Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,764)
  • Open Access

    ARTICLE

    An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment

    Tarak Dhaouadi1, Hichem Mrabet1,2,*, Adeeb Alhomoud3, Abderrazak Jemai1,4

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4535-4554, 2025, DOI:10.32604/cmc.2025.060935 - 06 March 2025

    Abstract The increasing adoption of Industrial Internet of Things (IIoT) systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems (IDS) to be effective. However, existing datasets for IDS training often lack relevance to modern IIoT environments, limiting their applicability for research and development. To address the latter gap, this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems. As a consequence, that can be used by an IDS to detect imminent threats. Likewise, HiTar-2024 was generated using the AREZZO simulator, which replicates realistic smart manufacturing scenarios.… More >

  • Open Access

    ARTICLE

    Diff-IDS: A Network Intrusion Detection Model Based on Diffusion Model for Imbalanced Data Samples

    Yue Yang1,2, Xiangyan Tang2,3,*, Zhaowu Liu2,3,*, Jieren Cheng2,3, Haozhe Fang3, Cunyi Zhang3

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4389-4408, 2025, DOI:10.32604/cmc.2025.060357 - 06 March 2025

    Abstract With the rapid development of Internet of Things technology, the sharp increase in network devices and their inherent security vulnerabilities present a stark contrast, bringing unprecedented challenges to the field of network security, especially in identifying malicious attacks. However, due to the uneven distribution of network traffic data, particularly the imbalance between attack traffic and normal traffic, as well as the imbalance between minority class attacks and majority class attacks, traditional machine learning detection algorithms have significant limitations when dealing with sparse network traffic data. To effectively tackle this challenge, we have designed a lightweight… More >

  • Open Access

    ARTICLE

    MARCS: A Mobile Crowdsensing Framework Based on Data Shapley Value Enabled Multi-Agent Deep Reinforcement Learning

    Yiqin Wang1, Yufeng Wang1,*, Jianhua Ma2, Qun Jin3

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4431-4449, 2025, DOI:10.32604/cmc.2025.059880 - 06 March 2025

    Abstract Opportunistic mobile crowdsensing (MCS) non-intrusively exploits human mobility trajectories, and the participants’ smart devices as sensors have become promising paradigms for various urban data acquisition tasks. However, in practice, opportunistic MCS has several challenges from both the perspectives of MCS participants and the data platform. On the one hand, participants face uncertainties in conducting MCS tasks, including their mobility and implicit interactions among participants, and participants’ economic returns given by the MCS data platform are determined by not only their own actions but also other participants’ strategic actions. On the other hand, the platform can… More >

  • Open Access

    ARTICLE

    MMH-FE: A Multi-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption

    Hao Li1,#, Kuan Shao1,#, Xin Wang2, Mufeng Wang3, Zhenyong Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5387-5405, 2025, DOI:10.32604/cmc.2025.059718 - 06 March 2025

    Abstract Due to the development of cloud computing and machine learning, users can upload their data to the cloud for machine learning model training. However, dishonest clouds may infer user data, resulting in user data leakage. Previous schemes have achieved secure outsourced computing, but they suffer from low computational accuracy, difficult-to-handle heterogeneous distribution of data from multiple sources, and high computational cost, which result in extremely poor user experience and expensive cloud computing costs. To address the above problems, we propose a multi-precision, multi-sourced, and multi-key outsourcing neural network training scheme. Firstly, we design a multi-precision More >

  • Open Access

    ARTICLE

    Deep Convolution Neural Networks for Image-Based Android Malware Classification

    Amel Ksibi1,*, Mohammed Zakariah2, Latifah Almuqren1, Ala Saleh Alluhaidan1

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4093-4116, 2025, DOI:10.32604/cmc.2025.059615 - 06 March 2025

    Abstract The analysis of Android malware shows that this threat is constantly increasing and is a real threat to mobile devices since traditional approaches, such as signature-based detection, are no longer effective due to the continuously advancing level of sophistication. To resolve this problem, efficient and flexible malware detection tools are needed. This work examines the possibility of employing deep CNNs to detect Android malware by transforming network traffic into image data representations. Moreover, the dataset used in this study is the CIC-AndMal2017, which contains 20,000 instances of network traffic across five distinct malware categories: a.… More >

