Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (104)
  • Open Access

    ARTICLE

    Interpretable Smart Contract Vulnerability Detection with LLM-Augmented Hilbert-Schmidt Information Bottleneck

    Yiming Yu1, Yunfei Guo2, Junchen Liu3, Yiping Sun4, Junliang Du5,*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2025.074959 - 12 March 2026

    Abstract Graph neural networks (GNNs) have shown notable success in identifying security vulnerabilities within Ethereum smart contracts by capturing structural relationships encoded in control- and data-flow graphs. Despite their effectiveness, most GNN-based vulnerability detectors operate as black boxes, making their decisions difficult to interpret and thus less suitable for critical security auditing. The information bottleneck (IB) principle provides a theoretical framework for isolating task-relevant graph components. However, existing IB-based implementations often encounter unstable optimization and limited understanding of code semantics. To address these issues, we introduce ContractGIB, an interpretable graph information bottleneck framework for function-level vulnerability More >

  • Open Access

    ARTICLE

    Exploring Recovery through Life Narratives in Psychiatric Home-Visit Nursing: A Natural Language Processing Approach Using BERTopic

    Ichiro Kutsuna1,2,*, Masanao Ikeya2,3, Akane Fujii2, Aiko Hoshino4, Kazuya Sakai1

    International Journal of Mental Health Promotion, Vol.28, No.2, 2026, DOI:10.32604/ijmhp.2025.074249 - 27 February 2026

    Abstract Background: In mental health, recovery is emphasized, and qualitative analyses of service users’ narratives have accumulated; however, while qualitative approaches excel at capturing rich context and generating new concepts, they are limited in generalizability and feasible data volume. This study aimed to quantify the subjective life history narratives of users of psychiatric home-visit nursing using natural language processing (NLP) and to clarify the relationships between linguistic features and recovery-related indicators. Methods: We conducted audio-recorded and transcribed semi-structured interviews on daily life verbatim and collected self-report questionnaires (Recovery Assessment Scale [RAS]) and clinician ratings (Global Assessment of… More >

  • Open Access

    ARTICLE

    Fine Tuned QA Models for Java Programming

    Jeevan Pralhad Tonde*, Satish Sankaye

    Journal on Artificial Intelligence, Vol.8, pp. 107-118, 2026, DOI:10.32604/jai.2026.075857 - 13 February 2026

    Abstract As education continues to evolve alongside artificial intelligence, there is growing interest in how large language models (LLMs) can support more personalized and intelligent learning experiences. This study focuses on building a domain-specific question answering (QA) system tailored to computer science education, with a particular emphasis on Java programming. While transformer-based models such as BERT, RoBERTa, and DistilBERT have demonstrated strong performance on general-purpose datasets like SQuAD, they often struggle with technical educational content where annotated data is scarce. To address this challenge, we developed a custom dataset, JavaFactoidQA, consisting of 1000 fact-based question–answer pairs… More >

  • Open Access

    ARTICLE

    A Knowledge-Distilled CharacterBERT-BiLSTM-ATT Framework for Lightweight DGA Detection in IoT Devices

    Chengqi Liu1, Yongtao Li2, Weiping Zou3,*, Deyu Lin4,5,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074975 - 10 February 2026

    Abstract With the large-scale deployment of the Internet of Things (IoT) devices, their weak security mechanisms make them prime targets for malware attacks. Attackers often use Domain Generation Algorithm (DGA) to generate random domain names, hiding the real IP of Command and Control (C&C) servers to build botnets. Due to the randomness and dynamics of DGA, traditional methods struggle to detect them accurately, increasing the difficulty of network defense. This paper proposes a lightweight DGA detection model based on knowledge distillation for resource-constrained IoT environments. Specifically, a teacher model combining CharacterBERT, a bidirectional long short-term memory More >

  • Open Access

    ARTICLE

    Mitigating Adversarial Obfuscation in Named Entity Recognition with Robust SecureBERT Finetuning

    Nouman Ahmad1,*, Changsheng Zhang1, Uroosa Sehar2,3,4

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073029 - 10 February 2026

    Abstract Although Named Entity Recognition (NER) in cybersecurity has historically concentrated on threat intelligence, vital security data can be found in a variety of sources, such as open-source intelligence and unprocessed tool outputs. When dealing with technical language, the coexistence of structured and unstructured data poses serious issues for traditional BERT-based techniques. We introduce a three-phase approach for improved NER in multi-source cybersecurity data that makes use of large language models (LLMs). To ensure thorough entity coverage, our method starts with an identification module that uses dynamic prompting techniques. To lessen hallucinations, the extraction module uses… More >

