Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,007)
  • Open Access

    ARTICLE

    CycleGAN-RRW: Blind Reversible Image Watermarking via Cycle-Consistent Adversarial Feature Encoding for Secure Image Ownership Authentication

    Mohammed Shamar Yadkar1, Sefer Kurnaz1, Saadaldeen Rashid Ahmed2,3,*

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.079408 - 09 April 2026

    Abstract This advanced research describes CycleGAN-RRW, a new reversible watermarking system for secure image ownership authentication. It uses Cycle-Consistent Generative Adversarial Networks with adaptive feature encoding. In areas such as law, forensics, and telemedicine, digital images usually contain private info that may be changed or used without authorization. Existing watermarking methods may decrease image quality, may not be reversible, or need outside keys. To address these problems, our model embeds metadata into intermediate feature maps with Adaptive Instance Normalization (AdaIN), based on adversarial and perceptual loss. The dual-generator design permits two-way translation between original and watermarked… More >

  • Open Access

    ARTICLE

    High-Resolution UAV Image Classification of Land Use and Land Cover Based on CNN Architecture Optimization

    Ching-Lung Fan*

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077260 - 09 April 2026

    Abstract Unmanned aerial vehicle (UAV) images have high spatial resolution and are cost-effective to acquire. UAV platforms are easy to control, and the prevalence of UAVs has led to an emerging field of remote sensing technologies. However, the details of high-resolution images often lead to fragmented classification results and significant scale differences between objects. Additionally, distinguishing between objects on the basis of shape or textural characteristics can be difficult. Conventional classification methods based on pixels and objects can indeed be ineffective at detecting complex and fine-scale land use and land cover (LULC) features. Therefore, in this More >

  • Open Access

    ARTICLE

    AgroGeoDB-Net: A DBSCAN-Guided Augmentation and Geometric-Similarity Regularised Framework for GNSS Field–Road Classification in Precision Agriculture

    Fengqi Hao1,2,3, Yawen Hou2,3, Conghui Gao2,3, Jinqiang Bai2,3, Gang Liu4, Hoiio Kong1,*, Xiangjun Dong1,2,3

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077252 - 09 April 2026

    Abstract Field–road classification, a fine-grained form of agricultural machinery operation-mode identification, aims to use Global Navigation Satellite System (GNSS) trajectory data to assign each trajectory point a semantic label indicating whether the machine is performing field work or travelling on roads. Existing methods struggle with highly imbalanced class distributions, noisy measurements, and intricate spatiotemporal dependencies. This paper presents AgroGeoDB-Net, a unified framework that combines a residual BiLSTM backbone with two tightly coupled innovations: (i) a Density-Aware Local Interpolator (DALI), which balances the minority road class via density-aware interpolation while preserving road-segment structure; and (ii) a geometry-aware… More >

  • Open Access

    ARTICLE

    HMF-Net: Hierarchical Multi-Feature Network for IIoT Malware Detection

    Faten S. Alamri1, Muhammad Amjad Raza2,3, Abeer Rashad Mirdad4, Adil Ali Saleem2, Tanzila Saba4,*

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077084 - 09 April 2026

    Abstract Rapid expansion of Industrial Internet of Things (IIoT) systems has heightened the vulnerability of critical infrastructure to sophisticated malware attacks. Traditional signature-based detection methods are ineffective against evolving threats, and many machine learning models fail to capture temporal behavior, offer interpretability, or operate efficiently in resource-constrained environments. This study proposes HMF-Net, a Hierarchical Multi-Feature Network, for accurate, interpretable, and efficient IIoT malware detection. HMF-Net combines hierarchical VT-Tag embedding (HVTE) to model semantic behavioral information, temporal detection ratio analysis (TDRA) to capture confidence variations for polymorphic malware, and static structural binary features. These features are fused… More >

  • Open Access

    ARTICLE

    Prediction of SMA Hysteresis Behavior: A Deep Learning Approach with Explainable AI

    Dmytro Tymoshchuk1,*, Oleh Yasniy1, Iryna Didych2, Pavlo Maruschak3,*, Yuri Lapusta4

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077062 - 09 April 2026

    Abstract This article presents an approach to predicting the hysteresis behavior of shape memory alloys (SMAs) using a Temporal Convolutional Network (TCN) deep learning model, followed by the interpretation of the results using Explainable Artificial Intelligence (XAI) methods. The experimental dataset was prepared based on cyclic loading tests of nickel-titanium wire at loading frequencies of 0.3, 0.5, 1, 3, and 5 Hz. For training, validation, and testing, 100–250 loading-unloading cycles were used. The input features of the models were stress σ (MPa), cycle number (Cycle parameter), and loading-unloading stage indicator, while the output variable was strain… More >

