Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Neighbor Dual-Consistency Constrained Attribute-Graph Clustering#

    Tian Tian1,2, Boyue Wang1,2, Xiaxia He1,2,*, Wentong Wang3, Meng Wang1

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4885-4898, 2025, DOI:10.32604/cmc.2025.067795 - 23 October 2025

    Abstract Attribute-graph clustering aims to divide the graph nodes into distinct clusters in an unsupervised manner, which usually encodes the node attribute feature and the corresponding graph structure into a latent feature space. However, traditional attribute-graph clustering methods often neglect the effect of neighbor information on clustering, leading to suboptimal clustering results as they fail to fully leverage the rich contextual information provided by neighboring nodes, which is crucial for capturing the intrinsic relationships between nodes and improving clustering performance. In this paper, we propose a novel Neighbor Dual-Consistency Constrained Attribute-Graph Clustering that leverages information from… More >

  • Open Access

    ARTICLE

    The Identification of Influential Users Based on Semi-Supervised Contrastive Learning

    Jialong Zhang1, Meijuan Yin2,*, Yang Pei2, Fenlin Liu2, Chenyu Wang2

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2095-2115, 2025, DOI:10.32604/cmc.2025.065679 - 29 August 2025

    Abstract Identifying influential users in social networks is of great significance in areas such as public opinion monitoring and commercial promotion. Existing identification methods based on Graph Neural Networks (GNNs) often lead to yield inaccurate features of influential users due to neighborhood aggregation, and require a large substantial amount of labeled data for training, making them difficult and challenging to apply in practice. To address this issue, we propose a semi-supervised contrastive learning method for identifying influential users. First, the proposed method constructs positive and negative samples for contrastive learning based on multiple node centrality metrics… More >

  • Open Access

    ARTICLE

    Event-Aware Sarcasm Detection in Chinese Social Media Using Multi-Head Attention and Contrastive Learning

    Kexuan Niu, Xiameng Si*, Xiaojie Qi, Haiyan Kang

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2051-2070, 2025, DOI:10.32604/cmc.2025.065377 - 29 August 2025

    Abstract Sarcasm detection is a complex and challenging task, particularly in the context of Chinese social media, where it exhibits strong contextual dependencies and cultural specificity. To address the limitations of existing methods in capturing the implicit semantics and contextual associations in sarcastic expressions, this paper proposes an event-aware model for Chinese sarcasm detection, leveraging a multi-head attention (MHA) mechanism and contrastive learning (CL) strategies. The proposed model employs a dual-path Bidirectional Encoder Representations from Transformers (BERT) encoder to process comment text and event context separately and integrates an MHA mechanism to facilitate deep interactions between More >

  • Open Access

    ARTICLE

    Efficient Method for Trademark Image Retrieval: Leveraging Siamese and Triplet Networks with Examination-Informed Loss Adjustment

    Thanh Bui-Minh1, Nguyen Long Giang1, Luan Thanh Le2,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1203-1226, 2025, DOI:10.32604/cmc.2025.064403 - 09 June 2025

    Abstract Image-based similar trademark retrieval is a time-consuming and labor-intensive task in the trademark examination process. This paper aims to support trademark examiners by training Deep Convolutional Neural Network (DCNN) models for effective Trademark Image Retrieval (TIR). To achieve this goal, we first develop a novel labeling method that automatically generates hundreds of thousands of labeled similar and dissimilar trademark image pairs using accompanying data fields such as citation lists, Vienna classification (VC) codes, and trademark ownership information. This approach eliminates the need for manual labeling and provides a large-scale dataset suitable for training deep learning… More >

  • Open Access

    ARTICLE

    Implicit Feature Contrastive Learning for Few-Shot Object Detection

    Gang Li1,#, Zheng Zhou1,#, Yang Zhang2,*, Chuanyun Xu2, Zihan Ruan1, Pengfei Lv1, Ru Wang1, Xinyu Fan1, Wei Tan1

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1615-1632, 2025, DOI:10.32604/cmc.2025.063109 - 09 June 2025

    Abstract Although conventional object detection methods achieve high accuracy through extensively annotated datasets, acquiring such large-scale labeled data remains challenging and cost-prohibitive in numerous real-world applications. Few-shot object detection presents a new research idea that aims to localize and classify objects in images using only limited annotated examples. However, the inherent challenge in few-shot object detection lies in the insufficient sample diversity to fully characterize the sample feature distribution, which consequently impacts model performance. Inspired by contrastive learning principles, we propose an Implicit Feature Contrastive Learning (IFCL) module to address this limitation and augment feature diversity More >

