detecting anomalies in a distributed ledger system in real time. The main innovations are: a Temporal Spike Pattern Recognition algorithm for simulating the biological timing of the neural system to detect malicious transaction patterns; a distributed consensus-verification topology combined with blockchain algorithms; and small-scale neuromorphic engineering, resulting in an 87% reduction in computational load over conventional deep neural… More >

  • Open AccessOpen Access

    ARTICLE

    Late-Fusion of Heterogeneous Maritime Data Using Self-Attention for Interpretable Anomaly Detection

    Raza Hasan*, Shakeel Ahmad, Ismet Gocer, Zakirul Bhuiyan
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079708 - 08 May 2026
    (This article belongs to the Special Issue: Artificial Intelligence in Visual and Audio Signal Processing)
    Abstract Maritime Domain Awareness (MDA) is critical for global security and economic stability, yet it is increasingly challenged by sophisticated adversarial tactics such as signal spoofing and “dark vessel” activities. Traditional surveillance systems, often reliant on single-sensor modalities, are ill-equipped to handle these deceptive behaviors. To address this, we propose the Multimodal Attention-based Fusion Transformer (MAFT), a novel deep learning architecture that integrates four distinct data modalities—Aerial imagery, Synthetic Aperture Radar (SAR), acoustic signatures, and Automatic Identification System (AIS) data—to achieve robust and interpretable maritime anomaly detection. A key contribution of our work is a principled… More >

    Graphic Abstract

    Late-Fusion of Heterogeneous Maritime Data Using Self-Attention for Interpretable Anomaly Detection

  • Open AccessOpen Access

    ARTICLE

    Energy-Efficient ASTAR-RIS and WPT-Assisted Task Offloading and Content Caching for WSNs

    Xiaoping Yang1,*, Songjie Yang2, Junqi Long1, Quanzeng Wang3, Bin Yang4, Xiaofang Cao5, Guochao Qi6
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078105 - 08 May 2026
    (This article belongs to the Special Issue: Advances in Wireless Sensor Networks: Security, Efficiency, and Intelligence)
    Abstract The rapid proliferation of latency-sensitive applications, coupled with the limitations of service range, has driven the integration of aerial simultaneously transmitting and reflecting reconfigurable intelligent surfaces (ASTAR-RIS) and task offloading to enhance both communication and computational efficiency in wireless sensor networks (WSNs). However, in WSNs, conventional ASTAR-RIS-assisted task offloading faces critical limitations, including restricted endurance, underutilized network caching and computing resources, and inefficient resource allocation within the optimization framework. To overcome these challenges, this paper integrates wireless power transfer (WPT) technology and proposes a novel energy-efficient ASTAR-RIS and WPT-assisted task offloading and content caching framework… More >

  • Open AccessOpen Access

    ARTICLE

    Secure IoT Data Transmission Using MPEG Derived Motion Vectors and Dual Encryption Techniques

    Sara H. Elsayed1, Rodaina Abdelsalam1, Mahmoud A. Ismail Shoman2, Raed Alotaibi3,*, Omar Reyad4,5,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079018 - 08 May 2026
    (This article belongs to the Special Issue: Security and Privacy in IoT: Cross-Domain Approaches and Cryptographic Innovations)
    Abstract In today’s digitally connected world, where cyber threats are becoming increasingly complex, finding modern and secure text encryption solutions that maintain maximum runtime performance while offering high-level protection is more crucial. The deployment of sophisticated security paradigms is often accompanied by a significant escalation in computational overhead. Thus, the fundamental objective resides in the mitigation of computational overhead while maintaining an uncompromising security posture. Internet of Things (IoT) devices require strong security measures for data transmission. Also, protecting communication channels against illegal access and eavesdropping has become crucial due to the exponential expansion of the… More >

  • Open AccessOpen Access

    ARTICLE

    A Large-Scale Dataset for Real-Time Vehicle Detection in Vietnamese Urban Traffic Scenes

    Quang Dong Nguyen Vo1, Gia Nhu Nguyen1, Hoang Vu Tran2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078756 - 08 May 2026
    Abstract Reliable vehicle detection in urban traffic environments remains challenging, particularly for fixed-view CCTV systems deployed in Southeast Asian cities, where heterogeneous traffic composition, high traffic density, frequent occlusions, and complex visual conditions are prevalent. The absence of large-scale datasets tailored to such mixed-traffic environments poses a significant limitation to the performance and generalization capability of existing object detection models. To address this gap, this paper presents a large-scale traffic image dataset for real-time vehicle detection in Vietnamese urban environments. The proposed dataset comprises 23,364 images collected from fixed-view CCTV traffic cameras deployed across Da Nang… More >

