Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (128)
  • Open Access

    ARTICLE

    Critical Relation Path Aggregation-Based Industrial Control Component Exploitable Vulnerability Reasoning

    Zibo Wang1,3, Chaobin Huo2, Yaofang Zhang1,3, Shengtao Cheng1,3, Yilu Chen1,3, Xiaojie Wei5, Chao Li4, Bailing Wang1,3,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2957-2979, 2023, DOI:10.32604/cmc.2023.035694

    Abstract With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific relation is valid between an… More >

  • Open Access

    ARTICLE

    Multi-Path Attention Inverse Discrimination Network for Offline Signature Verification

    Xiaorui Zhang1,2,3,4,*, Yingying Wang1, Wei Sun4,5, Qi Cui6, Xindong Wei7

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3057-3071, 2023, DOI:10.32604/iasc.2023.033578

    Abstract Signature verification, which is a method to distinguish the authenticity of signature images, is a biometric verification technique that can effectively reduce the risk of forged signatures in financial, legal, and other business environments. However, compared with ordinary images, signature images have the following characteristics: First, the strokes are slim, i.e., there is less effective information. Second, the signature changes slightly with the time, place, and mood of the signer, i.e., it has high intraclass differences. These challenges lead to the low accuracy of the existing methods based on convolutional neural networks (CNN). This study proposes an end-to-end multi-path attention… More >

  • Open Access

    ARTICLE

    Crack Segmentation Based on Fusing Multi-Scale Wavelet and Spatial-Channel Attention

    Peng Geng*, Ji Lu, Hongtao Ma, Guiyi Yang

    Structural Durability & Health Monitoring, Vol.17, No.1, pp. 1-22, 2023, DOI:10.32604/sdhm.2023.018632

    Abstract Accurate and reliable crack segmentation is a challenge and meaningful task. In this article, aiming at the characteristics of cracks on the concrete images, the intensity frequency information of source images which is obtained by Discrete Wavelet Transform (DWT) is fed into deep learning-based networks to enhance the ability of network on crack segmentation. To well integrate frequency information into network an effective and novel DWTA module based on the DWT and scSE attention mechanism is proposed. The semantic information of cracks is enhanced and the irrelevant information is suppressed by DWTA module. And the gap between frequency information and… More >

  • Open Access

    ARTICLE

    Using Recurrent Neural Network Structure and Multi-Head Attention with Convolution for Fraudulent Phone Text Recognition

    Junjie Zhou, Hongkui Xu*, Zifeng Zhang, Jiangkun Lu, Wentao Guo, Zhenye Li

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2277-2297, 2023, DOI:10.32604/csse.2023.036419

    Abstract Fraud cases have been a risk in society and people’s property security has been greatly threatened. In recent studies, many promising algorithms have been developed for social media offensive text recognition as well as sentiment analysis. These algorithms are also suitable for fraudulent phone text recognition. Compared to these tasks, the semantics of fraudulent words are more complex and more difficult to distinguish. Recurrent Neural Networks (RNN), the variants of RNN, Convolutional Neural Networks (CNN), and hybrid neural networks to extract text features are used by most text classification research. However, a single network or a simple network combination cannot… More >

  • Open Access

    ARTICLE

    ER-Net: Efficient Recalibration Network for Multi-View Multi-Person 3D Pose Estimation

    Mi Zhou1, Rui Liu1,*, Pengfei Yi1, Dongsheng Zhou1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 2093-2109, 2023, DOI:10.32604/cmes.2023.024189

    Abstract Multi-view multi-person 3D human pose estimation is a hot topic in the field of human pose estimation due to its wide range of application scenarios. With the introduction of end-to-end direct regression methods, the field has entered a new stage of development. However, the regression results of joints that are more heavily influenced by external factors are not accurate enough even for the optimal method. In this paper, we propose an effective feature recalibration module based on the channel attention mechanism and a relative optimal calibration strategy, which is applied to the multi-view multi-person 3D human pose estimation task to… More > Graphic Abstract

    ER-Net: Efficient Recalibration Network for Multi-View Multi-Person 3D Pose Estimation

  • Open Access

    ARTICLE

    RT-YOLO: A Residual Feature Fusion Triple Attention Network for Aerial Image Target Detection

