Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (110)
  • Open Access

    ARTICLE

    Anomaly Detection Using Data Rate of Change on Medical Data

    Kwang-Cheol Rim1, Young-Min Yoon2, Sung-Uk Kim3, Jeong-In Kim4,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3903-3916, 2024, DOI:10.32604/cmc.2024.054620

    Abstract The identification and mitigation of anomaly data, characterized by deviations from normal patterns or singularities, stand as critical endeavors in modern technological landscapes, spanning domains such as Non-Fungible Tokens (NFTs), cyber-security, and the burgeoning metaverse. This paper presents a novel proposal aimed at refining anomaly detection methodologies, with a particular focus on continuous data streams. The essence of the proposed approach lies in analyzing the rate of change within such data streams, leveraging this dynamic aspect to discern anomalies with heightened precision and efficacy. Through empirical evaluation, our method demonstrates a marked improvement over existing More >

  • Open Access

    ARTICLE

    Enhancing Log Anomaly Detection with Semantic Embedding and Integrated Neural Network Innovations

    Zhanyang Xu*, Zhe Wang, Jian Xu, Hongyan Shi, Hong Zhao

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3991-4015, 2024, DOI:10.32604/cmc.2024.051620

    Abstract System logs, serving as a pivotal data source for performance monitoring and anomaly detection, play an indispensable role in assuring service stability and reliability. Despite this, the majority of existing log-based anomaly detection methodologies predominantly depend on the sequence or quantity attributes of logs, utilizing solely a single Recurrent Neural Network (RNN) and its variant sequence models for detection. These approaches have not thoroughly exploited the semantic information embedded in logs, exhibit limited adaptability to novel logs, and a single model struggles to fully unearth the potential features within the log sequence. Addressing these challenges,… More >

  • Open Access

    ARTICLE

    Anomaly Detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction

    Min-Gyu Kim1, Hwankuk Kim2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 585-607, 2024, DOI:10.32604/cmes.2024.051221

    Abstract In the IoT (Internet of Things) domain, the increased use of encryption protocols such as SSL/TLS, VPN (Virtual Private Network), and Tor has led to a rise in attacks leveraging encrypted traffic. While research on anomaly detection using AI (Artificial Intelligence) is actively progressing, the encrypted nature of the data poses challenges for labeling, resulting in data imbalance and biased feature extraction toward specific nodes. This study proposes a reconstruction error-based anomaly detection method using an autoencoder (AE) that utilizes packet metadata excluding specific node information. The proposed method omits biased packet metadata such as… More >

  • Open Access

    ARTICLE

    Multivariate Time Series Anomaly Detection Based on Spatial-Temporal Network and Transformer in Industrial Internet of Things

    Mengmeng Zhao1,2,3, Haipeng Peng1,2,*, Lixiang Li1,2, Yeqing Ren1,2

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2815-2837, 2024, DOI:10.32604/cmc.2024.053765

    Abstract In the Industrial Internet of Things (IIoT), sensors generate time series data to reflect the working state. When the systems are attacked, timely identification of outliers in time series is critical to ensure security. Although many anomaly detection methods have been proposed, the temporal correlation of the time series over the same sensor and the state (spatial) correlation between different sensors are rarely considered simultaneously in these methods. Owing to the superior capability of Transformer in learning time series features. This paper proposes a time series anomaly detection method based on a spatial-temporal network and… More >

  • Open Access

    ARTICLE

    Federated Network Intelligence Orchestration for Scalable and Automated FL-Based Anomaly Detection in B5G Networks

    Pablo Fernández Saura1,*, José M. Bernabé Murcia1, Emilio García de la Calera Molina1, Alejandro Molina Zarca2, Jorge Bernal Bernabé1, Antonio F. Skarmeta Gómez1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 163-193, 2024, DOI:10.32604/cmc.2024.051307

    Abstract The management of network intelligence in Beyond 5G (B5G) networks encompasses the complex challenges of scalability, dynamicity, interoperability, privacy, and security. These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence (AI)-based analytics, empowering seamless integration across the entire Continuum (Edge, Fog, Core, Cloud). This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning (FL)-based anomaly detection in B5G networks. By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm, which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize… More >

  • Open Access

    ARTICLE

    Optimized Binary Neural Networks for Road Anomaly Detection: A TinyML Approach on Edge Devices