  • Open AccessOpen Access

    ARTICLE

    Unveiling Authentication Forgery in OpenID Connect under Web Frameworks: A Formal Analysis of CSRF-Based Attack Paths

    Xingyun Hu1,2, Siqi Lu1,2,*, Liujia Cai1,2, Ye Feng1,2, Shuhao Gu1,2, Tao Hu1, Yongjuan Wang1,2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079484 - 08 May 2026
    (This article belongs to the Special Issue: Cyberspace Mapping and Anti-Mapping Techniques)
    Abstract With the widespread adoption of web applications and cloud services, the OAuth 2.0-based OpenID Connect (OIDC) Single Sign-on (SSO) protocol has become the core of modern digital identity authentication. Although the OIDC protocol itself has strict security specifications, its implementation in real-world web frameworks can introduce critical vulnerabilities, particularly the improper omission of the state parameter, which leads to severe authentication forgery risks. Existing research often overlooks these implementation-level flaws, especially from a formal analysis perspective. This paper addresses this gap by formally analyzing the authentication forgery attack resulting from the missing state parameter. We construct… More >

  • Open AccessOpen Access

    ARTICLE

    PIF-Identifier: Accurate Low-Overhead Identification of Persistent Infrequent Flows in Network Traffic

    Bing Xiong1, Zhuoxiong Li1, Yongqing Liu1, Yu Tang1, Jinyuan Zhao2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078464 - 08 May 2026
    Abstract Persistent Infrequent Flows (PIFs) refer to the packet flows that last for a long time but always at low frequencies in network traffic. Accurate identification of the PIFs plays a vital role in intrusion detection, attack prevention, traffic engineering, and other network fields. However, existing methods often require to save all flows for finding out the PIFs due to their infrequency feature, which brings about the problem of low identification accuracy and high memory overhead. To solve this problem, this paper proposes an accurate PIF identification method with low overhead called PIF-Identifier, composed of a… More >

  • Open AccessOpen Access

    ARTICLE

    Cybersecurity for Sustainable Smart Cities: Threat-Resilient and Energy-Conscious Urban Systems

    Abdullah Alshammari*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078634 - 08 May 2026
    (This article belongs to the Special Issue: Advances in Cybersecurity for Digital Ecosystems)
    Abstract The proliferation of Internet of Things (IoT) devices in the infrastructure of smart cities has posed cybersecurity risks like never before, which have direct implications on the sustainability and energy consumption of cities. In this paper, a multi-faceted Threat-Resilient Energy-Conscious Security Framework (TRECSF) is introduced that combines intrusion detection methods powered by deep learning, blockchain-driven data integrity verification mechanism, and energy-aware security protocols in smart city ecosystems to achieve their sustainability. The new Hybrid Convolutional Neural Network-Long Short-Term Memory (CNN-LSTM) model is introduced to the proposed architecture, which fulfills the purpose of the study to… More >

  • Open AccessOpen Access

    ARTICLE

    Hierarchical Cyber–Physical Symbiosis with Bidirectional State Space Modeling for IIoT Anomaly Diagnosis

    Kelan Wang1, Jianfei Chen2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079644 - 08 May 2026
    (This article belongs to the Special Issue: Attention Mechanism-based Complex System Pattern Intelligent Recognition and Accurate Prediction)
    Abstract As 6G-enabled Industrial Internet of Things (IIoT) evolves, green and sustainable industrial monitoring increasingly relies on edge AI to deliver low-latency diagnosis under tight resource constraints. Industrial cyber–physical systems increasingly rely on heterogeneous sensing and communication infrastructures, where network-side attacks can propagate into physical processes and appear as coupled anomalies. Reliable diagnosis therefore requires joint learning from time-synchronized cyber and physical telemetry rather than modeling them as independent signals. This paper develops Cyber–Physical Symbiosis Network (CPSNet), a model designed for edge-AI deployment with a dual-stream architecture for fixed-window multiclass cross-domain anomaly diagnosis in IIoT. CPSNet… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Synthetic Dataset for Effective Detection of Replay Attacks in SDN-Enabled IoT Networks

