Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13,533)
  • Open Access

    ARTICLE

    Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Fei Li1, *, Jiayan Zhang1, Edward Szczerbicki2, Jiaqi Song1, Ruxiang Li 1, Renhong Diao1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 653-681, 2020, DOI:10.32604/cmc.2020.011264 - 23 July 2020

    Abstract The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to More >

  • Open Access

    ARTICLE

    Semi-GSGCN: Social Robot Detection Research with Graph Neural Network

    Xiujuan Wang1, Qianqian Zheng1, *, Kangfeng Zheng2, Yi Sui1, Jiayue Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 617-638, 2020, DOI:10.32604/cmc.2020.011165 - 23 July 2020

    Abstract Malicious social robots are the disseminators of malicious information on social networks, which seriously affect information security and network environments. Efficient and reliable classification of social robots is crucial for detecting information manipulation in social networks. Supervised classification based on manual feature extraction has been widely used in social robot detection. However, these methods not only involve the privacy of users but also ignore hidden feature information, especially the graph feature, and the label utilization rate of semi-supervised algorithms is low. Aiming at the problems of shallow feature extraction and low label utilization rate in… More >

  • Open Access

    ARTICLE

    A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen

    Lejun Zhang1, 2, Zhijie Zhang1, Weizheng Wang3, Rasheed Waqas1, Chunhui Zhao1, 4, Seokhoon Kim5, Huiling Chen6, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 597-616, 2020, DOI:10.32604/cmc.2020.011554 - 23 July 2020

    Abstract As an extension of the traditional encryption technology, information hiding has been increasingly used in the fields of communication and network media, and the covert communication technology has gradually developed. The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance, which can effectively alleviate the disadvantages and problems of traditional covert communication. However, its combination with covert communication thus far has been mostly at the theoretical level. The BLOCCE method, as an early result of the combination of blockchain and covert communication technology, has the problems of low… More >

  • Open Access

    ARTICLE

    Jointly Part-of-Speech Tagging and Semantic Role Labeling Using Auxiliary Deep Neural Network Model

    Yatian Shen1, Yubo Mai2, Xiajiong Shen2, Wenke Ding2, *, Mengjiao Guo3

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 529-541, 2020, DOI:10.32604/cmc.2020.011139 - 23 July 2020

    Abstract Previous studies have shown that there is potential semantic dependency between part-of-speech and semantic roles. At the same time, the predicate-argument structure in a sentence is important information for semantic role labeling task. In this work, we introduce the auxiliary deep neural network model, which models semantic dependency between part-of-speech and semantic roles and incorporates the information of predicate-argument into semantic role labeling. Based on the framework of joint learning, part-of-speech tagging is used as an auxiliary task to improve the result of the semantic role labeling. In addition, we introduce the argument recognition layer More >

  • Open Access

    ARTICLE

    An Approach for Radar Quantitative Precipitation Estimation Based on Spatiotemporal Network

    Shengchun Wang1, Xiaozhong Yu1, Lianye Liu2, Jingui Huang1, *, Tsz Ho Wong3, Chengcheng Jiang1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 459-479, 2020, DOI:10.32604/cmc.2020.010627 - 23 July 2020

    Abstract Radar quantitative precipitation estimation (QPE) is a key and challenging task for many designs and applications with meteorological purposes. Since the Z-R relation between radar and rain has a number of parameters on different areas, and the rainfall varies with seasons, the traditional methods are incapable of achieving high spatial and temporal resolution and thus difficult to obtain a refined rainfall estimation. This paper proposes a radar quantitative precipitation estimation algorithm based on the spatiotemporal network model (ST-QPE), which designs a convolutional time-series network QPE-Net8 and a multi-scale feature fusion time-series network QPE-Net22 to address More >

  • Open Access

    ARTICLE

    Quantum Generative Model with Variable-Depth Circuit

    Yiming Huang1, *, Hang Lei1, Xiaoyu Li1, *, Qingsheng Zhu2, Wanghao Ren3, Xusheng Liu2, 4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 445-458, 2020, DOI:10.32604/cmc.2020.010390 - 23 July 2020

    Abstract In recent years, an increasing number of studies about quantum machine learning not only provide powerful tools for quantum chemistry and quantum physics but also improve the classical learning algorithm. The hybrid quantum-classical framework, which is constructed by a variational quantum circuit (VQC) and an optimizer, plays a key role in the latest quantum machine learning studies. Nevertheless, in these hybridframework-based quantum machine learning models, the VQC is mainly constructed with a fixed structure and this structure causes inflexibility problems. There are also few studies focused on comparing the performance of quantum generative models with… More >

  • Open Access

    ARTICLE

    A Novel Design of Mechanical Switch for the High Overload Environment

    Yu Wang1, Chen Liu1, Lei Wang2, Lihua Zhu1, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 419-432, 2020, DOI:10.32604/cmc.2020.010911 - 23 July 2020

    Abstract The internal structure of the inertial measurement unit (IMU) in active state is easily damaged in the high overload environment. So that the IMU is usually required to be powered within the disappearance of the high overload. In this paper, a mechanical switch is designed to enable the IMU based on the analysis of the impact of high overload on the power-supply circuit. In which, parameters of mechanical switch are determined through theoretical calculation and data analysis. The innovation of the proposed structure lies in that the mechanical switch is triggered through the high overload More >

  • Open Access

    ARTICLE

    A Novel Beam Search to Improve Neural Machine Translation for English-Chinese

    Xinyue Lin1, Jin Liu1, *, Jianming Zhang2, Se-Jung Lim3

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 387-404, 2020, DOI:10.32604/cmc.2020.010984 - 23 July 2020

    Abstract Neural Machine Translation (NMT) is an end-to-end learning approach for automated translation, overcoming the weaknesses of conventional phrase-based translation systems. Although NMT based systems have gained their popularity in commercial translation applications, there is still plenty of room for improvement. Being the most popular search algorithm in NMT, beam search is vital to the translation result. However, traditional beam search can produce duplicate or missing translation due to its target sequence selection strategy. Aiming to alleviate this problem, this paper proposed neural machine translation improvements based on a novel beam search evaluation function. And we More >

  • Open Access

    ARTICLE

    A Cache Replacement Policy Based on Multi-Factors for Named Data Networking

    Meiju Yu1, Ru Li1, *, Yuwen Chen2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 321-336, 2020, DOI:10.32604/cmc.2020.010831 - 23 July 2020

    Abstract Named Data Networking (NDN) is one of the most excellent future Internet architectures and every router in NDN has the capacity of caching contents passing by. It greatly reduces network traffic and improves the speed of content distribution and retrieval. In order to make full use of the limited caching space in routers, it is an urgent challenge to make an efficient cache replacement policy. However, the existing cache replacement policies only consider very few factors that affect the cache performance. In this paper, we present a cache replacement policy based on multi-factors for NDN… More >

  • Open Access

    ARTICLE

    Applying Stack Bidirectional LSTM Model to Intrusion Detection

    Ziyong Ran1, Desheng Zheng1, *, Yanling Lai1, Lulu Tian2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 309-320, 2020, DOI:10.32604/cmc.2020.010102 - 23 July 2020

    Abstract Nowadays, Internet has become an indispensable part of daily life and is used in many fields. Due to the large amount of Internet traffic, computers are subject to various security threats, which may cause serious economic losses and even endanger national security. It is hoped that an effective security method can systematically classify intrusion data in order to avoid leakage of important data or misuse of data. As machine learning technology matures, deep learning is widely used in various industries. Combining deep learning with network security and intrusion detection is the current trend. In this… More >

Displaying 9591-9600 on page 960 of 13533. Per Page