Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,731)
  • Open Access

    ARTICLE

    Customized Convolutional Neural Network for Accurate Detection of Deep Fake Images in Video Collections

    Dmitry Gura1,2, Bo Dong3,*, Duaa Mehiar4, Nidal Al Said5

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1995-2014, 2024, DOI:10.32604/cmc.2024.048238

    Abstract The motivation for this study is that the quality of deep fakes is constantly improving, which leads to the need to develop new methods for their detection. The proposed Customized Convolutional Neural Network method involves extracting structured data from video frames using facial landmark detection, which is then used as input to the CNN. The customized Convolutional Neural Network method is the date augmented-based CNN model to generate ‘fake data’ or ‘fake images’. This study was carried out using Python and its libraries. We used 242 films from the dataset gathered by the Deep Fake Detection Challenge, of which 199… More >

  • Open Access

    ARTICLE

    Graph Convolutional Networks Embedding Textual Structure Information for Relation Extraction

    Chuyuan Wei*, Jinzhe Li, Zhiyuan Wang, Shanshan Wan, Maozu Guo

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3299-3314, 2024, DOI:10.32604/cmc.2024.047811

    Abstract Deep neural network-based relational extraction research has made significant progress in recent years, and it provides data support for many natural language processing downstream tasks such as building knowledge graph, sentiment analysis and question-answering systems. However, previous studies ignored much unused structural information in sentences that could enhance the performance of the relation extraction task. Moreover, most existing dependency-based models utilize self-attention to distinguish the importance of context, which hardly deals with multiple-structure information. To efficiently leverage multiple structure information, this paper proposes a dynamic structure attention mechanism model based on textual structure information, which deeply integrates word embedding, named… More >

  • Open Access

    ARTICLE

    Faster Region Convolutional Neural Network (FRCNN) Based Facial Emotion Recognition

    J. Sheril Angel1, A. Diana Andrushia1,*, T. Mary Neebha1, Oussama Accouche2, Louai Saker2, N. Anand3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2427-2448, 2024, DOI:10.32604/cmc.2024.047326

    Abstract Facial emotion recognition (FER) has become a focal point of research due to its widespread applications, ranging from human-computer interaction to affective computing. While traditional FER techniques have relied on handcrafted features and classification models trained on image or video datasets, recent strides in artificial intelligence and deep learning (DL) have ushered in more sophisticated approaches. The research aims to develop a FER system using a Faster Region Convolutional Neural Network (FRCNN) and design a specialized FRCNN architecture tailored for facial emotion recognition, leveraging its ability to capture spatial hierarchies within localized regions of facial features. The proposed work enhances… More >

  • Open Access

    ARTICLE

    LDAS&ET-AD: Learnable Distillation Attack Strategies and Evolvable Teachers Adversarial Distillation

    Shuyi Li, Hongchao Hu*, Xiaohan Yang, Guozhen Cheng, Wenyan Liu, Wei Guo

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2331-2359, 2024, DOI:10.32604/cmc.2024.047275

    Abstract Adversarial distillation (AD) has emerged as a potential solution to tackle the challenging optimization problem of loss with hard labels in adversarial training. However, fixed sample-agnostic and student-egocentric attack strategies are unsuitable for distillation. Additionally, the reliability of guidance from static teachers diminishes as target models become more robust. This paper proposes an AD method called Learnable Distillation Attack Strategies and Evolvable Teachers Adversarial Distillation (LDAS&ET-AD). Firstly, a learnable distillation attack strategies generating mechanism is developed to automatically generate sample-dependent attack strategies tailored for distillation. A strategy model is introduced to produce attack strategies that enable adversarial examples (AEs) to… More >

  • Open Access

    ARTICLE

    Shear Let Transform Residual Learning Approach for Single-Image Super-Resolution

    Israa Ismail1,*, Ghada Eltaweel1, Mohamed Meselhy Eltoukhy1,2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3193-3209, 2024, DOI:10.32604/cmc.2023.043873

    Abstract Super-resolution techniques are employed to enhance image resolution by reconstructing high-resolution images from one or more low-resolution inputs. Super-resolution is of paramount importance in the context of remote sensing, satellite, aerial, security and surveillance imaging. Super-resolution remote sensing imagery is essential for surveillance and security purposes, enabling authorities to monitor remote or sensitive areas with greater clarity. This study introduces a single-image super-resolution approach for remote sensing images, utilizing deep shearlet residual learning in the shearlet transform domain, and incorporating the Enhanced Deep Super-Resolution network (EDSR). Unlike conventional approaches that estimate residuals between high and low-resolution images, the proposed approach… More >

