Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    UGEA-LMD: A Continuous-Time Dynamic Graph Representation Enhancement Framework for Lateral Movement Detection

    Jizhao Liu, Yuanyuan Shao*, Shuqin Zhang, Fangfang Shan, Jun Li

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.068998 - 10 November 2025

    Abstract Lateral movement represents the most covert and critical phase of Advanced Persistent Threats (APTs), and its detection still faces two primary challenges: sample scarcity and “cold start” of new entities. To address these challenges, we propose an Uncertainty-Driven Graph Embedding-Enhanced Lateral Movement Detection framework (UGEA-LMD). First, the framework employs event-level incremental encoding on a continuous-time graph to capture fine-grained behavioral evolution, enabling newly appearing nodes to retain temporal contextual awareness even in the absence of historical interactions and thereby fundamentally mitigating the cold-start problem. Second, in the embedding space, we model the dependency structure among… More >

  • Open Access

    ARTICLE

    SA-WGAN Based Data Enhancement Method for Industrial Internet Intrusion Detection

    Yuan Feng1, Yajie Si2, Jianwei Zhang3,4,*, Zengyu Cai5,*, Hongying Zhao5

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4431-4449, 2025, DOI:10.32604/cmc.2025.064696 - 30 July 2025

    Abstract With the rapid development of the industrial Internet, the network security environment has become increasingly complex and variable. Intrusion detection, a core technology for ensuring the security of industrial control systems, faces the challenge of unbalanced data samples, particularly the low detection rates for minority class attack samples. Therefore, this paper proposes a data enhancement method for intrusion detection in the industrial Internet based on a Self-Attention Wasserstein Generative Adversarial Network (SA-WGAN) to address the low detection rates of minority class attack samples in unbalanced intrusion detection scenarios. The proposed method integrates a self-attention mechanism… More >

  • Open Access

    ARTICLE

    Rolling Bearing Fault Detection Based on Self-Adaptive Wasserstein Dual Generative Adversarial Networks and Feature Fusion under Small Sample Conditions

    Qiang Ma1,2,3,4,5, Zhuopei Wei1,2, Kai Yang1,2,*, Long Tian1,2, Zepeng Li1,2

    Structural Durability & Health Monitoring, Vol.19, No.4, pp. 1011-1035, 2025, DOI:10.32604/sdhm.2025.060596 - 30 June 2025

    Abstract An intelligent diagnosis method based on self-adaptive Wasserstein dual generative adversarial networks and feature fusion is proposed due to problems such as insufficient sample size and incomplete fault feature extraction, which are commonly faced by rolling bearings and lead to low diagnostic accuracy. Initially, dual models of the Wasserstein deep convolutional generative adversarial network incorporating gradient penalty (1D-2DWDCGAN) are constructed to augment the original dataset. A self-adaptive loss threshold control training strategy is introduced, and establishing a self-adaptive balancing mechanism for stable model training. Subsequently, a diagnostic model based on multidimensional feature fusion is designed,… More >

  • Open Access

    ARTICLE

    A Data-Enhanced Deep Learning Approach for Emergency Domain Question Intention Recognition in Urban Rail Transit

    Yinuo Chen1, Xu Wu1, Jiaxin Fan1, Guangyu Zhu2,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1597-1613, 2025, DOI:10.32604/cmc.2025.062779 - 09 June 2025

    Abstract The consultation intention of emergency decision-makers in urban rail transit (URT) is input into the emergency knowledge base in the form of domain questions to obtain emergency decision support services. This approach facilitates the rapid collection of complete knowledge and rules to form effective decisions. However, the current structured degree of the URT emergency knowledge base remains low, and the domain questions lack labeled datasets, resulting in a large deviation between the consultation outcomes and the intended objectives. To address this issue, this paper proposes a question intention recognition model for the URT emergency domain,… More >

  • Open Access

    ARTICLE

    Research on Enhanced Contraband Dataset ACXray Based on ETL

    Xueping Song1,*, Jianming Yang1, Shuyu Zhang1, Jicun Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4551-4572, 2024, DOI:10.32604/cmc.2024.049446 - 20 June 2024

    Abstract To address the shortage of public datasets for customs X-ray images of contraband and the difficulties in deploying trained models in engineering applications, a method has been proposed that employs the Extract-Transform-Load (ETL) approach to create an X-ray dataset of contraband items. Initially, X-ray scatter image data is collected and cleaned. Using Kafka message queues and the Elasticsearch (ES) distributed search engine, the data is transmitted in real-time to cloud servers. Subsequently, contraband data is annotated using a combination of neural networks and manual methods to improve annotation efficiency and implemented mean hash algorithm for… More >