  • Open Access

    ARTICLE

    A Category-Agnostic Hybrid Contrastive Learning Method for Few-Shot Point Cloud Object Detection

    Xuejing Li*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1667-1681, 2025, DOI:10.32604/cmc.2025.062161 - 16 April 2025

    Abstract Few-shot point cloud 3D object detection (FS3D) aims to identify and locate objects of novel classes within point clouds using knowledge acquired from annotated base classes and a minimal number of samples from the novel classes. Due to imbalanced training data, existing FS3D methods based on fully supervised learning can lead to overfitting toward base classes, which impairs the network’s ability to generalize knowledge learned from base classes to novel classes and also prevents the network from extracting distinctive foreground and background representations for novel class objects. To address these issues, this thesis proposes a… More >

  • Open Access

    ARTICLE

    Robust Detection for Fisheye Camera Based on Contrastive Learning

    Junzhe Zhang1, Lei Tang1,*, Xin Zhou2

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2643-2658, 2025, DOI:10.32604/cmc.2025.061690 - 16 April 2025

    Abstract Fisheye cameras offer a significantly larger field of view compared to conventional cameras, making them valuable tools in the field of computer vision. However, their unique optical characteristics often lead to image distortions, which pose challenges for object detection tasks. To address this issue, we propose Yolo-CaSKA (Yolo with Contrastive Learning and Selective Kernel Attention), a novel training method that enhances object detection on fisheye camera images. The standard image and the corresponding distorted fisheye image pairs are used as positive samples, and the rest of the image pairs are used as negative samples, which More >

  • Open Access

    ARTICLE

    FHGraph: A Novel Framework for Fake News Detection Using Graph Contrastive Learning and LLM

    Yuanqing Li1, Mengyao Dai1, Sanfeng Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 309-333, 2025, DOI:10.32604/cmc.2025.060455 - 26 March 2025

    Abstract Social media has significantly accelerated the rapid dissemination of information, but it also boosts propagation of fake news, posing serious challenges to public awareness and social stability. In real-world contexts, the volume of trustable information far exceeds that of rumors, resulting in a class imbalance that leads models to prioritize the majority class during training. This focus diminishes the model’s ability to recognize minority class samples. Furthermore, models may experience overfitting when encountering these minority samples, further compromising their generalization capabilities. Unlike node-level classification tasks, fake news detection in social networks operates on graph-level samples,… More >

  • Open Access

    ARTICLE

    Graph Similarity Learning Based on Learnable Augmentation and Multi-Level Contrastive Learning

    Jian Feng*, Yifan Guo, Cailing Du

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5135-5151, 2025, DOI:10.32604/cmc.2025.059610 - 06 March 2025

    Abstract Graph similarity learning aims to calculate the similarity between pairs of graphs. Existing unsupervised graph similarity learning methods based on contrastive learning encounter challenges related to random graph augmentation strategies, which can harm the semantic and structural information of graphs and overlook the rich structural information present in subgraphs. To address these issues, we propose a graph similarity learning model based on learnable augmentation and multi-level contrastive learning. First, to tackle the problem of random augmentation disrupting the semantics and structure of the graph, we design a learnable augmentation method to selectively choose nodes and… More >

  • Open Access

    ARTICLE

    Federated Learning and Optimization for Few-Shot Image Classification

    Yi Zuo, Zhenping Chen*, Jing Feng, Yunhao Fan

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4649-4667, 2025, DOI:10.32604/cmc.2025.059472 - 06 March 2025

    Abstract Image classification is crucial for various applications, including digital construction, smart manufacturing, and medical imaging. Focusing on the inadequate model generalization and data privacy concerns in few-shot image classification, in this paper, we propose a federated learning approach that incorporates privacy-preserving techniques. First, we utilize contrastive learning to train on local few-shot image data and apply various data augmentation methods to expand the sample size, thereby enhancing the model’s generalization capabilities in few-shot contexts. Second, we introduce local differential privacy techniques and weight pruning methods to safeguard model parameters, perturbing the transmitted parameters to ensure More >

Displaying 1-10 on page 1 of 24. Per Page