  • Open Access

    ARTICLE

    Combo Packet: An Encryption Traffic Classification Method Based on Contextual Information

    Yuancong Chai, Yuefei Zhu*, Wei Lin, Ding Li

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1223-1243, 2024, DOI:10.32604/cmc.2024.049904

    Abstract With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has become a core key technology in network supervision. In recent years, many different solutions have emerged in this field. Most methods identify and classify traffic by extracting spatiotemporal characteristics of data flows or byte-level features of packets. However, due to changes in data transmission mediums, such as fiber optics and satellites, temporal features can exhibit significant variations due to changes in communication links and transmission quality. Additionally, partial spatial features can change due to reasons like data reordering and retransmission. Faced with these challenges, identifying… More >

  • Open Access

    ARTICLE

    Sentiment Analysis of Low-Resource Language Literature Using Data Processing and Deep Learning

    Aizaz Ali1, Maqbool Khan1,2, Khalil Khan3, Rehan Ullah Khan4, Abdulrahman Aloraini4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 713-733, 2024, DOI:10.32604/cmc.2024.048712

    Abstract Sentiment analysis, a crucial task in discerning emotional tones within the text, plays a pivotal role in understanding public opinion and user sentiment across diverse languages. While numerous scholars conduct sentiment analysis in widely spoken languages such as English, Chinese, Arabic, Roman Arabic, and more, we come to grappling with resource-poor languages like Urdu literature which becomes a challenge. Urdu is a uniquely crafted language, characterized by a script that amalgamates elements from diverse languages, including Arabic, Parsi, Pashtu, Turkish, Punjabi, Saraiki, and more. As Urdu literature, characterized by distinct character sets and linguistic features, presents an additional hurdle due… More >

  • Open Access

    ARTICLE

    Weakly Supervised Network with Scribble-Supervised and Edge-Mask for Road Extraction from High-Resolution Remote Sensing Images

    Supeng Yu1, Fen Huang1,*, Chengcheng Fan2,3,4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 549-562, 2024, DOI:10.32604/cmc.2024.048608

    Abstract Significant advancements have been achieved in road surface extraction based on high-resolution remote sensing image processing. Most current methods rely on fully supervised learning, which necessitates enormous human effort to label the image. Within this field, other research endeavors utilize weakly supervised methods. These approaches aim to reduce the expenses associated with annotation by leveraging sparsely annotated data, such as scribbles. This paper presents a novel technique called a weakly supervised network using scribble-supervised and edge-mask (WSSE-net). This network is a three-branch network architecture, whereby each branch is equipped with a distinct decoder module dedicated to road extraction tasks. One… More >

  • Open Access

    ARTICLE

    A Study on Enhancing Chip Detection Efficiency Using the Lightweight Van-YOLOv8 Network

    Meng Huang, Honglei Wei*, Xianyi Zhai

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 531-547, 2024, DOI:10.32604/cmc.2024.048510

    Abstract In pursuit of cost-effective manufacturing, enterprises are increasingly adopting the practice of utilizing recycled semiconductor chips. To ensure consistent chip orientation during packaging, a circular marker on the front side is employed for pin alignment following successful functional testing. However, recycled chips often exhibit substantial surface wear, and the identification of the relatively small marker proves challenging. Moreover, the complexity of generic target detection algorithms hampers seamless deployment. Addressing these issues, this paper introduces a lightweight YOLOv8s-based network tailored for detecting markings on recycled chips, termed Van-YOLOv8. Initially, to alleviate the influence of diminutive, low-resolution markings on the precision of… More >

  • Open Access

    ARTICLE

    Ghost Module Based Residual Mixture of Self-Attention and Convolution for Online Signature Verification

    Fangjun Luan1,2,3, Xuewen Mu1,2,3, Shuai Yuan1,2,3,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 695-712, 2024, DOI:10.32604/cmc.2024.048502

    Abstract Online Signature Verification (OSV), as a personal identification technology, is widely used in various industries. However, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. To address these issues, we propose a novel approach for online signature verification, using a one-dimensional Ghost-ACmix Residual Network (1D-ACGRNet), which is a Ghost-ACmix Residual Network that combines convolution with a self-attention mechanism and performs improvement by using Ghost method. The Ghost-ACmix Residual structure is introduced to leverage both self-attention and convolution mechanisms for capturing global feature information and extracting local information, effectively complementing whole and local signature features and mitigating… More >

Displaying 11-20 on page 2 of 1731. Per Page