Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,309)
  • Open Access

    ARTICLE

    TeachSecure-CTI: Adaptive Cybersecurity Curriculum Generation Using Threat Dynamics and AI

    Alaa Tolah*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074997 - 10 February 2026

    Abstract The rapidly evolving cybersecurity threat landscape exposes a critical flaw in traditional educational programs where static curricula cannot adapt swiftly to novel attack vectors. This creates a significant gap between theoretical knowledge and the practical defensive capabilities needed in the field. To address this, we propose TeachSecure-CTI, a novel framework for adaptive cybersecurity curriculum generation that integrates real-time Cyber Threat Intelligence (CTI) with AI-driven personalization. Our framework employs a layered architecture featuring a CTI ingestion and clustering module, natural language processing for semantic concept extraction, and a reinforcement learning agent for adaptive content sequencing. By… More >

  • Open Access

    ARTICLE

    Lexical-Prior-Free Planning: A Symbol-Agnostic Pipeline that Enables LLMs and LRMs to Plan under Obfuscated Interfaces

    Zhendong Du*, Hanliu Wang, Kenji Hashimoto

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074520 - 10 February 2026

    Abstract Planning in lexical-prior-free environments presents a fundamental challenge for evaluating whether large language models (LLMs) possess genuine structural reasoning capabilities beyond lexical memorization. When predicates and action names are replaced with semantically irrelevant random symbols while preserving logical structures, existing direct generation approaches exhibit severe performance degradation. This paper proposes a symbol-agnostic closed-loop planning pipeline that enables models to construct executable plans through systematic validation and iterative refinement. The system implements a complete generate-verify-repair cycle through six core processing components: semantic comprehension extracts structural constraints, language planner generates text plans, symbol translator performs structure-preserving mapping,… More >

  • Open Access

    ARTICLE

    HMA-DER: A Hierarchical Attention and Expert Routing Framework for Accurate Gastrointestinal Disease Diagnosis

    Sara Tehsin1, Inzamam Mashood Nasir1,*, Wiem Abdelbaki2, Fadwa Alrowais3, Khalid A. Alattas4, Sultan Almutairi5, Radwa Marzouk6

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074416 - 10 February 2026

    Abstract Objective: Deep learning is employed increasingly in Gastroenterology (GI) endoscopy computer-aided diagnostics for polyp segmentation and multi-class disease detection. In the real world, implementation requires high accuracy, therapeutically relevant explanations, strong calibration, domain generalization, and efficiency. Current Convolutional Neural Network (CNN) and transformer models compromise border precision and global context, generate attention maps that fail to align with expert reasoning, deteriorate during cross-center changes, and exhibit inadequate calibration, hence diminishing clinical trust. Methods: HMA-DER is a hierarchical multi-attention architecture that uses dilation-enhanced residual blocks and an explainability-aware Cognitive Alignment Score (CAS) regularizer to directly align… More >

  • Open Access

    ARTICLE

    Enhanced BEV Scene Segmentation: De-Noise Channel Attention for Resource-Constrained Environments

    Argho Dey1, Yunfei Yin1,2,*, Zheng Yuan1, Zhiwen Zeng1, Xianjian Bao3, Md Minhazul Islam1

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074122 - 10 February 2026

    Abstract Autonomous vehicles rely heavily on accurate and efficient scene segmentation for safe navigation and efficient operations. Traditional Bird’s Eye View (BEV) methods on semantic scene segmentation, which leverage multimodal sensor fusion, often struggle with noisy data and demand high-performance GPUs, leading to sensor misalignment and performance degradation. This paper introduces an Enhanced Channel Attention BEV (ECABEV), a novel approach designed to address the challenges under insufficient GPU memory conditions. ECABEV integrates camera and radar data through a de-noise enhanced channel attention mechanism, which utilizes global average and max pooling to effectively filter out noise while… More >

  • Open Access

    ARTICLE

    Big Data-Driven Federated Learning Model for Scalable and Privacy-Preserving Cyber Threat Detection in IoT-Enabled Healthcare Systems

    Noura Mohammed Alaskar1, Muzammil Hussain2, Saif Jasim Almheiri1, Atta-ur-Rahman3, Adnan Khan4,5,6, Khan M. Adnan7,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074041 - 10 February 2026

    Abstract The increasing number of interconnected devices and the incorporation of smart technology into contemporary healthcare systems have significantly raised the attack surface of cyber threats. The early detection of threats is both necessary and complex, yet these interconnected healthcare settings generate enormous amounts of heterogeneous data. Traditional Intrusion Detection Systems (IDS), which are generally centralized and machine learning-based, often fail to address the rapidly changing nature of cyberattacks and are challenged by ethical concerns related to patient data privacy. Moreover, traditional AI-driven IDS usually face challenges in handling large-scale, heterogeneous healthcare data while ensuring data… More >

