Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,489)
  • Open Access

    ARTICLE

    Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud

    Tajinder Kumar1, Purushottam Sharma2,*, Xiaochun Cheng3,*, Sachin Lalar4, Shubham Kumar5, Sandhya Bansal6

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 719-738, 2025, DOI:10.32604/cmc.2025.060836 - 26 March 2025

    Abstract With cloud computing, large chunks of data can be handled at a small cost. However, there are some reservations regarding the security and privacy of cloud data stored. For solving these issues and enhancing cloud computing security, this research provides a Three-Layered Security Access model (TLSA) aligned to an intrusion detection mechanism, access control mechanism, and data encryption system. The TLSA underlines the need for the protection of sensitive data. This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard (AES). For data transfer and storage, this encryption guarantees the data’s… More >

  • Open Access

    ARTICLE

    LogDA: Dual Attention-Based Log Anomaly Detection Addressing Data Imbalance

    Chexiaole Zhang, Haiyan Fu*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1291-1306, 2025, DOI:10.32604/cmc.2025.060740 - 26 March 2025

    Abstract As computer data grows exponentially, detecting anomalies within system logs has become increasingly important. Current research on log anomaly detection largely depends on log templates derived from log parsing. Word embedding is utilized to extract information from these templates. However, this method neglects a portion of the content within the logs and confronts the challenge of data imbalance among various log template types after parsing. Currently, specialized research on data imbalance across log template categories remains scarce. A dual-attention-based log anomaly detection model (LogDA), which leveraged data imbalance, was proposed to address these issues in More >

  • Open Access

    ARTICLE

    FHGraph: A Novel Framework for Fake News Detection Using Graph Contrastive Learning and LLM

    Yuanqing Li1, Mengyao Dai1, Sanfeng Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 309-333, 2025, DOI:10.32604/cmc.2025.060455 - 26 March 2025

    Abstract Social media has significantly accelerated the rapid dissemination of information, but it also boosts propagation of fake news, posing serious challenges to public awareness and social stability. In real-world contexts, the volume of trustable information far exceeds that of rumors, resulting in a class imbalance that leads models to prioritize the majority class during training. This focus diminishes the model’s ability to recognize minority class samples. Furthermore, models may experience overfitting when encountering these minority samples, further compromising their generalization capabilities. Unlike node-level classification tasks, fake news detection in social networks operates on graph-level samples,… More >

  • Open Access

    ARTICLE

    Target Detection-Oriented RGCN Inference Enhancement Method

    Lijuan Zhang1,2, Xiaoyu Wang1,2, Songtao Zhang3, Yutong Jiang4,*, Dongming Li1, Weichen Sun4

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1219-1237, 2025, DOI:10.32604/cmc.2025.059856 - 26 March 2025

    Abstract In this paper, a reasoning enhancement method based on RGCN (Relational Graph Convolutional Network) is proposed to improve the detection capability of UAV (Unmanned Aerial Vehicle) on fast-moving military targets in urban battlefield environments. By combining military images with the publicly available VisDrone2019 dataset, a new dataset called VisMilitary was built and multiple YOLO (You Only Look Once) models were tested on it. Due to the low confidence problem caused by fuzzy targets, the performance of traditional YOLO models on real battlefield images decreases significantly. Therefore, we propose an improved RGCN inference model, which improves More >

  • Open Access

    ARTICLE

    An Uncertainty Quantization-Based Method for Anti-UAV Detection in Infrared Images

    Can Wu1,2, Wenyi Tang2, Yunbo Rao1,2,*, Yinjie Chen1, Hui Ding2, Shuzhen Zhu3, Yuanyuan Wang3

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1415-1434, 2025, DOI:10.32604/cmc.2025.059797 - 26 March 2025

    Abstract Infrared unmanned aerial vehicle (UAV) target detection presents significant challenges due to the interplay between small targets and complex backgrounds. Traditional methods, while effective in controlled environments, often fail in scenarios involving long-range targets, high noise levels, or intricate backgrounds, highlighting the need for more robust approaches. To address these challenges, we propose a novel three-stage UAV segmentation framework that leverages uncertainty quantification to enhance target saliency. This framework incorporates a Bayesian convolutional neural network capable of generating both segmentation maps and probabilistic uncertainty maps. By utilizing uncertainty predictions, our method refines segmentation outcomes, achieving… More >

  • Open Access

    ARTICLE

    Institution Attribute Mining Technology for Access Control Based on Hybrid Capsule Network

