Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (120)
  • Open Access

    ARTICLE

    Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning

    Shijie Tang1,2, Yong Ding1,3,4,*, Huiyong Wang5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1129-1150, 2025, DOI:10.32604/cmc.2024.059143 - 03 January 2025

    Abstract As more and more devices in Cyber-Physical Systems (CPS) are connected to the Internet, physical components such as programmable logic controller (PLC), sensors, and actuators are facing greater risks of network attacks, and fast and accurate attack detection techniques are crucial. The key problem in distinguishing between normal and abnormal sequences is to model sequential changes in a large and diverse field of time series. To address this issue, we propose an anomaly detection method based on distributed deep learning. Our method uses a bilateral filtering algorithm for sequential sequences to remove noise in the More >

  • Open Access

    ARTICLE

    Anomaly Detection of Controllable Electric Vehicles through Node Equation against Aggregation Attack

    Jing Guo*, Ziying Wang, Yajuan Guo, Haitao Jiang

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 427-442, 2025, DOI:10.32604/cmc.2024.057045 - 03 January 2025

    Abstract The rapid proliferation of electric vehicle (EV) charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system. This study presents an innovative anomaly detection framework for EV charging stations, addressing the unique challenges posed by third-party aggregation platforms. Our approach integrates node equations-based on the parameter identification with a novel deep learning model, xDeepCIN, to detect abnormal data reporting indicative of aggregation attacks. We employ a graph-theoretic approach to model EV charging networks and utilize Markov Chain Monte Carlo techniques for accurate parameter estimation. The xDeepCIN model, incorporating a Compressed Interaction Network, has the ability… More >

  • Open Access

    ARTICLE

    A Scalable and Generalized Deep Ensemble Model for Road Anomaly Detection in Surveillance Videos

    Sarfaraz Natha1,2,*, Fareed A. Jokhio1, Mehwish Laghari1, Mohammad Siraj3,*, Saif A. Alsaif3, Usman Ashraf4, Asghar Ali5

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3707-3729, 2024, DOI:10.32604/cmc.2024.057684 - 19 December 2024

    Abstract Surveillance cameras have been widely used for monitoring in both private and public sectors as a security measure. Close Circuits Television (CCTV) Cameras are used to surveillance and monitor the normal and anomalous incidents. Real-world anomaly detection is a significant challenge due to its complex and diverse nature. It is difficult to manually analyze because vast amounts of video data have been generated through surveillance systems, and the need for automated techniques has been raised to enhance detection accuracy. This paper proposes a novel deep-stacked ensemble model integrated with a data augmentation approach called Stack… More >

  • Open Access

    ARTICLE

    AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics

    Juhwan Kim, Baehoon Son, Jihyeon Yu, Joobeom Yun*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3371-3393, 2024, DOI:10.32604/cmc.2024.057234 - 18 November 2024

    Abstract Digital forensics aims to uncover evidence of cybercrimes within compromised systems. These cybercrimes are often perpetrated through the deployment of malware, which inevitably leaves discernible traces within the compromised systems. Forensic analysts are tasked with extracting and subsequently analyzing data, termed as artifacts, from these systems to gather evidence. Therefore, forensic analysts must sift through extensive datasets to isolate pertinent evidence. However, manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive. Previous studies addressed such inefficiencies by integrating artificial intelligence (AI) technologies into digital forensics. Despite the efforts in previous studies, artifacts were… More >

  • Open Access

    ARTICLE

    A Recurrent Neural Network for Multimodal Anomaly Detection by Using Spatio-Temporal Audio-Visual Data

    Sameema Tariq1, Ata-Ur- Rehman2,3, Maria Abubakar2, Waseem Iqbal4, Hatoon S. Alsagri5, Yousef A. Alduraywish5, Haya Abdullah A. Alhakbani5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2493-2515, 2024, DOI:10.32604/cmc.2024.055787 - 18 November 2024

    Abstract In video surveillance, anomaly detection requires training machine learning models on spatio-temporal video sequences. However, sometimes the video-only data is not sufficient to accurately detect all the abnormal activities. Therefore, we propose a novel audio-visual spatiotemporal autoencoder specifically designed to detect anomalies for video surveillance by utilizing audio data along with video data. This paper presents a competitive approach to a multi-modal recurrent neural network for anomaly detection that combines separate spatial and temporal autoencoders to leverage both spatial and temporal features in audio-visual data. The proposed model is trained to produce low reconstruction error… More >

