Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (18)
  • Open Access

    ARTICLE

    Lightweight Malicious Code Classification Method Based on Improved SqueezeNet

    Li Li*, Youran Kong, Qing Zhang

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 551-567, 2024, DOI:10.32604/cmc.2023.045512

    Abstract With the growth of the Internet, more and more business is being done online, for example, online offices, online education and so on. While this makes people’s lives more convenient, it also increases the risk of the network being attacked by malicious code. Therefore, it is important to identify malicious codes on computer systems efficiently. However, most of the existing malicious code detection methods have two problems: (1) The ability of the model to extract features is weak, resulting in poor model performance. (2) The large scale of model data leads to difficulties deploying on devices with limited resources. Therefore,… More >

  • Open Access

    ARTICLE

    Image Splicing Forgery Detection Using Feature-Based of Sonine Functions and Deep Features

    Ala’a R. Al-Shamasneh1, Rabha W. Ibrahim2,3,4,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 795-810, 2024, DOI:10.32604/cmc.2023.042755

    Abstract The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic. One of the most popular methods for manipulating digital images is image splicing, which involves copying a specific area from one image and pasting it into another. Attempts were made to mitigate the effects of image splicing, which continues to be a significant research challenge. This study proposes a new splicing detection model, combining Sonine functions-derived convex-based features and deep features. Two stages make up the proposed method. The first step entails feature extraction, then classification using the “support vector… More >

  • Open Access

    ARTICLE

    Weber Law Based Approach for Multi-Class Image Forgery Detection

    Arslan Akram1,3, Javed Rashid2,3,4, Arfan Jaffar1, Fahima Hajjej5, Waseem Iqbal6, Nadeem Sarwar7,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 145-166, 2024, DOI:10.32604/cmc.2023.041074

    Abstract Today’s forensic science introduces a new research area for digital image analysis for multimedia security. So, Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or create misleading publicity by using tempered images. Exiting forgery detection methods can classify only one of the most widely used Copy-Move and splicing forgeries. However, an image can contain one or more types of forgeries. This study has proposed a hybrid method for classifying Copy-Move and splicing images using texture information of images in the spatial domain. Firstly, images are divided into equal… More >

  • Open Access

    ARTICLE

    Transformer 2β regulates the alternative splicing of cell cycle regulatory genes to promote the malignant phenotype of ovarian cancer

    TING ZHOU1,#, PEIYING FU1,#, DONG CHEN2, RONGHUA LIU1,*

    Oncology Research, Vol.31, No.5, pp. 769-785, 2023, DOI:10.32604/or.2023.030166

    Abstract Late-stage ovarian cancer (OC) has a poor prognosis and a high metastasis rate, but the underlying molecular mechanism is unclear. RNA binding proteins (RBPs) play important roles in posttranscriptional regulation in the contexts of neoplasia and tumor metastasis. In this study, we explored the molecular functions of a canonical RBP, Transformer 2β homolog (TRA2B), in cancer cells. TRA2B knockdown in HeLa cells and subsequent whole-transcriptome RNA sequencing (RNA-seq) analysis revealed the TRA2B-regulated alternative splicing (AS) profile. We disrupted TRA2B expression in epithelial OC cells and performed a series of experiments to confirm the resulting effects on OC cell proliferation, apoptosis… More >

  • Open Access

    REVIEW

    Scaffold proteins of cancer signaling networks: The paradigm of FK506 binding protein 51 (FKBP51) supporting tumor intrinsic properties and immune escape

    LAURA MARRONE1, MASSIMO D’AGOSTINO1, CAROLINA GIORDANO2, VALERIA DI GIACOMO1, SIMONA URZINI1, CHIARA MALASOMMA1, MARIA PAOLA GAMMELLA1, MARTINA TUFANO1, SIMONA ROMANO1,*, MARIA FIAMMETTA ROMANO1,*

    Oncology Research, Vol.31, No.4, pp. 423-436, 2023, DOI:10.32604/or.2023.028392

    Abstract Scaffold proteins are crucial regulators of signaling networks, and their abnormal expression may favor the development of tumors. Among the scaffold proteins, immunophilin covers a unique role as ‘protein-philin’ (Greek ‘philin’ = friend) that interacts with proteins to guide their proper assembly. The growing list of human syndromes associated with the immunophilin defect underscores the biological relevance of these proteins that are largely opportunistically exploited by cancer cells to support and enable the tumor’s intrinsic properties. Among the members of the immunophilin family, the FKBP5 gene was the only one identified to have a splicing variant. Cancer cells impose unique… More > Graphic Abstract