    Amna Khatoon1, Weixing Wang1,*, Asad Ullah2, Limin Li3,*, Mengfei Wang1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 527-546, 2024, DOI:10.32604/cmc.2024.051147

    Abstract Integrating Tiny Machine Learning (TinyML) with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level. Constrained devices efficiently implement a Binary Neural Network (BNN) for road feature extraction, utilizing quantization and compression through a pruning strategy. The modifications resulted in a 28-fold decrease in memory usage and a 25% enhancement in inference speed while only experiencing a 2.5% decrease in accuracy. It showcases its superiority over conventional detection algorithms in different road image scenarios. Although constrained by computer resources and training datasets, our results indicate opportunities for More >

  • Open Access

    ARTICLE

    LSTM Based Neural Network Model for Anomaly Event Detection in Care-Independent Smart Homes

    Brij B. Gupta1,2,3,*, Akshat Gaurav4, Razaz Waheeb Attar5, Varsha Arya6,7, Ahmed Alhomoud8, Kwok Tai Chui9

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2689-2706, 2024, DOI:10.32604/cmes.2024.050825

    Abstract This study introduces a long-short-term memory (LSTM)-based neural network model developed for detecting anomaly events in care-independent smart homes, focusing on the critical application of elderly fall detection. It balances the dataset using the Synthetic Minority Over-sampling Technique (SMOTE), effectively neutralizing bias to address the challenge of unbalanced datasets prevalent in time-series classification tasks. The proposed LSTM model is trained on the enriched dataset, capturing the temporal dependencies essential for anomaly recognition. The model demonstrated a significant improvement in anomaly detection, with an accuracy of 84%. The results, detailed in the comprehensive classification and confusion More >

  • Open Access

    ARTICLE

    A Novel Graph Structure Learning Based Semi-Supervised Framework for Anomaly Identification in Fluctuating IoT Environment

    Weijian Song1,, Xi Li1,, Peng Chen1,*, Juan Chen1, Jianhua Ren2, Yunni Xia3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 3001-3016, 2024, DOI:10.32604/cmes.2024.048563

    Abstract With the rapid development of Internet of Things (IoT) technology, IoT systems have been widely applied in healthcare, transportation, home, and other fields. However, with the continuous expansion of the scale and increasing complexity of IoT systems, the stability and security issues of IoT systems have become increasingly prominent. Thus, it is crucial to detect anomalies in the collected IoT time series from various sensors. Recently, deep learning models have been leveraged for IoT anomaly detection. However, owing to the challenges associated with data labeling, most IoT anomaly detection methods resort to unsupervised learning techniques.… More >

  • Open Access

    ARTICLE

    A Power Data Anomaly Detection Model Based on Deep Learning with Adaptive Feature Fusion

    Xiu Liu, Liang Gu*, Xin Gong, Long An, Xurui Gao, Juying Wu

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4045-4061, 2024, DOI:10.32604/cmc.2024.048442

    Abstract With the popularisation of intelligent power, power devices have different shapes, numbers and specifications. This means that the power data has distributional variability, the model learning process cannot achieve sufficient extraction of data features, which seriously affects the accuracy and performance of anomaly detection. Therefore, this paper proposes a deep learning-based anomaly detection model for power data, which integrates a data alignment enhancement technique based on random sampling and an adaptive feature fusion method leveraging dimension reduction. Aiming at the distribution variability of power data, this paper developed a sliding window-based data adjustment method for… More >

  • Open Access

    ARTICLE

    FusionNN: A Semantic Feature Fusion Model Based on Multimodal for Web Anomaly Detection

    Li Wang1,2,3,*, Mingshan Xia1,2,*, Hao Hu1, Jianfang Li1,2, Fengyao Hou1,2, Gang Chen1,2,3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2991-3006, 2024, DOI:10.32604/cmc.2024.048637

    Abstract With the rapid development of the mobile communication and the Internet, the previous web anomaly detection and identification models were built relying on security experts’ empirical knowledge and attack features. Although this approach can achieve higher detection performance, it requires huge human labor and resources to maintain the feature library. In contrast, semantic feature engineering can dynamically discover new semantic features and optimize feature selection by automatically analyzing the semantic information contained in the data itself, thus reducing dependence on prior knowledge. However, current semantic features still have the problem of semantic expression singularity, as… More >

Displaying 1-10 on page 1 of 110. Per Page