    Nader Karmous1, Leila Bousbia1, Mohamed Ould-Elhassen Aoueileyine1, Imen Filali2,*, Ridha Bouallegue1
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.077454 - 08 May 2026
    Abstract This study proposes an intelligent Intrusion Detection and Prevention System (IDPS) integrated into a centralized Ryu Software-Defined Networking (SDN) controller to mitigate replay attacks within Internet of Things (IoT) environments. To address the scarcity of specialized datasets, a comprehensive dataset was generated using a real-time SDN-IoT testbed encompassing Mininet, multiple OpenFlow 1.3 switches, and a single Ryu controller. The experimental setup featured the exchange of legitimate and malicious Message Queuing Telemetry Transport (MQTT) traffic between hosts and IoT devices to simulate realistic network behaviors and attack vectors. Our methodology introduces a novel feature engineering framework… More >

  • Open AccessOpen Access

    ARTICLE

    Brownian-Perturbed Hénon Map for Image Encryption: Application in Biomedical Images

    Walaa Alayed1, Asad Ur Rehman2, M.Awais Ehsan3, Waqar Ul Hassan4, Ahmed Zeeshan5,6,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078078 - 08 May 2026
    (This article belongs to the Special Issue: Advances in Secure Computing: Post-Quantum Security, Multimedia Encryption, and Intelligent Threat Defence)
    Abstract The rapid growth in the field of data and cloud computing has made it essential to ensure information security. Encryption consists of multiple layers, among which a critical component is the Substitution box (S-box). The S-box provides nonlinearity and confusion between the original and cipher forms, and its performance directly determines the security of the cipher against cryptanalysis. Chaotic systems have been widely used for image encryption, however, they suffer from well known limitations such as deterministic periodicity and reduced unpredictability in finite field digital environments. To address these issues, we propose a new S-box… More >

  • Open AccessOpen Access

    ARTICLE

    TQKD: A More Efficient QKD Network Based on Homomorphic Encryption Technology

    Tianhua Lin1, Sijiang Xie1,*, Yalong Yan2, Jianguo Xie2, Ang Liu2
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.075573 - 08 May 2026
    Abstract Quantum key distribution (QKD) provides unconditional security but relies on repeaters to extend coverage, thereby introducing repeater trust risks—compromised repeaters may leak keys. Brakerski/Fan-Vercauteren scheme (BFV)-based QKD addresses this issue through key encryption and quantum attack resistance. However, Fast Fully Homomorphic Encryption over the Torus (TFHE) outperforms BFV in encryption/decryption speed for single-qubit homomorphic XOR operations, which is critical for the real-time requirements of QKD. We propose TFHE-based QKD (TQKD), a quantum key distribution protocol based on public-key TFHE. During key forwarding, it leverages the “usable-but-unobservable” property of homomorphic encryption to prevent key exposure. A… More >

  • Open AccessOpen Access

    ARTICLE

    Codenote: Leveraging AI-Driven Personality Grouping to Foster Students’ Coding Self-Efficacy

    Jia-Rou Lin1, Chun-Hsiung Tseng1,*, Hao-Chiang Koong Lin2, Andrew Chih-Wei Huang3
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079379 - 08 May 2026
    (This article belongs to the Special Issue: AI-Powered Software Engineering)
    Abstract Effective pair programming relies heavily on optimal partner compatibility, a requirement that is often difficult to scale manually in software engineering education. This study presents the empirical validation of Codenote, an AI-driven Integrated Development Environment (IDE) designed to automate personality-aware group formation. By integrating a behavioral analysis mechanism, Codenote infers student personality traits from coding patterns to construct complementary pairs, thereby facilitating intelligent collaborative learning. To validate the system’s effectiveness, a controlled experiment was conducted to assess the impact of this AI-mediated pairing strategy on students’ self-efficacy across adaptive, innovative, and persuasive domains. Results indicate… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-View Deep Fuzzy Clustering for Data Representation Learning

    Jianing Zhang1, Zhikui Chen1,*, Jing Gao1, Peng Li2
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.076717 - 08 May 2026
    (This article belongs to the Special Issue: Multimodal Learning for Big Data)
    Abstract With the increasing development of ocean information technology, the multi-view fuzzy clustering is attracting increasing attention in pattern mining for massive multi-view ocean data of heterogeneous distributions, owing to its superior performance. However, the previous multi-view fuzzy clustering methods cannot fully consider informative topologies hidden in data distributions, which are crucial to recognize partitions of data. Moreover, they fail to capture invariant structures of multi-view ocean data in learning clustering-specific fusion representation. In addition, they do not take into consideration consistencies contained in the manifolds of data generation in mining soft patterns. To address those… More >