  • Open Access

    ARTICLE

    Exact Computer Modeling of Photovoltaic Sources with Lambert-W Explicit Solvers for Real-Time Emulation and Controller Verification

    Abdulaziz Almalaq1, Ambe Harrison2,*, Ibrahim Alsaleh1, Abdullah Alassaf1, Mashari Alangari1

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2025.074815 - 29 January 2026

    Abstract We present a computer-modeling framework for photovoltaic (PV) source emulation that preserves the exact single-diode physics while enabling iteration-free, real-time evaluation. We derive two closed-form explicit solvers based on the Lambert W function: a voltage-driven V-Lambert solver for high-fidelity I–V computation and a resistance-driven R-Lambert solver designed for seamless integration in a closed-loop PV emulator. Unlike Taylor-linearized explicit models, our proposed formulation retains the exponential nonlinearity of the PV equations. It employs a numerically stable analytical evaluation that eliminates the need for lookup tables and root-finding, all while maintaining limited computational costs and a small… More >

  • Open Access

    ARTICLE

    Context-Aware Spam Detection Using BERT Embeddings with Multi-Window CNNs

    Sajid Ali1, Qazi Mazhar Ul Haq1,2,*, Ala Saleh Alluhaidan3,*, Muhammad Shahid Anwar4, Sadique Ahmad5, Leila Jamel3

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2026.074395 - 29 January 2026

    Abstract Spam emails remain one of the most persistent threats to digital communication, necessitating effective detection solutions that safeguard both individuals and organisations. We propose a spam email classification framework that uses Bidirectional Encoder Representations from Transformers (BERT) for contextual feature extraction and a multiple-window Convolutional Neural Network (CNN) for classification. To identify semantic nuances in email content, BERT embeddings are used, and CNN filters extract discriminative n-gram patterns at various levels of detail, enabling accurate spam identification. The proposed model outperformed Word2Vec-based baselines on a sample of 5728 labelled emails, achieving an accuracy of 98.69%, More >

  • Open Access

    ARTICLE

    Research on the Classification of Digital Cultural Texts Based on ASSC-TextRCNN Algorithm

    Zixuan Guo1, Houbin Wang2, Sameer Kumar1,*, Yuanfang Chen3

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072064 - 12 January 2026

    Abstract With the rapid development of digital culture, a large number of cultural texts are presented in the form of digital and network. These texts have significant characteristics such as sparsity, real-time and non-standard expression, which bring serious challenges to traditional classification methods. In order to cope with the above problems, this paper proposes a new ASSC (ALBERT, SVD, Self-Attention and Cross-Entropy)-TextRCNN digital cultural text classification model. Based on the framework of TextRCNN, the Albert pre-training language model is introduced to improve the depth and accuracy of semantic embedding. Combined with the dual attention mechanism, the… More >

  • Open Access

    ARTICLE

    A Novel Quantitative Detection of Sleeve Grouting Compactness Based on Ultrasonic Time-Frequency Dual-Domain Analysis

    Longqi Liao1, Jing Li2, Yuhua Li3, Yuemin Wang3, Jinhua Li1,*, Liyuan Cao4,*, Chunxiang Li4,*

    Structural Durability & Health Monitoring, Vol.20, No.1, 2026, DOI:10.32604/sdhm.2025.072237 - 08 January 2026

    Abstract Quantitative detection of sleeve grouting compactness is a technical challenge in civil engineering testing. This study explores a novel quantitative detection method based on ultrasonic time-frequency dual-domain analysis. It establishes a mapping relationship between sleeve grouting compactness and characteristic parameters. First, this study made samples with gradient defects for two types of grouting sleeves, G18 and G20. These included four cases: 2D, 4D, 6D defects (where D is the diameter of the grouting sleeve), and no-defect. Then, an ultrasonic input/output data acquisition system was established. Three-dimensional sound field distribution data were obtained through an orthogonal… More >

  • Open Access

    ARTICLE

    Log-Based Anomaly Detection of System Logs Using Graph Neural Network

    Eman Alsalmi, Abeer Alhuzali*, Areej Alhothali

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-20, 2026, DOI:10.32604/cmc.2025.071012 - 09 December 2025

    Abstract Log anomaly detection is essential for maintaining the reliability and security of large-scale networked systems. Most traditional techniques rely on log parsing in the reprocessing stage and utilize handcrafted features that limit their adaptability across various systems. In this study, we propose a hybrid model, BertGCN, that integrates BERT-based contextual embedding with Graph Convolutional Networks (GCNs) to identify anomalies in raw system logs, thereby eliminating the need for log parsing. The BERT module captures semantic representations of log messages, while the GCN models the structural relationships among log entries through a text-based graph. This combination More >

Displaying 1-10 on page 1 of 104. Per Page