Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (895)
  • Open Access

    ARTICLE

    Advanced AI-Driven Cybersecurity Solutions: Intelligent Threat Detection, Explainability, and Adversarial Resilience

    Kirubavathi Ganapathiyappan1,*, Kiruba Marimuthu Eswaramoorthy1, Abi Thangamuthu Shanthamani1, Aksaya Venugopal1, Asita Pon Bhavya Iyyappan1, Thilaga Manickam1, Ateeq Ur Rehman2,*, Habib Hamam3,4,5,6

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-31, 2026, DOI:10.32604/cmc.2025.070067 - 09 December 2025

    Abstract The growing use of Portable Document Format (PDF) files across various sectors such as education, government, and business has inadvertently turned them into a major target for cyberattacks. Cybercriminals take advantage of the inherent flexibility and layered structure of PDFs to inject malicious content, often employing advanced obfuscation techniques to evade detection by traditional signature-based security systems. These conventional methods are no longer adequate, especially against sophisticated threats like zero-day exploits and polymorphic malware. In response to these challenges, this study introduces a machine learning-based detection framework specifically designed to combat such threats. Central to… More >

  • Open Access

    ARTICLE

    A Study on Improving the Accuracy of Semantic Segmentation for Autonomous Driving

    Bin Zhang*, Zhancheng Xu

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-12, 2026, DOI:10.32604/cmc.2025.069979 - 09 December 2025

    Abstract This study aimed to enhance the performance of semantic segmentation for autonomous driving by improving the 2DPASS model. Two novel improvements were proposed and implemented in this paper: dynamically adjusting the loss function ratio and integrating an attention mechanism (CBAM). First, the loss function weights were adjusted dynamically. The grid search method is used for deciding the best ratio of 7:3. It gives greater emphasis to the cross-entropy loss, which resulted in better segmentation performance. Second, CBAM was applied at different layers of the 2D encoder. Heatmap analysis revealed that introducing it after the second… More >

  • Open Access

    ARTICLE

    Model Construction for Complex and Heterogeneous Data of Urban Road Traffic Congestion

    Jianchun Wen1, Minghao Zhu1,*, Bo Gao2, Zhaojian Liu1, Xuehan Li3

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-17, 2026, DOI:10.32604/cmc.2025.069671 - 09 December 2025

    Abstract Urban traffic generates massive and diverse data, yet most systems remain fragmented. Current approaches to congestion management suffer from weak data consistency and poor scalability. This study addresses this gap by proposing the Urban Traffic Congestion Unified Metadata Model (UTC-UMM). The goal is to provide a standardized and extensible framework for describing, extracting, and storing multisource traffic data in smart cities. The model defines a two-tier specification that organizes nine core traffic resource classes. It employs an eXtensible Markup Language (XML) Schema that connects general elements with resource-specific elements. This design ensures both syntactic and… More >

  • Open Access

    ARTICLE

    Semi-Fragile Image Watermarking Using Quantization-Based DCT for Tamper Localization

    Agit Amrullah, Ferda Ernawan*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-16, 2026, DOI:10.32604/cmc.2025.069229 - 09 December 2025

    Abstract This paper proposes a tamper detection technique for semi-fragile watermarking using Quantization-based Discrete Cosine Transform (DCT) for tamper localization. In this study, the proposed embedding strategy is investigated by experimental tests over the diagonal order of the DCT coefficients. The cover image is divided into non-overlapping blocks of size 8 × 8 pixels. The DCT is applied to each block, and the coefficients are arranged using a zig-zag pattern within the block. In this study, the low-frequency coefficients are selected to examine the impact of the imperceptibility score and tamper detection accuracy. High accuracy of… More >

  • Open Access

    ARTICLE

    AT-Net: A Semi-Supervised Framework for Asparagus Pathogenic Spore Detection under Complex Backgrounds

    Jiajun Sun, Shunshun Ji, Chao Zhang*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-23, 2026, DOI:10.32604/cmc.2025.068668 - 09 December 2025

    Abstract Asparagus stem blight is a devastating crop disease, and the early detection of its pathogenic spores is essential for effective disease control and prevention. However, spore detection is still hindered by complex backgrounds, small target sizes, and high annotation costs, which limit its practical application and widespread adoption. To address these issues, a semi-supervised spore detection framework is proposed for use under complex background conditions. Firstly, a difficulty perception scoring function is designed to quantify the detection difficulty of each image region. For regions with higher difficulty scores, a masking strategy is applied, while the… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Toolkit Inspection: Object Detection and Segmentation in Assembly Lines