  • Open AccessOpen Access

    ARTICLE

    Dual-Stream Feature Decoupling and Temporal Variational Bayesian Inference for Ship Re-Identification with Incomplete Data

    Wanhui Qiao1, Xiaorui Zhang1,*, Wei Sun2, Shiyu Zhou3, Kaibo Wang2
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.077977 - 08 May 2026
    (This article belongs to the Special Issue: Advances in Image Recognition: Innovations, Applications, and Future Directions)
    Abstract Ship re-identification (Re-ID) aims to match ship identities across disjoint camera views and separated time periods, which is critical for maritime target tracking and law enforcement. In real-world surveillance, variations in target distance and viewing angle frequently produce partial views and occlusions, leading to missing geometric components and fragmented appearance cues. Such incomplete observations substantially degrade the robustness and generalization of conventional single-frame methods that rely on global appearance representations. To address these challenges, this study proposes a new ship re-identification framework based on dual-stream feature decoupling and temporal variational Bayesian inference. The proposed method… More >

  • Open AccessOpen Access

    ARTICLE

    SubPFed: A Personalized Federated Learning Approach with Subgraphs

    Jianbin Li1,*, Hang Bao1, Xin Tong2
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.076676 - 08 May 2026
    (This article belongs to the Special Issue: Privacy-Preserving and Secure Federated Learning for IoT, Cyber-Physical, and Maritime Systems)
    Abstract The proliferation of large-scale graph data has enabled Graph Neural Networks (GNNs) to achieve significant success in domains such as recommender systems, social network analysis, and biomedicine. However, in practical networked environments, particularly in distributed service infrastructures, graph data is often isolated between multiple edge smart devices and cannot be shared due to privacy, making GNN models weak in generalization. Subgraph Federated Learning (SFL) mitigates this challenge by treating local client data as subgraphs of the global graph to decentralized GNN training. Unfortunately, client-side missing edges make GNN model difficult to capture dependency information between… More >

  • Open AccessOpen Access

    ARTICLE

    A Streamlined Client-Server Architecture for Sustainable Sentiment Analysis System Using Textual Data

    Soumalya De1, Rahil Akhtar2, Saiyed Umer2, Ranjeet Kumar Rout3, G. G. Md. Nawaz Ali4,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079340 - 08 May 2026
    (This article belongs to the Special Issue: Sentiment Analysis for Social Media Data: Lexicon-Based and Large Language Model Approaches)
    Abstract This work presents a comprehensive sustainable sentiment analysis system utilizing textual data, designed within a structured client-server architecture for real-time deployment. The system integrates dual feature representations Bag-of-Words (BoW) and Term Frequency–Inverse Document Frequency (TF-IDF) whose prediction scores are combined through a parameter-free score-level fusion strategy. The implementation of the proposed system consists of five major components. The first component involves the acquisition of textual data from various sources, followed by rigorous text preprocessing to eliminate noise and enhance data quality. The second component focuses on feature extraction, ensuring that the extracted features not only… More >

  • Open AccessOpen Access

    ARTICLE

    Quantum–Enhanced Intrusion Detection Using Quantum Circuit Born Machines for Zero-Day Attack Detection

    Wajdan Al Malwi1,*, Fatima Asiri1, Muhammad Shahbaz Khan2,3,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.075326 - 08 May 2026
    (This article belongs to the Special Issue: Advances in Secure Computing: Post-Quantum Security, Multimedia Encryption, and Intelligent Threat Defence)
    Abstract Modern intrusion detection systems (IDS) struggle to recognise zero-day cyberattacks, as classical discriminative models rely on historical attack labels and fail to characterise deviations from normal network behaviour. This work presents a hybrid quantum–classical intrusion detection framework in which a Quantum Circuit Born Machine (QCBM) models benign traffic as a probabilistic quantum state. The trained QCBM assigns each network flow a Quantum Anomaly Score (QAS), defined as the negative log-likelihood under the learned benign distribution, which is subsequently fused with classical flow statistics in a Light Gradient Boosted Machine (LightGBM) classifier. The proposed system employs a… More >

  • Open AccessOpen Access

    ARTICLE

    Prototype Memory and Contrastive Learning Based Unsupervised Anomaly Detection for Time Series

