Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (420)
  • Open Access

    ARTICLE

    Mining Fine-Grain Face Forgery Cues with Fusion Modality

    Shufan Peng, Manchun Cai*, Tianliang Lu, Xiaowen Liu

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4025-4045, 2023, DOI:10.32604/cmc.2023.036688

    Abstract Face forgery detection is drawing ever-increasing attention in the academic community owing to security concerns. Despite the considerable progress in existing methods, we note that: Previous works overlooked fine-grain forgery cues with high transferability. Such cues positively impact the model’s accuracy and generalizability. Moreover, single-modality often causes overfitting of the model, and Red-Green-Blue (RGB) modal-only is not conducive to extracting the more detailed forgery traces. We propose a novel framework for fine-grain forgery cues mining with fusion modality to cope with these issues. First, we propose two functional modules to reveal and locate the deeper forged features. Our method locates… More >

  • Open Access

    ARTICLE

    A New Model for Network Security Situation Assessment of the Industrial Internet

    Ming Cheng1, Shiming Li1,3,*, Yuhe Wang1, Guohui Zhou1, Peng Han1, Yan Zhao2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2527-2555, 2023, DOI:10.32604/cmc.2023.036427

    Abstract To address the problem of network security situation assessment in the Industrial Internet, this paper adopts the evidential reasoning (ER)algorithm and belief rule base (BRB) method to establish an assessment model. First, this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge. Second, the evaluation indicators are fused with expert knowledge and the ER algorithm. According to the fusion results, a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established, and the projection covariance matrix adaptive evolution… More >

  • Open Access

    ARTICLE

    Adaptive Noise Detector and Partition Filter for Image Restoration

    Cong Lin1, Chenghao Qiu1, Can Wu1, Siling Feng1,*, Mengxing Huang1,2,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4317-4340, 2023, DOI:10.32604/cmc.2023.036249

    Abstract The random-value impulse noise (RVIN) detection approach in image denoising, which is dependent on manually defined detection thresholds or local window information, does not have strong generalization performance and cannot successfully cope with damaged pictures with high noise levels. The fusion of the K-means clustering approach in the noise detection stage is reviewed in this research, and the internal relationship between the flat region and the detail area of the damaged picture is thoroughly explored to suggest an unique two-stage method for gray image denoising. Based on the concept of pixel clustering and grouping, all pixels in the damaged picture… More >

  • Open Access

    ARTICLE

    Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing

    Jihyeon Yu1, Juhwan Kim1, Youngwoo Lee1, Fayozbek Rustamov2, Joobeom Yun1,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3291-3315, 2023, DOI:10.32604/cmc.2023.035835

    Abstract Internet of things (IoT) devices are being increasingly used in numerous areas. However, the low priority on security and various IoT types have made these devices vulnerable to attacks. To prevent this, recent studies have analyzed firmware in an emulation environment that does not require actual devices and is efficient for repeated experiments. However, these studies focused only on major firmware architectures and rarely considered exotic firmware. In addition, because of the diversity of firmware, the emulation success rate is not high in terms of large-scale analyses. In this study, we propose the adaptive emulation framework for multi-architecture (AEMA). In… More >

  • Open Access

    ARTICLE

    Concept Drift Analysis and Malware Attack Detection System Using Secure Adaptive Windowing

    Emad Alsuwat1,*, Suhare Solaiman1, Hatim Alsuwat2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3743-3759, 2023, DOI:10.32604/cmc.2023.035126

    Abstract Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning (ML) models. Due to attackers’ (and/or benign equivalents’) dynamic behavior changes, testing data distribution frequently diverges from original training data over time, resulting in substantial model failures. Due to their dispersed and dynamic nature, distributed denial-of-service attacks pose a danger to cybersecurity, resulting in attacks with serious consequences for users and businesses. This paper proposes a novel design for concept drift analysis and detection of malware attacks like Distributed Denial of Service (DDOS) in the network.… More >

  • Open Access

    ARTICLE

    Adaptive Cyber Defense Technique Based on Multiagent Reinforcement Learning Strategies

    Adel Alshamrani1,*, Abdullah Alshahrani2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2757-2771, 2023, DOI:10.32604/iasc.2023.032835