  • Open Access

    ARTICLE

    An Integrated Attention-BiLSTM Approach for Probabilistic Remaining Useful Life Prediction

    Bo Zhu#, Enzhi Dong#, Zhonghua Cheng*, Kexin Jiang, Chiming Guo, Shuai Yue

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074009 - 10 February 2026

    Abstract Accurate prediction of remaining useful life serves as a reliable basis for maintenance strategies, effectively reducing both the frequency of failures and associated costs. As a core component of PHM, RUL prediction plays a crucial role in preventing equipment failures and optimizing maintenance decision-making. However, deep learning models often falter when processing raw, noisy temporal signals, fail to quantify prediction uncertainty, and face challenges in effectively capturing the nonlinear dynamics of equipment degradation. To address these issues, this study proposes a novel deep learning framework. First, a new bidirectional long short-term memory network integrated with More >

  • Open Access

    ARTICLE

    Enhancing Detection of AI-Generated Text: A Retrieval-Augmented Dual-Driven Defense Mechanism

    Xiaoyu Li1,2, Jie Zhang3, Wen Shi1,2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074005 - 10 February 2026

    Abstract The emergence of large language models (LLMs) has brought about revolutionary social value. However, concerns have arisen regarding the generation of deceptive content by LLMs and their potential for misuse. Consequently, a crucial research question arises: How can we differentiate between AI-generated and human-authored text? Existing detectors face some challenges, such as operating as black boxes, relying on supervised training, and being vulnerable to manipulation and misinformation. To tackle these challenges, we propose an innovative unsupervised white-box detection method that utilizes a “dual-driven verification mechanism” to achieve high-performance detection, even in the presence of obfuscated… More >

  • Open Access

    ARTICLE

    Toward Secure and Auditable Data Sharing: A Cross-Chain CP-ABE Framework

    Ye Tian1,*, Zhuokun Fan1, Yifeng Zhang2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073935 - 10 February 2026

    Abstract Amid the increasing demand for data sharing, the need for flexible, secure, and auditable access control mechanisms has garnered significant attention in the academic community. However, blockchain-based ciphertext-policy attribute-based encryption (CP-ABE) schemes still face cumbersome ciphertext re-encryption and insufficient oversight when handling dynamic attribute changes and cross-chain collaboration. To address these issues, we propose a dynamic permission attribute-encryption scheme for multi-chain collaboration. This scheme incorporates a multi-authority architecture for distributed attribute management and integrates an attribute revocation and granting mechanism that eliminates the need for ciphertext re-encryption, effectively reducing both computational and communication overhead. It More >

  • Open Access

    REVIEW

    Quantum Secure Multiparty Computation: Bridging Privacy, Security, and Scalability in the Post-Quantum Era

    Sghaier Guizani1,*, Tehseen Mazhar2,3,*, Habib Hamam4,5,6,7

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073883 - 10 February 2026

    Abstract The advent of quantum computing poses a significant challenge to traditional cryptographic protocols, particularly those used in Secure Multiparty Computation (MPC), a fundamental cryptographic primitive for privacy-preserving computation. Classical MPC relies on cryptographic techniques such as homomorphic encryption, secret sharing, and oblivious transfer, which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries. This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI, IEEE Explore, Springer, and Elsevier, examining the applications, types, and security issues with the solution of… More >

  • Open Access

    ARTICLE

    Detection of Maliciously Disseminated Hate Speech in Spanish Using Fine-Tuning and In-Context Learning Techniques with Large Language Models

    Tomás Bernal-Beltrán1, Ronghao Pan1, José Antonio García-Díaz1, María del Pilar Salas-Zárate2, Mario Andrés Paredes-Valverde2, Rafael Valencia-García1,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073629 - 10 February 2026

    Abstract The malicious dissemination of hate speech via compromised accounts, automated bot networks and malware-driven social media campaigns has become a growing cybersecurity concern. Automatically detecting such content in Spanish is challenging due to linguistic complexity and the scarcity of annotated resources. In this paper, we compare two predominant AI-based approaches for the forensic detection of malicious hate speech: (1) fine-tuning encoder-only models that have been trained in Spanish and (2) In-Context Learning techniques (Zero- and Few-Shot Learning) with large-scale language models. Our approach goes beyond binary classification, proposing a comprehensive, multidimensional evaluation that labels each… More >

Displaying 1-10 on page 1 of 5309. Per Page