Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (39)
  • Open Access

    ARTICLE

    Stochastic Gradient Boosting Model for Twitter Spam Detection

    K. Kiruthika Devi1,*, G. A. Sathish Kumar2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 849-859, 2022, DOI:10.32604/csse.2022.020836

    Abstract

    In today’s world of connectivity there is a huge amount of data than we could imagine. The number of network users are increasing day by day and there are large number of social networks which keeps the users connected all the time. These social networks give the complete independence to the user to post the data either political, commercial or entertainment value. Some data may be sensitive and have a greater impact on the society as a result. The trustworthiness of data is important when it comes to public social networking sites like facebook and twitter. Due to the large… More >

  • Open Access

    ARTICLE

    Deep Learning Empowered Cybersecurity Spam Bot Detection for Online Social Networks

    Mesfer Al Duhayyim1, Haya Mesfer Alshahrani2, Fahd N. Al-Wesabi3, Mohammed Alamgeer4, Anwer Mustafa Hilal5,*, Mohammed Rizwanullah5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6257-6270, 2022, DOI:10.32604/cmc.2022.021212

    Abstract Cybersecurity encompasses various elements such as strategies, policies, processes, and techniques to accomplish availability, confidentiality, and integrity of resource processing, network, software, and data from attacks. In this scenario, the rising popularity of Online Social Networks (OSN) is under threat from spammers for which effective spam bot detection approaches should be developed. Earlier studies have developed different approaches for the detection of spam bots in OSN. But those techniques primarily concentrated on hand-crafted features to capture the features of malicious users while the application of Deep Learning (DL) models needs to be explored. With this motivation, the current research article… More >

  • Open Access

    ARTICLE

    Identity Governance Framework for Privileged Users

    Mansour Hammoud Alruwies1, Shailendra Mishra2,*, Mohammed Abdul Rahman AlShehri1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 995-1005, 2022, DOI:10.32604/csse.2022.019355

    Abstract Information technology companies have grown in size and recognized the need to protect their valuable assets. As a result, each IT application has its authentication mechanism, and an employee needs a username and password. As the number of applications increased, as a result, it became increasingly complex to manage all identities like the number of usernames and passwords of an employee. All identities had to be retrieved by users. Both the identities and the access rights associated with those identities had to be protected by an administrator. Management couldn’t even capture such access rights because they couldn’t verify things like… More >

  • Open Access

    ARTICLE

    Strong and Tough PAm/SA Hydrogel with Highly Strain Sensitivity

    Lingqin Zhang, Qifeng Jiang, Yiming Zhao, Jie Yuan, Xiaoying Zha, Haojiang Xie, Fankai Kong, Xingliang Xiong*

    Journal of Renewable Materials, Vol.10, No.2, pp. 415-430, 2022, DOI:10.32604/jrm.2022.016650

    Abstract The hydrogel is a preferred material for flexible wearable sensors. In practical application, it should have high-efficiency mechanical toughness and self-healing performance. Besides, hydrogel requires good affinity and adhesion because of its contact with the skin. In this experiment, we made an ultra-tough hydrogel with excellent cell affinity and adhesion. We used sodium alginate (SA) and polyacrylamide (PAm) mixture as a flexible base fluid. Polydopamine reduce graphene oxide (prGO) was used as conductive nanofiller, and then PAm-prGO-SA semi-interpenetrating network hydrogel was formed through Am radical polymerization. The presence of prGO endows the hydrogels with excellent electrical conductivity. Simultaneously, some non-reduced… More >

  • Open Access

    ARTICLE

    Assessing User’s Susceptibility and Awareness of Cybersecurity Threats

    Maha M. Althobaiti*

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 167-177, 2021, DOI:10.32604/iasc.2021.016660

    Abstract Cybersecurity threats, including those involving machine learning, malware, phishing, and cryptocurrency, have become more sophisticated. They target sensitive information and put institutions, governments, and individuals in a continual state of risk. In 2019, phishing attacks became one of the most common and dangerous cyber threats. Such attacks attempt to steal sensitive data, such as login and payment card details, from financial, social, and educational websites. Many universities have suffered data breaches, serving as a prime example of victims of attacks on educational websites. Owing to advances in phishing tactics, strategies, and technologies, the end-user is the main victim of an… More >

  • Open Access

    ARTICLE

    Spam Detection in Reviews Using LSTM-Based Multi-Entity Temporal Features

    Lingyun Xiang1,2,3, Guoqing Guo2, Qian Li4, Chengzhang Zhu5,*, Jiuren Chen6, Haoliang Ma2