    Xi Li1, Yingjie Chang1, Peng Chen1,*, Ang Bian1, Ning Lu1,2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.077521 - 08 May 2026
    Abstract Multivariate time series anomaly detection (MTSAD) is a critical task for real-time risk control and fault diagnosis in industrial monitoring, aerospace, and financial domains. Unsupervised MTSAD confronts three core challenges: label scarcity in practical scenarios, diverse anomaly patterns that demand adaptive modeling, and weak feature discriminability between normal and anomalous samples. To address these challenges, we propose a Prototype Memory and Contrastive Learning Based Unsupervised Anomaly Detection for Multivariate Time Series method named PC-UAD. PC-UAD comprises three core modules with hierarchical functionalities: (1) A Temporal PatchEmbedder, which adopts learnable positional encoding for dynamic temporal representation… More >

  • Open AccessOpen Access

    ARTICLE

    ArtFlow: Flow-Based Watermarking for High-Quality Artwork Images Protection

    Yuanjing Luo1,2,#, Xichen Tan1,#, Yinuo Jiang1, Zhiping Cai1,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.077803 - 08 May 2026
    Abstract With increasing artwork plagiarism incidents, the necessity of using digital watermarking technology for high-quality artwork copyright protection is evident. Current digital watermarking methods are limited in imperceptibility and robustness. To address this, based on comprehensive copyright protection research, we develop a novel watermark framework named ArtFlow, using Invertible Neural Networks (INN). Our framework treats watermark embedding and recovery as inverse image transformations, implemented through forward and reverse processes of INN. To ensure high-quality watermark embedding, we utilize frequency domain transformations and attention mechanisms to guide the watermark into high-frequency areas of the image that have More >

  • Open AccessOpen Access

    ARTICLE

    Personalized Fashion Recommendation Fusing Multi-Behavior and Multi-Modal Features

    Xin Lu1, Jian-Hong Wang1,*, Kuo-Chun Hsu2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078547 - 08 May 2026
    (This article belongs to the Special Issue: Intelligent Personalized Recommender Systems: Deep Learning and Multimodal Approaches)
    Abstract Aiming at the problems of data sparsity, uneven behavior weight allocation, and insufficient timeliness modeling existing in traditional recommendation systems in the scenario of personalized fashion recommendation, this paper proposes a personalized recommendation method that integrates multi-behavior weights and multi-modal features. A dynamic weighted collaborative filtering algorithm is designed, which comprehensively considers the multi-dimensional behaviors of users, and introduces a time attenuation factor to construct a time-sensitive user-item scoring matrix, so as to more accurately depict the dynamic changes of user interests. A multi-modal deep fusion framework is built: ResNet-50 is used to extract commodity… More >

  • Open AccessOpen Access

    ARTICLE

    Graph-Augmented Multi-Agent Robust Root Cause Analysis in AIOps

    Haodong Zou1,*, Yichen Zhao1, Xin Chen1, Ling Wang1, Jinghang Yu1, Long Yuan2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.077908 - 08 May 2026
    (This article belongs to the Special Issue: Multimodal Learning for Big Data)
    Abstract Root cause analysis (RCA), which leverages multi-modal observability data (including metrics, traces, and logs) to identify the fundamental source of system failures, is critical for ensuring the reliability of complex microservice systems. Traditionally, RCA has relied on human engineers to manually correlate these fragmented signals, which is a labor-intensive and error-prone process. Although recent AIOps advancements, particularly those leveraging Large Language Models (LLMs), aim to automate this workflow, they remain constrained by limitations. Existing methods often rely on single-modal data, restricting diagnostic comprehensiveness. Furthermore, approaches that utilize multi-modal data typically depend on simplistic temporal alignment,… More >

  • Open AccessOpen Access

    ARTICLE

    An AI-Blockchain Hybrid Model to Enhance Security and Trust in Web 4.0

    Samer R. Sabbah1, Mohammad Rasmi Al-Mousa1, Ala’a Al-Shaikh2, Ahmad Al Smadi3,*, Suhaila Abuowaida4, Amina Salhi5,*, Arij Alfaidi6
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079241 - 08 May 2026
    (This article belongs to the Special Issue: Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations)
    Abstract Web 4.0 platforms introduce intelligent, decentralized agents and real-time interactions that increase both utility and attack surface. This paper presents a comprehensive, reproducible AI blockchain hybrid designed to (1) detect SQL injection attacks at scale using a textual TFIDF + machine-learning pipeline, (2) incorporate reputation signals from a real-world Bitcoin OTC trust dataset to compute a TrustAlert Score (TAS) that prioritizes alerts and guides logging policy, and (3) record privacy-preserving audit digests on blockchain, optionally attested via a zero-knowledge proof (ZKP) pipeline. We evaluate the system on a 148 k SQL corpus and Soc-SignBitcoinOTC reputation More >