  • Open Access

    ARTICLE

    Deep Learning-Driven Anomaly Detection for IoMT-Based Smart Healthcare Systems

    Attiya Khan1, Muhammad Rizwan2, Ovidiu Bagdasar2,3, Abdulatif Alabdulatif4,*, Sulaiman Alamro4, Abdullah Alnajim5

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2121-2141, 2024, DOI:10.32604/cmes.2024.054380 - 31 October 2024

    Abstract The Internet of Medical Things (IoMT) is an emerging technology that combines the Internet of Things (IoT) into the healthcare sector, which brings remarkable benefits to facilitate remote patient monitoring and reduce treatment costs. As IoMT devices become more scalable, Smart Healthcare Systems (SHS) have become increasingly vulnerable to cyberattacks. Intrusion Detection Systems (IDS) play a crucial role in maintaining network security. An IDS monitors systems or networks for suspicious activities or potential threats, safeguarding internal networks. This paper presents the development of an IDS based on deep learning techniques utilizing benchmark datasets. We propose More >

  • Open Access

    ARTICLE

    Mural Anomaly Region Detection Algorithm Based on Hyperspectral Multiscale Residual Attention Network

    Bolin Guo1,2, Shi Qiu1,*, Pengchang Zhang1, Xingjia Tang3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1809-1833, 2024, DOI:10.32604/cmc.2024.056706 - 15 October 2024

    Abstract Mural paintings hold significant historical information and possess substantial artistic and cultural value. However, murals are inevitably damaged by natural environmental factors such as wind and sunlight, as well as by human activities. For this reason, the study of damaged areas is crucial for mural restoration. These damaged regions differ significantly from undamaged areas and can be considered abnormal targets. Traditional manual visual processing lacks strong characterization capabilities and is prone to omissions and false detections. Hyperspectral imaging can reflect the material properties more effectively than visual characterization methods. Thus, this study employs hyperspectral imaging… More >

  • Open Access

    ARTICLE

    Advancing Autoencoder Architectures for Enhanced Anomaly Detection in Multivariate Industrial Time Series

    Byeongcheon Lee1, Sangmin Kim1, Muazzam Maqsood2, Jihoon Moon3,*, Seungmin Rho1,4,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1275-1300, 2024, DOI:10.32604/cmc.2024.054826 - 15 October 2024

    Abstract In the context of rapid digitization in industrial environments, how effective are advanced unsupervised learning models, particularly hybrid autoencoder models, at detecting anomalies in industrial control system (ICS) datasets? This study is crucial because it addresses the challenge of identifying rare and complex anomalous patterns in the vast amounts of time series data generated by Internet of Things (IoT) devices, which can significantly improve the reliability and safety of these systems. In this paper, we propose a hybrid autoencoder model, called ConvBiLSTM-AE, which combines convolutional neural network (CNN) and bidirectional long short-term memory (BiLSTM) to More >

  • Open Access

    ARTICLE

    PUNet: A Semi-Supervised Anomaly Detection Model for Network Anomaly Detection Based on Positive Unlabeled Data

    Gang Long, Zhaoxin Zhang*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 327-343, 2024, DOI:10.32604/cmc.2024.054558 - 15 October 2024

    Abstract Network anomaly detection plays a vital role in safeguarding network security. However, the existing network anomaly detection task is typically based on the one-class zero-positive scenario. This approach is susceptible to overfitting during the training process due to discrepancies in data distribution between the training set and the test set. This phenomenon is known as prediction drift. Additionally, the rarity of anomaly data, often masked by normal data, further complicates network anomaly detection. To address these challenges, we propose the PUNet network, which ingeniously combines the strengths of traditional machine learning and deep learning techniques… More >

  • Open Access

    REVIEW

    Enhancing Internet of Things Intrusion Detection Using Artificial Intelligence

    Shachar Bar1, P. W. C. Prasad2, Md Shohel Sayeed3,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1-23, 2024, DOI:10.32604/cmc.2024.053861 - 15 October 2024

    Abstract Escalating cyber security threats and the increased use of Internet of Things (IoT) devices require utilisation of the latest technologies available to supply adequate protection. The aim of Intrusion Detection Systems (IDS) is to prevent malicious attacks that corrupt operations and interrupt data flow, which might have significant impact on critical industries and infrastructure. This research examines existing IDS, based on Artificial Intelligence (AI) for IoT devices, methods, and techniques. The contribution of this study consists of identification of the most effective IDS systems in terms of accuracy, precision, recall and F1-score; this research also… More >

Displaying 1-10 on page 1 of 120. Per Page