    Arvind Mukundan1,2, Riya Karmakar1, Devansh Gupta3, Hsiang-Chen Wang1,4,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069646 - 10 November 2025

    Abstract Modern manufacturing processes have become more reliant on automation because of the accelerated transition from Industry 3.0 to Industry 4.0. Manual inspection of products on assembly lines remains inefficient, prone to errors and lacks consistency, emphasizing the need for a reliable and automated inspection system. Leveraging both object detection and image segmentation approaches, this research proposes a vision-based solution for the detection of various kinds of tools in the toolkit using deep learning (DL) models. Two Intel RealSense D455f depth cameras were arranged in a top down configuration to capture both RGB and depth images… More >

  • Open Access

    ARTICLE

    Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection

    Ran Wei*, Hui Shu

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069562 - 10 November 2025

    Abstract Transformer-based models have significantly advanced binary code similarity detection (BCSD) by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings. Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code, existing techniques predominantly depend on inserting artificial instructions, which incur high computational costs and offer limited diversity of perturbations. To address these limitations, we propose AIMA, a novel gradient-guided assembly instruction relocation method. Our method decouples the detection model into tokenization, embedding, and encoding layers to enable efficient gradient computation. Since token IDs of instructions are… More >

  • Open Access

    ARTICLE

    A Q-Learning Improved Particle Swarm Optimization for Aircraft Pulsating Assembly Line Scheduling Problem Considering Skilled Operator Allocation

    Xiaoyu Wen1,2, Haohao Liu1,2, Xinyu Zhang1,2, Haoqi Wang1,2, Yuyan Zhang1,2, Guoyong Ye1,2, Hongwen Xing3, Siren Liu3, Hao Li1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-27, 2026, DOI:10.32604/cmc.2025.069492 - 10 November 2025

    Abstract Aircraft assembly is characterized by stringent precedence constraints, limited resource availability, spatial restrictions, and a high degree of manual intervention. These factors lead to considerable variability in operator workloads and significantly increase the complexity of scheduling. To address this challenge, this study investigates the Aircraft Pulsating Assembly Line Scheduling Problem (APALSP) under skilled operator allocation, with the objective of minimizing assembly completion time. A mathematical model considering skilled operator allocation is developed, and a Q-Learning improved Particle Swarm Optimization algorithm (QLPSO) is proposed. In the algorithm design, a reverse scheduling strategy is adopted to effectively… More >

  • Open Access

    ARTICLE

    PhishNet: A Real-Time, Scalable Ensemble Framework for Smishing Attack Detection Using Transformers and LLMs

    Abeer Alhuzali1,*, Qamar Al-Qahtani1, Asmaa Niyazi1, Lama Alshehri1, Fatemah Alharbi2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.069491 - 10 November 2025

    Abstract The surge in smishing attacks underscores the urgent need for robust, real-time detection systems powered by advanced deep learning models. This paper introduces PhishNet, a novel ensemble learning framework that integrates transformer-based models (RoBERTa) and large language models (LLMs) (GPT-OSS 120B, LLaMA3.3 70B, and Qwen3 32B) to enhance smishing detection performance significantly. To mitigate class imbalance, we apply synthetic data augmentation using T5 and leverage various text preprocessing techniques. Our system employs a dual-layer voting mechanism: weighted majority voting among LLMs and a final ensemble vote to classify messages as ham, spam, or smishing. Experimental More >

  • Open Access

    ARTICLE

    A Transformer-Based Deep Learning Framework with Semantic Encoding and Syntax-Aware LSTM for Fake Electronic News Detection

    Hamza Murad Khan1, Shakila Basheer2, Mohammad Tabrez Quasim3, Raja`a Al-Naimi4, Vijaykumar Varadarajan5, Anwar Khan1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069327 - 10 November 2025

    Abstract With the increasing growth of online news, fake electronic news detection has become one of the most important paradigms of modern research. Traditional electronic news detection techniques are generally based on contextual understanding, sequential dependencies, and/or data imbalance. This makes distinction between genuine and fabricated news a challenging task. To address this problem, we propose a novel hybrid architecture, T5-SA-LSTM, which synergistically integrates the T5 Transformer for semantically rich contextual embedding with the Self-Attention-enhanced (SA) Long Short-Term Memory (LSTM). The LSTM is trained using the Adam optimizer, which provides faster and more stable convergence compared… More >

Displaying 1-10 on page 1 of 895. Per Page