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1375-1390, 2020, DOI:10.32604/iasc.2020.013382

    Abstract Current works on spam detection in product reviews tend to ignore the temporal relevance among reviews in the user or product entity, resulting in poor detection performance. To address this issue, the present paper proposes a spam detection method that jointly learns comprehensive temporal features from both behavioral and text features in user and product entities. We first extract the behavioral features of a single review, then employ a convolutional neural network (CNN) to learn the text features of this review. We next combine the behavioral features with the text features of each review and train a Long-Short-Term Memory (LSTM)… More >

  • Open Access

    ARTICLE

    An Opinion Spam Detection Method Based on Multi-Filters Convolutional Neural Network

    Ye Wang1, Bixin Liu2, Hongjia Wu1, Shan Zhao1, Zhiping Cai1, *, Donghui Li3, *, Cheang Chak Fong4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 355-367, 2020, DOI:10.32604/cmc.2020.09835

    Abstract With the continuous development of e-commerce, consumers show increasing interest in posting comments on consumption experience and quality of commodities. Meanwhile, people make purchasing decisions relying on other comments much more than ever before. So the reliability of commodity comments has a significant impact on ensuring consumers’ equity and building a fair internet-trade-environment. However, some unscrupulous online-sellers write fake praiseful reviews for themselves and malicious comments for their business counterparts to maximize their profits. Those improper ways of self-profiting have severely ruined the entire online shopping industry. Aiming to detect and prevent these deceptive comments effectively, we construct a model… More >

  • Open Access

    ARTICLE

    FSPAM: A Feature Construction Method to Identifying Cell Populations in ScRNA-seq Data

    Amin Einipour1, Mohammad Mosleh1, *, Karim Ansari-Asl1, 2

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.1, pp. 377-397, 2020, DOI:10.32604/cmes.2020.08496

    Abstract The emergence of single-cell RNA-sequencing (scRNA-seq) technology has introduced new information about the structure of cells, diseases, and their associated biological factors. One of the main uses of scRNA-seq is identifying cell populations, which sometimes leads to the detection of rare cell populations. However, the new method is still in its infancy and with its advantages comes computational challenges that are just beginning to address. An important tool in the analysis is dimensionality reduction, which transforms high dimensional data into a meaningful reduced subspace. The technique allows noise removal, visualization and compression of high-dimensional data. This paper presents a new… More >

  • Open Access

    ARTICLE

    Germination of Eryngium regnellii: a major species for ecological restoration of plant-pollinator interactions in the Southern Pampas (Buenos Aires, Argentina)

    Sabatino M1,2, AE Rovere1, N Maceira2

    Phyton-International Journal of Experimental Botany, Vol.84, No.2, pp. 435-443, 2015, DOI:10.32604/phyton.2015.84.435

    Abstract Eryngium regnellii Malme belongs to the largest genera in the Apiaceae family, with 250 species worldwide and 65 represented in South America. It is a herbaceous species typical of hill plant communities, which, along with remnant grassland patches, are the most relevant natural habitats for the maintenance of diversity in the Southern Pampas. Eryngium regnellii is key to the maintenance of pollination mutualisms, being a generalist (displaying a diverse assemblage of pollinators) and ubiquitous species (present in all studied sierras). However, fragmentation of the Pampean landscape due to agricultural intensification has led to the loss of natural environments. Therefore, the… More >

  • Open Access

    ARTICLE

    Effect of tillage system on bread wheat yield and grain quality in the temperate semiarid central zone of La Pampa

    Miravalles MT1, MN Fioretti1, H Mirassón2, ML Faraldo2, L Möck1, RE Brevedan1

    Phyton-International Journal of Experimental Botany, Vol.82, pp. 263-273, 2013, DOI:10.32604/phyton.2013.82.263

    Abstract In the present study the effects of three tillage systems: conventional (CT), vertical (VT) and direct drilling (DD) on three bread wheat varieties of different cycle length, were studied, for yield and yield components. Their influence on grain quality, expressed through thousand kernel weight (TKW, g), test weight (TW, kg/hL), grain protein content (GPC, %) and yellowberry percentage (YBP, %) were also studied. The highest average yield was under CT and DD, while the lowest was under VT. The lowest dry matter accumulation and one third fewer spikes per unit area were determined under VT. Concerning grain quality, a comparatively… More >

Displaying 21-30 on page 3 of 39. Per Page