    Abstract The static nature of cyber defense systems gives attackers a sufficient amount of time to explore and further exploit the vulnerabilities of information technology systems. In this paper, we investigate a problem where multiagent systems sensing and acting in an environment contribute to adaptive cyber defense. We present a learning strategy that enables multiple agents to learn optimal policies using multiagent reinforcement learning (MARL). Our proposed approach is inspired by the multiarmed bandits (MAB) learning technique for multiple agents to cooperate in decision making or to work independently. We study a MAB approach in which defenders visit a system multiple… More >

  • Open Access

    ARTICLE

    Soil Moisture Rather than Soil Nutrient Regulates the Belowground Bud Bank of Rhizomatous Species Psammochloa villosa in Arid Sand Dunes

    Yawei Dong1, Ziyue Guo1, Qun Ma2, Zhiming Xin3, Jin Tao1, Jiatai Tian1, Jinlei Zhu3, Zhiming Zhang1,*, Jianqiang Qian1,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.5, pp. 1301-1309, 2023, DOI:10.32604/phyton.2023.027043

    Abstract In arid and semi-arid sand dune ecosystems, belowground bud bank plays an important role in population regeneration and vegetation restoration. However, the responses of belowground bud bank size and composition to sand burial and its induced changes in soil environmental factors have been rarely studied. In arid sand dunes of Northwestern China, we investigated belowground bud bank size and composition of the typical rhizomatous psammophyte Psammochloa villosa as well as three key soil environmental factors (soil moisture, total carbon and total nitrogen) under different depths of sand burial. Total buds and rhizome buds increased significantly with increasing burial depth, whereas… More >

  • Open Access

    ARTICLE

    Adaptive Time Slot Resource Allocation in SWIPT IoT Networks

    Yunong Yang1, Yuexia Zhang2,3,*, Zhihai Zhuo2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2787-2813, 2023, DOI:10.32604/cmes.2023.027351

    Abstract The rapid advancement of Internet of Things (IoT) technology has brought convenience to people’s lives; however further development of IoT faces serious challenges, such as limited energy and shortage of network spectrum resources. To address the above challenges, this study proposes a simultaneous wireless information and power transfer IoT adaptive time slot resource allocation (SIATS) algorithm. First, an adaptive time slot consisting of periods for sensing, information transmission, and energy harvesting is designed to ensure that the minimum energy harvesting requirement is met while the maximum uplink and downlink throughputs are obtained. Second, the optimal transmit power and channel assignment… More >

  • Open Access

    ARTICLE

    An Enhanced Adaptive Differential Evolution Approach for Constrained Optimization Problems

    Wenchao Yi, Zhilei Lin, Yong Chen, Zhi Pei*, Jiansha Lu

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2841-2860, 2023, DOI:10.32604/cmes.2023.027055

    Abstract Effective constrained optimization algorithms have been proposed for engineering problems recently. It is common to consider constraint violation and optimization algorithm as two separate parts. In this study, a pbest selection mechanism is proposed to integrate the current mutation strategy in constrained optimization problems. Based on the improved pbest selection method, an adaptive differential evolution approach is proposed, which helps the population jump out of the infeasible region. If all the individuals are infeasible, the top 5% of infeasible individuals are selected. In addition, a modified truncated ε-level method is proposed to avoid trapping in infeasible regions. The proposed adaptive… More > Graphic Abstract

    An Enhanced Adaptive Differential Evolution Approach for Constrained Optimization Problems

  • Open Access

    ARTICLE

    Adaptive Boundary and Semantic Composite Segmentation Method for Individual Objects in Aerial Images

    Ying Li1,2, Guanghong Gong1, Dan Wang1, Ni Li1,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2237-2265, 2023, DOI:10.32604/cmes.2023.025193

    Abstract There are two types of methods for image segmentation. One is traditional image processing methods, which are sensitive to details and boundaries, yet fail to recognize semantic information. The other is deep learning methods, which can locate and identify different objects, but boundary identifications are not accurate enough. Both of them cannot generate entire segmentation information. In order to obtain accurate edge detection and semantic information, an Adaptive Boundary and Semantic Composite Segmentation method (ABSCS) is proposed. This method can precisely semantic segment individual objects in large-size aerial images with limited GPU performances. It includes adaptively dividing and modifying the… More > Graphic Abstract

    Adaptive Boundary and Semantic Composite Segmentation Method for Individual Objects in Aerial Images

Displaying 61-70 on page 7 of 420. Per Page