Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,863)
  • Open Access

    ARTICLE

    Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Fei Li1, *, Jiayan Zhang1, Edward Szczerbicki2, Jiaqi Song1, Ruxiang Li 1, Renhong Diao1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 653-681, 2020, DOI:10.32604/cmc.2020.011264

    Abstract The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to verify the accuracy and efficiency… More >

  • Open Access

    ARTICLE

    Semi-GSGCN: Social Robot Detection Research with Graph Neural Network

    Xiujuan Wang1, Qianqian Zheng1, *, Kangfeng Zheng2, Yi Sui1, Jiayue Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 617-638, 2020, DOI:10.32604/cmc.2020.011165

    Abstract Malicious social robots are the disseminators of malicious information on social networks, which seriously affect information security and network environments. Efficient and reliable classification of social robots is crucial for detecting information manipulation in social networks. Supervised classification based on manual feature extraction has been widely used in social robot detection. However, these methods not only involve the privacy of users but also ignore hidden feature information, especially the graph feature, and the label utilization rate of semi-supervised algorithms is low. Aiming at the problems of shallow feature extraction and low label utilization rate in existing social network robot detection… More >

  • Open Access

    ARTICLE

    An Opinion Spam Detection Method Based on Multi-Filters Convolutional Neural Network

    Ye Wang1, Bixin Liu2, Hongjia Wu1, Shan Zhao1, Zhiping Cai1, *, Donghui Li3, *, Cheang Chak Fong4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 355-367, 2020, DOI:10.32604/cmc.2020.09835

    Abstract With the continuous development of e-commerce, consumers show increasing interest in posting comments on consumption experience and quality of commodities. Meanwhile, people make purchasing decisions relying on other comments much more than ever before. So the reliability of commodity comments has a significant impact on ensuring consumers’ equity and building a fair internet-trade-environment. However, some unscrupulous online-sellers write fake praiseful reviews for themselves and malicious comments for their business counterparts to maximize their profits. Those improper ways of self-profiting have severely ruined the entire online shopping industry. Aiming to detect and prevent these deceptive comments effectively, we construct a model… More >

  • Open Access

    ARTICLE

    Applying Stack Bidirectional LSTM Model to Intrusion Detection

    Ziyong Ran1, Desheng Zheng1, *, Yanling Lai1, Lulu Tian2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 309-320, 2020, DOI:10.32604/cmc.2020.010102

    Abstract Nowadays, Internet has become an indispensable part of daily life and is used in many fields. Due to the large amount of Internet traffic, computers are subject to various security threats, which may cause serious economic losses and even endanger national security. It is hoped that an effective security method can systematically classify intrusion data in order to avoid leakage of important data or misuse of data. As machine learning technology matures, deep learning is widely used in various industries. Combining deep learning with network security and intrusion detection is the current trend. In this paper, the problem of data… More >

  • Open Access

    ARTICLE

    A Structure Preserving Numerical Method for Solution of Stochastic Epidemic Model of Smoking Dynamics

    Ali Raza1, Muhammad Rafiq2, Nauman Ahmed3, Ilyas Khan4, *, Kottakkaran Sooppy Nisar5, Zafar Iqbal3

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 263-278, 2020, DOI:10.32604/cmc.2020.011289

    Abstract In this manuscript, we consider a stochastic smoking epidemic model from behavioural sciences. Also, we develop a structure preserving numerical method to describe the dynamics of stochastic smoking epidemic model in a human population. The structural properties of a physical system include positivity, boundedness and dynamical consistency. These properties play a vital role in non-linear dynamics. The solution for nonlinear stochastic models necessitates the conservation of these properties. Unfortunately, the aforementioned properties of the model have not been restored in the existing stochastic methods. Therefore, it is essential to construct a structure preserving numerical method for a reliable analysis of… More >

  • Open Access

    ARTICLE

    A Key Recovery System Based on Password-Protected Secret Sharing in a Permissioned Blockchain

    Gyeong-Jin Ra1, Chang-Hyun Roh1, Im-Yeong Lee1, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 153-170, 2020, DOI:10.32604/cmc.2020.011293

