Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    REVIEW

    From Identification to Obfuscation: A Survey of Cross-Network Mapping and Anti-Mapping Methods

    Shaojie Min1, Yaxiao Luo1, Kebing Liu1, Qingyuan Gong2, Yang Chen1,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-23, 2026, DOI:10.32604/cmc.2025.073175 - 09 December 2025

    Abstract User identity linkage (UIL) across online social networks seeks to match accounts belonging to the same real-world individual. This cross-platform mapping enables accurate user modeling but also raises serious privacy risks. Over the past decade, the research community has developed a wide range of UIL methods, from structural embeddings to multimodal fusion architectures. However, corresponding adversarial and defensive approaches remain fragmented and comparatively understudied. In this survey, we provide a unified overview of both mapping and anti-mapping methods for UIL. We categorize representative mapping models by learning paradigm and data modality, and systematically compare them… More >

  • Open Access

    ARTICLE

    Identifying Industrial Control Equipment Based on Rule Matching and Machine Learning

    Yuhao Wang, Yuying Li, Yanbin Sun, Yu Jiang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 577-605, 2023, DOI:10.32604/cmes.2023.026791 - 23 April 2023

    Abstract To identify industrial control equipment is often a key step in network mapping, categorizing network resources, and attack defense. For example, if vulnerable equipment or devices can be discovered in advance and the attack path can be cut off, security threats can be effectively avoided and the stable operation of the Internet can be ensured. The existing rule-matching method for equipment identification has limitations such as relying on experience and low scalability. This paper proposes an industrial control device identification method based on PCA-Adaboost, which integrates rule matching and machine learning. We first build a More >

  • Open Access

    ARTICLE

    Neural Network Mapping of Corrosion Induced Chemical Elements Degradation in Aircraft Aluminum

    Ramana M. Pidaparti1,2, Evan J. Neblett2

    CMC-Computers, Materials & Continua, Vol.5, No.1, pp. 1-10, 2007, DOI:10.3970/cmc.2007.005.001

    Abstract A neural network (NN) model is developed for the analysis and prediction of the mapping between degradation of chemical elements and electrochemical parameters during the corrosion process. The input parameters to the neural network model are alloy composition, electrochemical parameters, and corrosion time. The output parameters are the degradation of chemical elements in AA 2024-T3 material. The NN is trained with the data obtained from Energy Dispersive X-ray Spectrometry (EDS) on corroded specimens. A very good performance of the neural network is achieved after training and validation with the experimental data. After validating the NN More >

Displaying 1-10 on page 1 of 3. Per Page