  • Open Access

    ARTICLE

    Federated Learning and Optimization for Few-Shot Image Classification

    Yi Zuo, Zhenping Chen*, Jing Feng, Yunhao Fan

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4649-4667, 2025, DOI:10.32604/cmc.2025.059472 - 06 March 2025

    Abstract Image classification is crucial for various applications, including digital construction, smart manufacturing, and medical imaging. Focusing on the inadequate model generalization and data privacy concerns in few-shot image classification, in this paper, we propose a federated learning approach that incorporates privacy-preserving techniques. First, we utilize contrastive learning to train on local few-shot image data and apply various data augmentation methods to expand the sample size, thereby enhancing the model’s generalization capabilities in few-shot contexts. Second, we introduce local differential privacy techniques and weight pruning methods to safeguard model parameters, perturbing the transmitted parameters to ensure More >

  • Open Access

    REVIEW

    A Review of Joint Extraction Techniques for Relational Triples Based on NYT and WebNLG Datasets

    Chenglong Mi1, Huaibin Qin1,*, Quan Qi1, Pengxiang Zuo2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3773-3796, 2025, DOI:10.32604/cmc.2024.059455 - 06 March 2025

    Abstract In recent years, with the rapid development of deep learning technology, relational triplet extraction techniques have also achieved groundbreaking progress. Traditional pipeline models have certain limitations due to error propagation. To overcome the limitations of traditional pipeline models, recent research has focused on jointly modeling the two key subtasks-named entity recognition and relation extraction-within a unified framework. To support future research, this paper provides a comprehensive review of recently published studies in the field of relational triplet extraction. The review examines commonly used public datasets for relational triplet extraction techniques and systematically reviews current mainstream… More >

  • Open Access

    ARTICLE

    Modified Neural Network Used for Host Utilization Predication in Cloud Computing Environment

    Arif Ullah1, Siti Fatimah Abdul Razak2,*, Sumendra Yogarayan2, Md Shohel Sayeed2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5185-5204, 2025, DOI:10.32604/cmc.2025.059355 - 06 March 2025

    Abstract Networking, storage, and hardware are just a few of the virtual computing resources that the infrastructure service model offers, depending on what the client needs. One essential aspect of cloud computing that improves resource allocation techniques is host load prediction. This difficulty means that hardware resource allocation in cloud computing still results in hosting initialization issues, which add several minutes to response times. To solve this issue and accurately predict cloud capacity, cloud data centers use prediction algorithms. This permits dynamic cloud scalability while maintaining superior service quality. For host prediction, we therefore present a… More >

  • Open Access

    ARTICLE

    kProtoClust: Towards Adaptive k-Prototype Clustering without Known k

    Yuan Ping1,2,*, Huina Li1, Chun Guo3, Bin Hao4

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4949-4976, 2025, DOI:10.32604/cmc.2025.057693 - 06 March 2025

    Abstract Towards optimal k-prototype discovery, k-means-like algorithms give us inspirations of central samples collection, yet the unstable seed samples selection, the hypothesis of a circle-like pattern, and the unknown K are still challenges, particularly for non-predetermined data patterns. We propose an adaptive k-prototype clustering method (kProtoClust) which launches cluster exploration with a sketchy division of K clusters and finds evidence for splitting and merging. On behalf of a group of data samples, support vectors and outliers from the perspective of support vector data description are not the appropriate candidates for prototypes, while inner samples become the first candidates for… More >

  • Open Access

    ARTICLE

    Smart Grid Security Framework for Data Transmissions with Adaptive Practices Using Machine Learning Algorithm

    Shitharth Selvarajan1,2,3,*, Hariprasath Manoharan4, Taher Al-Shehari5, Hussain Alsalman6, Taha Alfakih7

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4339-4369, 2025, DOI:10.32604/cmc.2025.056100 - 06 March 2025

    Abstract This research presents an analysis of smart grid units to enhance connected units’ security during data transmissions. The major advantage of the proposed method is that the system model encompasses multiple aspects such as network flow monitoring, data expansion, control association, throughput, and losses. In addition, all the above-mentioned aspects are carried out with neural networks and adaptive optimizations to enhance the operation of smart grid networks. Moreover, the quantitative analysis of the optimization algorithm is discussed concerning two case studies, thereby achieving early convergence at reduced complexities. The suggested method ensures that each communication More >

Displaying 41-50 on page 5 of 1764. Per Page