    Abstract In today’s fourth industrial revolution, various blockchain technologies are being actively researched. A blockchain is a peer-to-peer data-sharing structure lacking central control. If a user wishes to access stored data, she/he must employ a private key to prove ownership of the data and create a transaction. If the private key is lost, blockchain data cannot be accessed. To solve such a problem, public blockchain users can recover the key using a wallet program. However, key recovery in a permissioned blockchain (PBC) has been but little studied. The PBC server is Honest-but-Curious (HBC), and should not be able to learn anything… More >

  • Open Access

    ARTICLE

    Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data

    Bao Le Nguyen1, E. Laxmi Lydia2, Mohamed Elhoseny3, Irina V. Pustokhina4, Denis A. Pustokhin5, Mahmoud Mohamed Selim6, Gia Nhu Nguyen7, 8, K. Shankar9, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 87-107, 2020, DOI:10.32604/cmc.2020.011599

    Abstract In present digital era, an exponential increase in Internet of Things (IoT) devices poses several design issues for business concerning security and privacy. Earlier studies indicate that the blockchain technology is found to be a significant solution to resolve the challenges of data security exist in IoT. In this view, this paper presents a new privacy-preserving Secure Ant Colony optimization with Multi Kernel Support Vector Machine (ACOMKSVM) with Elliptical Curve cryptosystem (ECC) for secure and reliable IoT data sharing. This program uses blockchain to ensure protection and integrity of some data while it has the technology to create secure ACOMKSVM… More >

  • Open Access

    ARTICLE

    Investigation of Granite Deformation Process under Axial Load Using LSTM-Based Architectures

    Yalei Wang1, Jinming Xu1,2,*, Mostafa Asadizadeh3, Chuanjiang Zhong4, Xuejie Tao1

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.2, pp. 643-664, 2020, DOI:10.32604/cmes.2020.09866

    Abstract Granite is generally composed of quartz, biotite, feldspar, and cracks. The changes in digital parameters of these compositions reflect the detail of the deformation process of the rock. Therefore, the estimation of the changes in digital parameters of the compositions is much helpful to understand the deformation and failure stages of the rock. In the current study, after dividing the frames in the video images photographed during the axial compression test into four parts (or, the upper left, upper right, lower left, and lower right ones), the digital parameters of various compositions in each part were then extracted. Using these… More >

  • Open Access

    ARTICLE

    A Numerical Efficient Technique for the Solution of Susceptible Infected Recovered Epidemic Model

    Muhammad Shoaib Arif1,*, Ali Raza1,2, Kamaleldin Abodayeh3, Muhammad Rafiq4, Mairaj Bibi5, Amna Nazeer5

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.2, pp. 477-491, 2020, DOI:10.32604/cmes.2020.011121

    Abstract The essential features of the nonlinear stochastic models are positivity, dynamical consistency and boundedness. These features have a significant role in different fields of computational biology and many more. The aim of our paper, to achieve the comparison analysis of the stochastic susceptible, infected recovered epidemic model. The stochastic modelling is a realistic way to study the dynamics of compartmental modelling as compared to deterministic modelling. The effect of reproduction number has also observed in the stochastic susceptible, infected recovered epidemic model. For comparison analysis, we developed some explicit stochastic techniques, but they are the time-dependent techniques. The implicitly driven… More >

  • Open Access

    ARTICLE

    Research on Intelligent Technology Management and Service Platform

    Ning Chen1, Hui Li2, Xinxin Fan3, 4, Weiliang Kong1, Yonghong Xie3, 4, *

    Journal on Artificial Intelligence, Vol.2, No.3, pp. 149-155, 2020, DOI:10.32604/jai.2020.09888

    Abstract In recent years, there are some problems in science and technology management, such as untimely task supervision and independent information system, which makes it difficult to achieve accurate, quantitative and standardized management. The storage of scientific research test data is scattered, and there are many deficiencies in the management, promotion and use of existing intellectual property. In this paper, on the basis of the knowledge economy, intelligence economy under the conditions of knowledge management concept and cutting-edge technology, technology management and service management related data, information, knowledge, method of blend together. Based on science and technology management, knowledge management as… More >

Displaying 2391-2400 on page 240 of 2863. Per Page