    Pan Zhang, Hongwei Deng*, Zhong Chen

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1411-1430, 2023, DOI:10.32604/cmc.2023.034876

    Abstract In recent years, target detection of aerial images of unmanned aerial vehicle (UAV) has become one of the hottest topics. However, target detection of UAV aerial images often presents false detection and missed detection. We proposed a modified you only look once (YOLO) model to improve the problems arising in object detection in UAV aerial images: (1) A new residual structure is designed to improve the ability to extract features by enhancing the fusion of the inner features of the single layer. At the same time, triplet attention module is added to strengthen the connection between space and channel and… More >

  • Open Access

    ARTICLE

    License Plate Recognition via Attention Mechanism

    Longjuan Wang1,2, Chunjie Cao1,2, Binghui Zou1,2, Jun Ye1,2,*, Jin Zhang3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1801-1814, 2023, DOI:10.32604/cmc.2023.032785

    Abstract License plate recognition technology use widely in intelligent traffic management and control. Researchers have been committed to improving the speed and accuracy of license plate recognition for nearly 30 years. This paper is the first to propose combining the attention mechanism with YOLO-v5 and LPRnet to construct a new license plate recognition model (LPR-CBAM-Net). Through the attention mechanism CBAM (Convolutional Block Attention Module), the importance of different feature channels in license plate recognition can be re-calibrated to obtain proper attention to features. Force information to achieve the purpose of improving recognition speed and accuracy. Experimental results show that the model… More >

  • Open Access

    ARTICLE

    Discharge Summaries Based Sentiment Detection Using Multi-Head Attention and CNN-BiGRU

    Samer Abdulateef Waheeb*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 981-998, 2023, DOI:10.32604/csse.2023.035753

    Abstract Automatic extraction of the patient’s health information from the unstructured data concerning the discharge summary remains challenging. Discharge summary related documents contain various aspects of the patient health condition to examine the quality of treatment and thereby help improve decision-making in the medical field. Using a sentiment dictionary and feature engineering, the researchers primarily mine semantic text features. However, choosing and designing features requires a lot of manpower. The proposed approach is an unsupervised deep learning model that learns a set of clusters embedded in the latent space. A composite model including Active Learning (AL), Convolutional Neural Network (CNN), BiGRU,… More >

  • Open Access

    ARTICLE

    3D Object Detection with Attention: Shell-Based Modeling

    Xiaorui Zhang1,2,3,4,*, Ziquan Zhao1, Wei Sun4,5, Qi Cui6

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 537-550, 2023, DOI:10.32604/csse.2023.034230

    Abstract LIDAR point cloud-based 3D object detection aims to sense the surrounding environment by anchoring objects with the Bounding Box (BBox). However, under the three-dimensional space of autonomous driving scenes, the previous object detection methods, due to the pre-processing of the original LIDAR point cloud into voxels or pillars, lose the coordinate information of the original point cloud, slow detection speed, and gain inaccurate bounding box positioning. To address the issues above, this study proposes a new two-stage network structure to extract point cloud features directly by PointNet++, which effectively preserves the original point cloud coordinate information. To improve the detection… More >

  • Open Access

    ARTICLE

    Image Semantic Segmentation for Autonomous Driving Based on Improved U-Net

    Chuanlong Sun, Hong Zhao*, Liang Mu, Fuliang Xu, Laiwei Lu

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 787-801, 2023, DOI:10.32604/cmes.2023.025119

    Abstract Image semantic segmentation has become an essential part of autonomous driving. To further improve the generalization ability and the robustness of semantic segmentation algorithms, a lightweight algorithm network based on Squeeze-and-Excitation Attention Mechanism (SE) and Depthwise Separable Convolution (DSC) is designed. Meanwhile, Adam-GC, an Adam optimization algorithm based on Gradient Compression (GC), is proposed to improve the training speed, segmentation accuracy, generalization ability and stability of the algorithm network. To verify and compare the effectiveness of the algorithm network proposed in this paper, the trained network model is used for experimental verification and comparative test on the Cityscapes semantic segmentation… More >

Displaying 71-80 on page 8 of 128. Per Page