Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,073)
  • Open Access

    ARTICLE

    Internet of Things Enabled DDoS Attack Detection Using Pigeon Inspired Optimization Algorithm with Deep Learning Approach

    Turki Ali Alghamdi, Saud S. Alotaibi*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4047-4064, 2024, DOI:10.32604/cmc.2024.052796

    Abstract Internet of Things (IoTs) provides better solutions in various fields, namely healthcare, smart transportation, home, etc. Recognizing Denial of Service (DoS) outbreaks in IoT platforms is significant in certifying the accessibility and integrity of IoT systems. Deep learning (DL) models outperform in detecting complex, non-linear relationships, allowing them to effectually severe slight deviations from normal IoT activities that may designate a DoS outbreak. The uninterrupted observation and real-time detection actions of DL participate in accurate and rapid detection, permitting proactive reduction events to be executed, hence securing the IoT network’s safety and functionality. Subsequently, this… More >

  • Open Access

    ARTICLE

    Robust and Discriminative Feature Learning via Mutual Information Maximization for Object Detection in Aerial Images

    Xu Sun, Yinhui Yu*, Qing Cheng

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4149-4171, 2024, DOI:10.32604/cmc.2024.052725

    Abstract Object detection in unmanned aerial vehicle (UAV) aerial images has become increasingly important in military and civil applications. General object detection models are not robust enough against interclass similarity and intraclass variability of small objects, and UAV-specific nuisances such as uncontrolled weather conditions. Unlike previous approaches focusing on high-level semantic information, we report the importance of underlying features to improve detection accuracy and robustness from the information-theoretic perspective. Specifically, we propose a robust and discriminative feature learning approach through mutual information maximization (RD-MIM), which can be integrated into numerous object detection methods for aerial images.… More >

  • Open Access

    ARTICLE

    Spatial Attention Integrated EfficientNet Architecture for Breast Cancer Classification with Explainable AI

    Sannasi Chakravarthy1, Bharanidharan Nagarajan2, Surbhi Bhatia Khan3,7,*, Vinoth Kumar Venkatesan2, Mahesh Thyluru Ramakrishna4, Ahlam Al Musharraf5, Khursheed Aurungzeb6

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 5029-5045, 2024, DOI:10.32604/cmc.2024.052531

    Abstract Breast cancer is a type of cancer responsible for higher mortality rates among women. The cruelty of breast cancer always requires a promising approach for its earlier detection. In light of this, the proposed research leverages the representation ability of pretrained EfficientNet-B0 model and the classification ability of the XGBoost model for the binary classification of breast tumors. In addition, the above transfer learning model is modified in such a way that it will focus more on tumor cells in the input mammogram. Accordingly, the work proposed an EfficientNet-B0 having a Spatial Attention Layer with More >

  • Open Access

    ARTICLE

    Improving Transferable Targeted Adversarial Attack for Object Detection Using RCEN Framework and Logit Loss Optimization

    Zhiyi Ding, Lei Sun*, Xiuqing Mao, Leyu Dai, Ruiyang Ding

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4387-4412, 2024, DOI:10.32604/cmc.2024.052196

    Abstract Object detection finds wide application in various sectors, including autonomous driving, industry, and healthcare. Recent studies have highlighted the vulnerability of object detection models built using deep neural networks when confronted with carefully crafted adversarial examples. This not only reveals their shortcomings in defending against malicious attacks but also raises widespread concerns about the security of existing systems. Most existing adversarial attack strategies focus primarily on image classification problems, failing to fully exploit the unique characteristics of object detection models, thus resulting in widespread deficiencies in their transferability. Furthermore, previous research has predominantly concentrated on… More >

  • Open Access

    ARTICLE

    Enhancing Log Anomaly Detection with Semantic Embedding and Integrated Neural Network Innovations

    Zhanyang Xu*, Zhe Wang, Jian Xu, Hongyan Shi, Hong Zhao

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3991-4015, 2024, DOI:10.32604/cmc.2024.051620

    Abstract System logs, serving as a pivotal data source for performance monitoring and anomaly detection, play an indispensable role in assuring service stability and reliability. Despite this, the majority of existing log-based anomaly detection methodologies predominantly depend on the sequence or quantity attributes of logs, utilizing solely a single Recurrent Neural Network (RNN) and its variant sequence models for detection. These approaches have not thoroughly exploited the semantic information embedded in logs, exhibit limited adaptability to novel logs, and a single model struggles to fully unearth the potential features within the log sequence. Addressing these challenges,… More >

  • Open Access

    ARTICLE

    Optimized Phishing Detection with Recurrent Neural Network and Whale Optimizer Algorithm

