Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (64)
  • Open Access


    An Intrusion Detection Method Based on a Universal Gravitation Clustering Algorithm

    Jian Yu1,2,*, Gaofeng Yu3, Xiangmei Xiao1,2, Zhixing Lin1,2

    Journal of Cyber Security, Vol.6, pp. 41-68, 2024, DOI:10.32604/jcs.2024.049658

    Abstract With the rapid advancement of the Internet, network attack methods are constantly evolving and adapting. To better identify the network attack behavior, a universal gravitation clustering algorithm was proposed by analyzing the dissimilarities and similarities of the clustering algorithms. First, the algorithm designated the cluster set as vacant, with the introduction of a new object. Subsequently, a new cluster based on the given object was constructed. The dissimilarities between it and each existing cluster were calculated using a defined difference measure. The minimum dissimilarity was selected. Through comparing the proposed algorithm with the traditional Back More >

  • Open Access


    Smart Contract Vulnerability Detection Method Based on Feature Graph and Multiple Attention Mechanisms

    Zhenxiang He*, Zhenyu Zhao, Ke Chen, Yanlin Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3023-3045, 2024, DOI:10.32604/cmc.2024.050281

    Abstract The fast-paced development of blockchain technology is evident. Yet, the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem. Conventional smart contract vulnerability detection primarily relies on static analysis tools, which are less efficient and accurate. Although deep learning methods have improved detection efficiency, they are unable to fully utilize the static relationships within contracts. Therefore, we have adopted the advantages of the above two methods, combining feature extraction mode of tools with deep learning techniques. Firstly, we have constructed corresponding feature extraction mode for… More >

  • Open Access


    Cluster Detection Method of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network

    Ruchun Jia1, Jianwei Zhang1,*, Yi Lin1, Yunxiang Han1, Feike Yang2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2523-2546, 2024, DOI:10.32604/cmc.2024.047543

    Abstract In order to enhance the accuracy of Air Traffic Control (ATC) cybersecurity attack detection, in this paper, a new clustering detection method is designed for air traffic control network security attacks. The feature set for ATC cybersecurity attacks is constructed by setting the feature states, adding recursive features, and determining the feature criticality. The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data. An autoencoder is introduced into the AI (artificial intelligence) algorithm to encode and… More >

  • Open Access


    A Novel Foreign Object Detection Method in Transmission Lines Based on Improved YOLOv8n

    Yakui Liu1,2,3,*, Xing Jiang1, Ruikang Xu1, Yihao Cui1, Chenhui Yu1, Jingqi Yang1, Jishuai Zhou1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1263-1279, 2024, DOI:10.32604/cmc.2024.048864

    Abstract The rapid pace of urban development has resulted in the widespread presence of construction equipment and increasingly complex conditions in transmission corridors. These conditions pose a serious threat to the safe operation of the power grid. Machine vision technology, particularly object recognition technology, has been widely employed to identify foreign objects in transmission line images. Despite its wide application, the technique faces limitations due to the complex environmental background and other auxiliary factors. To address these challenges, this study introduces an improved YOLOv8n. The traditional stepwise convolution and pooling layers are replaced with a spatial-depth… More >

  • Open Access


    A Simple and Effective Surface Defect Detection Method of Power Line Insulators for Difficult Small Objects

    Xiao Lu1,*, Chengling Jiang1, Zhoujun Ma1, Haitao Li2, Yuexin Liu2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 373-390, 2024, DOI:10.32604/cmc.2024.047469

    Abstract Insulator defect detection plays a vital role in maintaining the secure operation of power systems. To address the issues of the difficulty of detecting small objects and missing objects due to the small scale, variable scale, and fuzzy edge morphology of insulator defects, we construct an insulator dataset with 1600 samples containing flashovers and breakages. Then a simple and effective surface defect detection method of power line insulators for difficult small objects is proposed. Firstly, a high-resolution feature map is introduced and a small object prediction layer is added so that the model can detect… More >