    Scaffold proteins of cancer signaling networks: The paradigm of FK506 binding protein 51 (FKBP51) supporting tumor intrinsic properties and immune escape

  • Open Access

    ARTICLE

    Intron Retention Fine-Tunes the Resistance of the Rice Mutant pls4 to Rice Sheath Blight (Rhizotonia solani AG I.1a)

    Shaochun Liu, Jiamin Hu, Haohua He, Junru Fu, Xu Jie, Dahu Zhou*, Haihui Fu*

    Phyton-International Journal of Experimental Botany, Vol.92, No.7, pp. 2035-2049, 2023, DOI:10.32604/phyton.2023.028296

    Abstract OsPLS4 encodes a β-ketoacyl carrier protein reductase (KAR). The role of OsPLS4 in rice sheath blight (Rhizoctonia solani) remains unclear. Our preliminary studies showed that premature leaf senescence mutants (pls4) were highly susceptive to sheath blight in the early stage of rice development. To explore the role of this gene in the development of rice sheath blight, the transcriptome profiles of the rice pls4 mutant and wild type were compared by RNA-seq. The results revealed 2,569 differentially expressed genes (DEGs). The down-regulated genes were significantly enriched in the defense response-related biological processes. These down-regulated genes included the chitinase genes and… More >

  • Open Access

    ARTICLE

    Exploring Splicing Variants and Novel Genes in Sacred Lotus Based on RNA-seq Data

    Xinyi Zhang, Zimeng Yu, Pingfang Yang*

    Phyton-International Journal of Experimental Botany, Vol.92, No.6, pp. 1665-1679, 2023, DOI:10.32604/phyton.2023.029482

    Abstract Sacred lotus (Nelumbo nucifera) is a typical aquatic plant, belonging to basal eudicot plant, which is ideal for genome and genetic evolutionary study. Understanding lotus gene diversity is important for the study of molecular genetics and breeding. In this research, public RNA-seq data and the annotated reference genome were used to identify the genes in lotus. A total of 26,819 consensus and 1,081 novel genes were identified. Meanwhile, a comprehensive analysis of gene alternative splicing events was conducted, and a total of 19,983 “internal” alternative splicing (AS) events and 14,070 “complete” AS events were detected in 5,878 and 5,881 multi-exon… More >

  • Open Access

    ARTICLE

    Image Splicing Detection Using Generalized Whittaker Function Descriptor

    Dumitru Baleanu1,2,3, Ahmad Sami Al-Shamayleh4, Rabha W. Ibrahim5,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3465-3477, 2023, DOI:10.32604/cmc.2023.037162

    Abstract Image forgery is a crucial part of the transmission of misinformation, which may be illegal in some jurisdictions. The powerful image editing software has made it nearly impossible to detect altered images with the naked eye. Images must be protected against attempts to manipulate them. Image authentication methods have gained popularity because of their use in multimedia and multimedia networking applications. Attempts were made to address the consequences of image forgeries by creating algorithms for identifying altered images. Because image tampering detection targets processing techniques such as object removal or addition, identifying altered images remains a major challenge in research.… More >

  • Open Access

    ARTICLE

    Deep Learning Based Image Forgery Detection Methods

    Liang Xiu-jian1,2,*, Sun He2

    Journal of Cyber Security, Vol.4, No.2, pp. 119-133, 2022, DOI:10.32604/jcs.2022.032915

    Abstract Increasingly advanced image processing technology has made digital image editing easier and easier. With image processing software at one’s fingertips, one can easily alter the content of an image, and the altered image is so realistic that it is illegible to the naked eye. These tampered images have posed a serious threat to personal privacy, social order, and national security. Therefore, detecting and locating tampered areas in images has important practical significance, and has become an important research topic in the field of multimedia information security. In recent years, deep learning technology has been widely used in image tampering localization,… More >

  • Open Access

    ARTICLE

    Indoor Scene Splicing Based on Genetic Algorithm and ORB

    Tao Zhang1,*, Yi Cao2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1677-1685, 2022, DOI:10.32604/iasc.2022.027082

    Abstract The images generated by the image stitching algorithm have false shadow and poor real-time performance, and are difficult to maintain visual consistency. For this reason, a panoramic image stitching algorithm based on genetic algorithm is proposed. First, the oriented fast and rotated brief (ORB) algorithm is used to quickly perform detection and description of feature, then the initial feature point pairs are extracted according to the Euclidean distance for feature point rough matching, the parallelism of genetic algorithm is used to optimize the feature point matching performance. Finally, the PROSAC algorithm is used to remove mismatched point pairs and get… More >

Displaying 1-10 on page 1 of 18. Per Page