  • Open Access

    ARTICLE

    A Novel Foreign Object Detection Method in Transmission Lines Based on Improved YOLOv8n

    Yakui Liu1,2,3,*, Xing Jiang1, Ruikang Xu1, Yihao Cui1, Chenhui Yu1, Jingqi Yang1, Jishuai Zhou1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1263-1279, 2024, DOI:10.32604/cmc.2024.048864 - 25 April 2024

    Abstract The rapid pace of urban development has resulted in the widespread presence of construction equipment and increasingly complex conditions in transmission corridors. These conditions pose a serious threat to the safe operation of the power grid. Machine vision technology, particularly object recognition technology, has been widely employed to identify foreign objects in transmission line images. Despite its wide application, the technique faces limitations due to the complex environmental background and other auxiliary factors. To address these challenges, this study introduces an improved YOLOv8n. The traditional stepwise convolution and pooling layers are replaced with a spatial-depth… More >

  • Open Access

    ARTICLE

    A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN

    Haizhen Wang1,2,*, Jinying Yan1,*, Na Jia1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 569-588, 2024, DOI:10.32604/cmc.2023.046055 - 30 January 2024

    Abstract Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured content. The extraction of encrypted traffic attributes and their subsequent identification presents a formidable challenge. The existing models have predominantly relied on direct extraction of encrypted traffic data from imbalanced datasets, with the dataset’s imbalance significantly affecting the model’s performance. In the present study, a new model, referred to as UD-VLD (Unbalanced Dataset-VAE-LSTM-DRN), was proposed to address above problem. The proposed model is an encrypted traffic identification model for handling unbalanced datasets. The encoder of the… More >

  • Open Access

    ARTICLE

    ProNet Adaptive Retinal Vessel Segmentation Algorithm Based on Improved UperNet Network

    Sijia Zhu1,*, Pinxiu Wang2, Ke Shen1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 283-302, 2024, DOI:10.32604/cmc.2023.045506 - 30 January 2024

    Abstract This paper proposes a new network structure, namely the ProNet network. Retinal medical image segmentation can help clinical diagnosis of related eye diseases and is essential for subsequent rational treatment. The baseline model of the ProNet network is UperNet (Unified perceptual parsing Network), and the backbone network is ConvNext (Convolutional Network). A network structure based on depth-separable convolution and 1 × 1 convolution is used, which has good performance and robustness. We further optimise ProNet mainly in two aspects. One is data enhancement using increased noise and slight angle rotation, which can significantly increase the… More >

  • Open Access

    ARTICLE

    Infrared Small Target Detection Algorithm Based on ISTD-CenterNet

    Ning Li*, Shucai Huang, Daozhi Wei

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3511-3531, 2023, DOI:10.32604/cmc.2023.045987 - 26 December 2023

    Abstract This paper proposes a real-time detection method to improve the Infrared small target detection CenterNet (ISTD-CenterNet) network for detecting small infrared targets in complex environments. The method eliminates the need for an anchor frame, addressing the issues of low accuracy and slow speed. HRNet is used as the framework for feature extraction, and an ECBAM attention module is added to each stage branch for intelligent identification of the positions of small targets and significant objects. A scale enhancement module is also added to obtain a high-level semantic representation and fine-resolution prediction map for the entire… More >

  • Open Access

    ARTICLE

    The Detection of Fraudulent Smart Contracts Based on ECA-EfficientNet and Data Enhancement

    Xuanchen Zhou1,2,3, Wenzhong Yang2,3,*, Liejun Wang2,3, Fuyuan Wei2,3, KeZiErBieKe HaiLaTi2,3, Yuanyuan Liao2,3

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 4073-4087, 2023, DOI:10.32604/cmc.2023.040253 - 26 December 2023

    Abstract With the increasing popularity of Ethereum, smart contracts have become a prime target for fraudulent activities such as Ponzi, honeypot, gambling, and phishing schemes. While some researchers have studied intelligent fraud detection, most research has focused on identifying Ponzi contracts, with little attention given to detecting and preventing gambling or phishing contracts. There are three main issues with current research. Firstly, there exists a severe data imbalance between fraudulent and non-fraudulent contracts. Secondly, the existing detection methods rely on diverse raw features that may not generalize well in identifying various classes of fraudulent contracts. Lastly,… More >

Displaying 1-10 on page 1 of 11. Per Page