  • Open AccessOpen Access

    ARTICLE

    ATC-FusionNet: A Hybrid Deep Learning Ensemble for Network Intrusion Detection Systems

    Liping Wang1, Jiang Wu1,2,*, Liang Wang3
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078591 - 08 May 2026
    Abstract The rapid growth of networked systems and the increasing diversity of cyberattack behaviors have posed significant challenges to intrusion detection, particularly in scenarios characterized by high-dimensional features and severe class imbalance. Conventional detection approaches based on handcrafted rules or shallow representations often exhibit limited robustness under such conditions. To address these issues, this paper presents a hybrid deep learning framework for network intrusion detection that integrates complementary feature learning mechanisms within a dual-branch architecture. Specifically, a Transformer branch is employed to model long-range temporal dependencies in network traffic, while a convolutional neural network branch (CNN)… More >

  • Open AccessOpen Access

    ARTICLE

    Hierarchical Joint Cross-Modal Attention and Gating Mechanism for Multimodal Sentiment Analysis

    Shuqiu Tan, Chunsheng Tan, Yahui Liu*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.077982 - 08 May 2026
    (This article belongs to the Special Issue: Sentiment Analysis for Social Media Data: Lexicon-Based and Large Language Model Approaches)
    Abstract Multimodal sentiment analysis aims to accurately identify emotional states by comprehensively utilizing information from multiple sources such as text, audio, and visual data. However, semantic heterogeneity and temporal differences exist between different modalities, limiting the effectiveness of feature fusion. To address this issue, this paper proposes a hierarchical joint cross-modal attention and gating mechanism (HJCAG) for multimodal sentiment analysis. This method introduces a hierarchical structure, dividing modal interactions into bimodal and trimodal layers to progressively model the semantic relevance between modalities. First, deep features are extracted from text, audio, and visual modalities using pre-trained models… More >

  • Open AccessOpen Access

    ARTICLE

    Charging Scheduling of Clustered Wireless Rechargeable Sensor Networks Considering Dynamic Selection of Cluster Heads

    Mengqi Liu, Haiqing Yao*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078181 - 08 May 2026
    (This article belongs to the Special Issue: Advances in Wireless Sensor Networks: Security, Efficiency, and Intelligence)
    Abstract For the wide-coverage application scenarios, wireless rechargeable sensor networks are normally divided into multiple clusters to support the diversity and flexibility for monitoring, and use the mobile charger (MC) to support the sustainable charging of the network. Many efforts focus on optimizing the cluster head selection and mobile charger scheduling to improve the network energy efficiency and reliability. However, the existing work tends to use fixed triggering mechanism for cluster head (CH) rotation, and may trigger the rotation either too early or too late. Besides, the existing charging triggering mechanisms cannot track the changes in… More >

  • Open AccessOpen Access

    ARTICLE

    A Deep Reinforcement Learning-Based Pre-Allocation Mechanism for Efficient Task Offloading in Mobile Edge Computing

    Chaobin Wang1,2, Xianghong Tang1,2,*, Jianguang Lu1,2, Jing Yang1,2, Panliang Yuan1,2
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078998 - 08 May 2026
    Abstract Mobile Edge Computing (MEC) facilitates the rapid response and energy-efficient execution of tasks on mobile devices. However, determining whether and where to offload tasks remains a significant challenge due to the constantly changing character of workloads in MEC environments. To address this issue, this paper proposes PreAlloc-A2C—a deep reinforcement learning actor-critic-based framework that calculates allocation scores by leveraging both task features (task size, required completion time, and waiting time) and server features (queue length and historical workload). This design enables fully distributed task offloading decisions without centralized coordination. Additionally, a Long Short-Term Memory (LSTM) network More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Driven Real-Time PCB Inspection Using an Optimized YOLO v9 Architecture