  • Open Access

    ARTICLE

    From Hardening to Understanding: Adversarial Training vs. CF-Aug for Explainable Cyber-Threat Detection System

    Malik Al-Essa1,*, Mohammad Qatawneh2,1, Ahmad Sami Al-Shamayleh3, Orieb Abualghanam1, Wesam Almobaideen4,1

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076608 - 09 April 2026

    Abstract Machine Learning (ML) intrusion detection systems (IDS) are vulnerable to manipulations: small, protocol-valid manipulations can push samples across brittle decision boundaries. We study two complementary remedies that reshape the learner in distinct ways. Adversarial Training (AT) exposes the model to worst-case, in-threat perturbations during learning to thicken local margins; Counterfactual Augmentation (CF-Aug) adds near-boundary exemplars that are explicitly constrained to be feasible, causally consistent, and operationally meaningful for defenders. The main goal of this work is to investigate and compare how AT and CF-Aug can reshape the decision surface of the IDS. eXplainable Artificial Intelligence More >

  • Open Access

    ARTICLE

    Handoff Decision-Making in 5G Cellular Networks Using Deep Learning

    Muhammad Mukhtar1,2, Farizah Yunus1, Ahmad Shukri Mohd Noor1,*, Zulfiqar Ali3, Muhammad Junaid4,*, Mehmood Ahmed4

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076246 - 09 April 2026

    Abstract The increasing adoption of 5G cellular networks has introduced significant challenges for network operators. The main challenge lies in the management of seamless handoff (HO), which occurs owing to the rapid expansion of equipment, data, and network complexity. To address this challenge, a model named optimal HO management deep learning neural network (OHMDLNN) is proposed. The model is trained on network activity data, and it uses KPIs (key performance indicators) and system-level parameters to make HO decisions. As demonstrated in the article, OHMDLNN is successful in analyzing the effect and interdependence of KPIs from both… More >

  • Open Access

    ARTICLE

    Deep-Learning Approaches to Text-Based Verification for Digital and Fake News Detection

    Raed Alotaibi1,*, Muhammad Atta Othman Ahmed2, Omar Reyad3,4,*, Nahla Fathy Omran5

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076156 - 09 April 2026

    Abstract The widespread use of social media has made assessing users’ tastes and preferences increasingly complex and important. At the same time, the rapid dissemination of misinformation on these platforms poses a critical challenge, driving significant efforts to develop effective detection methods. This study offers a comprehensive analysis leveraging advanced Machine Learning (ML) techniques to classify news articles as fake or true, contributing to discourse on media integrity and combating misinformation. The suggested method employed a diverse dataset encompassing a wide range of topics. The method evaluates the performance of five ML models: Artificial Neural Networks… More >

  • Open Access

    ARTICLE

    Domain Knowledge-Guided Training for NIDS: A Class-Agnostic Evaluation of Robustness on Imbalanced Datasets

    Zakaria S. M. Abdelhalim*, Nahla Belal, Mohamed Seifeldin

    Journal of Cyber Security, Vol.8, pp. 153-169, 2026, DOI:10.32604/jcs.2026.079097 - 06 April 2026

    Abstract The rapid expansion of IoT and cloud services has increased the scale and complexity of modern networks, making intrusion detection challenging. Although deep learning-based Network Intrusion Detection Systems (NIDS) often report high accuracy, such metrics can be misleading on highly imbalanced datasets, where performance is dominated by majority classes and rare attacks remain poorly detected. This issue stems from global optimization strategies that encourage models to rely on dominant feature patterns, limiting their ability to capture the class-specific features required to identify infrequent attack types. To address this limitation, this work proposes a domain knowledge-guided… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Structural Displacement Identification and Quantification under Target Feature Loss

    Lishuai Zhu1, Guangcai Zhang1,*, Qun Xie1,*, Zhen Peng2, Li Ai3, Ruijun Liang1, Taochun Yang1

    Structural Durability & Health Monitoring, Vol.20, No.2, 2026, DOI:10.32604/sdhm.2025.074620 - 31 March 2026

    Abstract Structural displacement monitoring faces significant challenges under complex environmental conditions due to the loss or degradation of target features, making it difficult for traditional methods to ensure high accuracy and robustness. Therefore, this study proposes a structural displacement identification and quantification method that integrates YOLOv8n with an improved edge-orientation gradient-based template matching algorithm. By combining deep learning techniques with traditional template matching methods, the accuracy and robustness of monitoring are enhanced under adverse conditions such as noise and extremely low illumination. Specifically, in the edge-orientation gradient matching stage, the Canny-Devernay sub-pixel edge detection technique and… More >

Displaying 1-10 on page 1 of 2007. Per Page