Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access


    A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN

    Haizhen Wang1,2,*, Jinying Yan1,*, Na Jia1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 569-588, 2024, DOI:10.32604/cmc.2023.046055

    Abstract Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured content. The extraction of encrypted traffic attributes and their subsequent identification presents a formidable challenge. The existing models have predominantly relied on direct extraction of encrypted traffic data from imbalanced datasets, with the dataset’s imbalance significantly affecting the model’s performance. In the present study, a new model, referred to as UD-VLD (Unbalanced Dataset-VAE-LSTM-DRN), was proposed to address above problem. The proposed model is an encrypted traffic identification model for handling unbalanced datasets. The encoder of the variational autoencoder (VAE) is combined… More >

  • Open Access


    ProNet Adaptive Retinal Vessel Segmentation Algorithm Based on Improved UperNet Network

    Sijia Zhu1,*, Pinxiu Wang2, Ke Shen1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 283-302, 2024, DOI:10.32604/cmc.2023.045506

    Abstract This paper proposes a new network structure, namely the ProNet network. Retinal medical image segmentation can help clinical diagnosis of related eye diseases and is essential for subsequent rational treatment. The baseline model of the ProNet network is UperNet (Unified perceptual parsing Network), and the backbone network is ConvNext (Convolutional Network). A network structure based on depth-separable convolution and 1 × 1 convolution is used, which has good performance and robustness. We further optimise ProNet mainly in two aspects. One is data enhancement using increased noise and slight angle rotation, which can significantly increase the diversity of data and help… More >

  • Open Access


    Infrared Small Target Detection Algorithm Based on ISTD-CenterNet

    Ning Li*, Shucai Huang, Daozhi Wei

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3511-3531, 2023, DOI:10.32604/cmc.2023.045987

    Abstract This paper proposes a real-time detection method to improve the Infrared small target detection CenterNet (ISTD-CenterNet) network for detecting small infrared targets in complex environments. The method eliminates the need for an anchor frame, addressing the issues of low accuracy and slow speed. HRNet is used as the framework for feature extraction, and an ECBAM attention module is added to each stage branch for intelligent identification of the positions of small targets and significant objects. A scale enhancement module is also added to obtain a high-level semantic representation and fine-resolution prediction map for the entire infrared image. Besides, an improved… More >

  • Open Access


    The Detection of Fraudulent Smart Contracts Based on ECA-EfficientNet and Data Enhancement

    Xuanchen Zhou1,2,3, Wenzhong Yang2,3,*, Liejun Wang2,3, Fuyuan Wei2,3, KeZiErBieKe HaiLaTi2,3, Yuanyuan Liao2,3

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 4073-4087, 2023, DOI:10.32604/cmc.2023.040253

    Abstract With the increasing popularity of Ethereum, smart contracts have become a prime target for fraudulent activities such as Ponzi, honeypot, gambling, and phishing schemes. While some researchers have studied intelligent fraud detection, most research has focused on identifying Ponzi contracts, with little attention given to detecting and preventing gambling or phishing contracts. There are three main issues with current research. Firstly, there exists a severe data imbalance between fraudulent and non-fraudulent contracts. Secondly, the existing detection methods rely on diverse raw features that may not generalize well in identifying various classes of fraudulent contracts. Lastly, most prior studies have used… More >

  • Open Access


    Deep Learning-based Environmental Sound Classification Using Feature Fusion and Data Enhancement

    Rashid Jahangir1,*, Muhammad Asif Nauman2, Roobaea Alroobaea3, Jasem Almotiri3, Muhammad Mohsin Malik1, Sabah M. Alzahrani3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1069-1091, 2023, DOI:10.32604/cmc.2023.032719

    Abstract Environmental sound classification (ESC) involves the process of distinguishing an audio stream associated with numerous environmental sounds. Some common aspects such as the framework difference, overlapping of different sound events, and the presence of various sound sources during recording make the ESC task much more complicated and complex. This research is to propose a deep learning model to improve the recognition rate of environmental sounds and reduce the model training time under limited computation resources. In this research, the performance of transformer and convolutional neural networks (CNN) are investigated. Seven audio features, chromagram, Mel-spectrogram, tonnetz, Mel-Frequency Cepstral Coefficients (MFCCs), delta… More >

Displaying 1-10 on page 1 of 5. Per Page