  • Open Access


    Social Robot Detection Method with Improved Graph Neural Networks

    Zhenhua Yu, Liangxue Bai, Ou Ye*, Xuya Cong

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1773-1795, 2024, DOI:10.32604/cmc.2023.047130

    Abstract Social robot accounts controlled by artificial intelligence or humans are active in social networks, bringing negative impacts to network security and social life. Existing social robot detection methods based on graph neural networks suffer from the problem of many social network nodes and complex relationships, which makes it difficult to accurately describe the difference between the topological relations of nodes, resulting in low detection accuracy of social robots. This paper proposes a social robot detection method with the use of an improved neural network. First, social relationship subgraphs are constructed by leveraging the user’s social… More >

  • Open Access


    A Time Series Intrusion Detection Method Based on SSAE, TCN and Bi-LSTM

    Zhenxiang He*, Xunxi Wang, Chunwei Li

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 845-871, 2024, DOI:10.32604/cmc.2023.046607

    Abstract In the fast-evolving landscape of digital networks, the incidence of network intrusions has escalated alarmingly. Simultaneously, the crucial role of time series data in intrusion detection remains largely underappreciated, with most systems failing to capture the time-bound nuances of network traffic. This leads to compromised detection accuracy and overlooked temporal patterns. Addressing this gap, we introduce a novel SSAE-TCN-BiLSTM (STL) model that integrates time series analysis, significantly enhancing detection capabilities. Our approach reduces feature dimensionality with a Stacked Sparse Autoencoder (SSAE) and extracts temporally relevant features through a Temporal Convolutional Network (TCN) and Bidirectional Long… More >

  • Open Access


    An Industrial Intrusion Detection Method Based on Hybrid Convolutional Neural Networks with Improved TCN

    Zhihua Liu, Shengquan Liu*, Jian Zhang

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 411-433, 2024, DOI:10.32604/cmc.2023.046237

    Abstract Network intrusion detection systems (NIDS) based on deep learning have continued to make significant advances. However, the following challenges remain: on the one hand, simply applying only Temporal Convolutional Networks (TCNs) can lead to models that ignore the impact of network traffic features at different scales on the detection performance. On the other hand, some intrusion detection methods consider multi-scale information of traffic data, but considering only forward network traffic information can lead to deficiencies in capturing multi-scale temporal features. To address both of these issues, we propose a hybrid Convolutional Neural Network that supports… More >

  • Open Access


    An Intelligent Detection Method for Optical Remote Sensing Images Based on Improved YOLOv7

    Chao Dong, Xiangkui Jiang*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3015-3036, 2023, DOI:10.32604/cmc.2023.044735

    Abstract To address the issue of imbalanced detection performance and detection speed in current mainstream object detection algorithms for optical remote sensing images, this paper proposes a multi-scale object detection model for remote sensing images on complex backgrounds, called DI-YOLO, based on You Only Look Once v7-tiny (YOLOv7-tiny). Firstly, to enhance the model’s ability to capture irregular-shaped objects and deformation features, as well as to extract high-level semantic information, deformable convolutions are used to replace standard convolutions in the original model. Secondly, a Content Coordination Attention Feature Pyramid Network (CCA-FPN) structure is designed to replace the… More >

  • Open Access


    Multi-Equipment Detection Method for Distribution Lines Based on Improved YOLOx-s

    Lei Hu1,*, Yuanwen Lu1, Si Wang2, Wenbin Wang3, Yongmei Zhang4

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2735-2749, 2023, DOI:10.32604/cmc.2023.042974

    Abstract The YOLOx-s network does not sufficiently meet the accuracy demand of equipment detection in the autonomous inspection of distribution lines by Unmanned Aerial Vehicle (UAV) due to the complex background of distribution lines, variable morphology of equipment, and large differences in equipment sizes. Therefore, aiming at the difficult detection of power equipment in UAV inspection images, we propose a multi-equipment detection method for inspection of distribution lines based on the YOLOx-s. Based on the YOLOx-s network, we make the following improvements: 1) The Receptive Field Block (RFB) module is added after the shallow feature layer… More >

Displaying 1-10 on page 1 of 64. Per Page