    Brij Bhooshan Gupta1,2,3,*, Akshat Gaurav4, Razaz Waheeb Attar5, Varsha Arya6,7, Ahmed Alhomoud8, Kwok Tai Chui9

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4895-4916, 2024, DOI:10.32604/cmc.2024.050815

    Abstract Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape, necessitating the development of more sophisticated detection methods. Traditional machine learning approaches to phishing detection have relied heavily on feature engineering and have often fallen short in adapting to the dynamically changing patterns of phishing Uniform Resource Locator (URLs). Addressing these challenge, we introduce a framework that integrates the sequential data processing strengths of a Recurrent Neural Network (RNN) with the hyperparameter optimization prowess of the Whale Optimization Algorithm (WOA). Our model capitalizes on an extensive Kaggle dataset, featuring over 11,000 URLs, each More >

  • Open Access

    REVIEW

    The Impact of Domain Name Server (DNS) over Hypertext Transfer Protocol Secure (HTTPS) on Cyber Security: Limitations, Challenges, and Detection Techniques

    Muhammad Dawood1, Shanshan Tu1, Chuangbai Xiao1, Muhammad Haris2, Hisham Alasmary3, Muhammad Waqas4,5,*, Sadaqat Ur Rehman6

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4513-4542, 2024, DOI:10.32604/cmc.2024.050049

    Abstract The DNS over HTTPS (Hypertext Transfer Protocol Secure) (DoH) is a new technology that encrypts DNS traffic, enhancing the privacy and security of end-users. However, the adoption of DoH is still facing several research challenges, such as ensuring security, compatibility, standardization, performance, privacy, and increasing user awareness. DoH significantly impacts network security, including better end-user privacy and security, challenges for network security professionals, increasing usage of encrypted malware communication, and difficulty adapting DNS-based security measures. Therefore, it is important to understand the impact of DoH on network security and develop new privacy-preserving techniques to allow More >

  • Open Access

    REVIEW

    A Comprehensive Review of Design and Technological Advancements across Various Types of Solar Dryers

    Ganesh There*, Rohit Sharma*

    Energy Engineering, Vol.121, No.10, pp. 2851-2892, 2024, DOI:10.32604/ee.2024.049506

    Abstract This analysis investigates the widespread use of solar drying methods and designs in developing countries, particularly for agricultural products like fruits, vegetables, and bee pollen. Traditional techniques like hot air oven drying and open sun drying have drawbacks, including nutrient loss and exposure to harmful particles. Solar and thermal drying are viewed as sustainable solutions because they rely on renewable resources. The article highlights the advantages of solar drying, including waste reduction, increased productivity, and improved pricing. It is also cost-effective and energy-efficient. The review study provides an overview of different solar drying systems and… More > Graphic Abstract

    A Comprehensive Review of Design and Technological Advancements across Various Types of Solar Dryers

  • Open Access

    ARTICLE

    Automated Angle Detection for Industrial Production Lines Using Combined Image Processing Techniques

    Pawat Chunhachatrachai1,*, Chyi-Yeu Lin1,2

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 599-618, 2024, DOI:10.32604/iasc.2024.055385

    Abstract Angle detection is a crucial aspect of industrial automation, ensuring precise alignment and orientation of components in manufacturing processes. Despite the widespread application of computer vision in industrial settings, angle detection remains an underexplored domain, with limited integration into production lines. This paper addresses the need for automated angle detection in industrial environments by presenting a methodology that eliminates training time and higher computation cost on Graphics Processing Unit (GPU) from machine learning in computer vision (e.g., Convolutional Neural Networks (CNN)). Our approach leverages advanced image processing techniques and a strategic combination of algorithms, including More >

  • Open Access

    ARTICLE

    A Hierarchical Two-Level Feature Fusion Approach for SMS Spam Filtering

    Hussein Alaa Al-Kabbi1,2, Mohammad-Reza Feizi-Derakhshi1,*, Saeed Pashazadeh3

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 665-682, 2024, DOI:10.32604/iasc.2024.050452

    Abstract SMS spam poses a significant challenge to maintaining user privacy and security. Recently, spammers have employed fraudulent writing styles to bypass spam detection systems. This paper introduces a novel two-level detection system that utilizes deep learning techniques for effective spam identification to address the challenge of sophisticated SMS spam. The system comprises five steps, beginning with the preprocessing of SMS data. RoBERTa word embedding is then applied to convert text into a numerical format for deep learning analysis. Feature extraction is performed using a Convolutional Neural Network (CNN) for word-level analysis and a Bidirectional Long… More >

Displaying 31-40 on page 4 of 3073. Per Page