    Jigar Sarda1, Rohan Vaghela1, Akash Kumar Bhoi2, Chang-Won Yoon3,*, Mangal Sain4,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.080112 - 08 May 2026
    Abstract Printed circuit boards (PCBs) are essential components that strongly influence the performance and reliability of modern electronic systems. However, minor and visually subtle manufacturing defects can degrade product quality and pose serious challenges for automated inspection systems. Existing deep learning–based methods often struggle to simultaneously achieve high detection accuracy, real-time processing speed, and compact model size. This study proposes an enhanced approach for real-time PCB defect detection using advanced object detection models. A dedicated dataset of bare PCBs was developed and carefully annotated with six defect categories: open circuits, missing holes, spurs, mouse bites, short… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-View Latent Imitation Learning with Mamba-Based Action Encoding for Unmanned Surface Vehicle Navigation

    Manh-Tuan Ha1, Nhu-Nghia Bui2, Dinh-Quy Vu1,*, Thai-Viet Dang2,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.078280 - 08 May 2026
    (This article belongs to the Special Issue: Intelligent Perception, Decision-making and Security Control for Unmanned Systems in Complex Environments)
    Abstract The development of Unmanned Surface Vehicles (USVs) has become a key focus in marine robotics, fueling the need for navigation systems capable of performing complex and delicate tasks with speed and precision. However, the end-to-end path tracking process often encounters challenges in learning efficiency, and generalization, and varying environmental conditions. To achieve sample-efficient and robust USV navigation in dynamic maritime environments, the paper proposes a novel hierarchical multi-view latent imitation learning (IL) architecture. By formulating a latent IL objective, the framework disentangles diverse navigation modalities through continuous variables, preventing mode collapse and enhancing behavioral adaptability… More >

  • Open AccessOpen Access

    ARTICLE

    FNRE: A Novel Approach to Heterogeneous Label Noise Rates Estimation in Federated Learning

    Qian Rong1, Lu Zhang2, Ling Yuan1,*, Zhong Yang3, Guohui Li3
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.075102 - 08 May 2026
    Abstract Federated learning (FL) enables collaborative model training across decentralized clients without sharing raw data, thereby preserving privacy. However, in real-world FL deployments—such as sensor-based activity recognition, wearable health monitoring, and industrial Internet of Things, where local training data often suffer from heterogeneous noisy labels due to diverse collection environments, sensor limitations, and labeling errors. These noisy labels, typically distributed unevenly across clients due to differences in client-side annotation, exacerbate Non-Independent and Identically Distributed (non-IID) data issues, leading to biased updates, unstable convergence, and degraded global model performance. Accurate estimation of client-specific noise rates is therefore… More >

  • Open AccessOpen Access

    ARTICLE

    WAFDect: A Malware Detection Model Based on Multi-Source Feature Fusion

    Xian Wu, Liang Wan*, Jingxia Ren, Bangfeng Zhang
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.077928 - 08 May 2026
    (This article belongs to the Special Issue: Advances in Intrusion Detection and Prevention Systems)
    Abstract Traditional malware detection models rely on a single feature source for detection, resulting in high false positive or false negative rates due to incomplete information. In addition, conventional models depend on manual feature engineering, which is inefficient and hard to adapt to new malware variants. To address these challenges, this paper proposes a malware detection model called WAFDect based on a self-attention mechanism with multi-source feature fusion. The model consists of two key designs. First, we construct a multi-source feature extraction model that analyzes multi-source data such as API call sequences, registry operation logs, file… More >

  • Open AccessOpen Access

    ARTICLE

    Month-Conditioned Boosting Framework with SHAP-in-the-Loop for Short-Term Electricity Load Forecasting

    Jinsung Park1,#, Jaehyuk Lee1,2,#, Eunchan Kim1,3,*
    CMC-Computers, Materials & Continua, Vol.88, No.1, 2026, DOI:10.32604/cmc.2026.079734 - 08 May 2026
    Abstract Accurate short-term load forecasting is essential for reliable power system operation, particularly under the increasing uncertainty caused by abnormal weather and socio-economic fluctuations. This study presents a month-conditioned boosting framework that integrates SHapley Additive Explanations (SHAPs) into model refinement. A baseline XGBoost model was first compared with linear and tree-based regressors, followed by enhancements through lagged and rolling-window features as well as loss weighting for vulnerable months. To further improve the performance, SHAP analysis was employed to identify the dominant error-contributing features, which guided the construction of targeted month-specific interaction terms for retraining. Experimental results More >

Per Page:

Share Link