    Aodi Liu, Xuehui Du*, Na Wang, Xiangyu Wu

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1471-1489, 2025, DOI:10.32604/cmc.2025.059784 - 26 March 2025

    Abstract Security attributes are the premise and foundation for implementing Attribute-Based Access Control (ABAC) mechanisms. However, when dealing with massive volumes of unstructured text big data resources, the current attribute management methods based on manual extraction face several issues, such as high costs for attribute extraction, long processing times, unstable accuracy, and poor scalability. To address these problems, this paper proposes an attribute mining technology for access control institutions based on hybrid capsule networks. This technology leverages transfer learning ideas, utilizing Bidirectional Encoder Representations from Transformers (BERT) pre-trained language models to achieve vectorization of unstructured text… More >

  • Open Access

    ARTICLE

    Enhanced Detection of APT Vector Lateral Movement in Organizational Networks Using Lightweight Machine Learning

    Mathew Nicho1,2,*, Oluwasegun Adelaiye3, Christopher D. McDermott4, Shini Girija5

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 281-308, 2025, DOI:10.32604/cmc.2025.059597 - 26 March 2025

    Abstract The successful penetration of government, corporate, and organizational IT systems by state and non-state actors deploying APT vectors continues at an alarming pace. Advanced Persistent Threat (APT) attacks continue to pose significant challenges for organizations despite technological advancements in artificial intelligence (AI)-based defense mechanisms. While AI has enhanced organizational capabilities for deterrence, detection, and mitigation of APTs, the global escalation in reported incidents, particularly those successfully penetrating critical government infrastructure has heightened concerns among information technology (IT) security administrators and decision-makers. Literature review has identified the stealthy lateral movement (LM) of malware within the initially… More >

  • Open Access

    ARTICLE

    Optimization of Dimensional Factors Using AI Technique Affecting Solar Dryer Efficiency for Drying Agricultural Materials

    Ravendra Kumar Ray*, A.C. Tiwari

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 845-860, 2025, DOI:10.32604/cmc.2025.059435 - 26 March 2025

    Abstract The design and development of solar dryers are crucial in regions with abundant solar energy, such as Bhopal, India, where seasonal variations significantly impact the efficiency of drying processes. The paper is focused on employing a comprehensive mathematical model to predict the dryer’s performance in drying the materials such as banana slices. To enhance this model, Hyper Tuned Swarm Optimization with Gradient Tree (HT_SOGT) was utilized to accurately predict and determine the optimal size of the dryer dimensions considering various mathematical calculations for material drying. The predictive model considered the influence of seasonal fluctuations, ensuring More >

  • Open Access

    ARTICLE

    xCViT: Improved Vision Transformer Network with Fusion of CNN and Xception for Skin Disease Recognition with Explainable AI

    Armughan Ali1,2, Hooria Shahbaz2, Robertas Damaševičius3,*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1367-1398, 2025, DOI:10.32604/cmc.2025.059301 - 26 March 2025

    Abstract Skin cancer is the most prevalent cancer globally, primarily due to extensive exposure to Ultraviolet (UV) radiation. Early identification of skin cancer enhances the likelihood of effective treatment, as delays may lead to severe tumor advancement. This study proposes a novel hybrid deep learning strategy to address the complex issue of skin cancer diagnosis, with an architecture that integrates a Vision Transformer, a bespoke convolutional neural network (CNN), and an Xception module. They were evaluated using two benchmark datasets, HAM10000 and Skin Cancer ISIC. On the HAM10000, the model achieves a precision of 95.46%, an… More >

  • Open Access

    ARTICLE

    GD-YOLO: A Network with Gather and Distribution Mechanism for Infrared Image Detection of Electrical Equipment

    Junpeng Wu1,2,*, Xingfan Jiang2

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 897-915, 2025, DOI:10.32604/cmc.2025.058714 - 26 March 2025

    Abstract As technologies related to power equipment fault diagnosis and infrared temperature measurement continue to advance, the classification and identification of infrared temperature measurement images have become crucial in effective intelligent fault diagnosis of various electrical equipment. In response to the increasing demand for sufficient feature fusion in current real-time detection and low detection accuracy in existing networks for Substation fault diagnosis, we introduce an innovative method known as Gather and Distribution Mechanism-You Only Look Once (GD-YOLO). Firstly, a partial convolution group is designed based on different convolution kernels. We combine the partial convolution group with… More >

Displaying 71-80 on page 8 of 3489. Per Page