Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (143)
  • Open Access

    ARTICLE

    Active Learning Strategies for Textual Dataset-Automatic Labelling

    Sher Muhammad Daudpota1, Saif Hassan1, Yazeed Alkhurayyif2,*, Abdullah Saleh Alqahtani3,4, Muhammad Haris Aziz5

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1409-1422, 2023, DOI:10.32604/cmc.2023.034157 - 30 August 2023

    Abstract The Internet revolution has resulted in abundant data from various sources, including social media, traditional media, etcetera. Although the availability of data is no longer an issue, data labelling for exploiting it in supervised machine learning is still an expensive process and involves tedious human efforts. The overall purpose of this study is to propose a strategy to automatically label the unlabeled textual data with the support of active learning in combination with deep learning. More specifically, this study assesses the performance of different active learning strategies in automatic labelling of the textual dataset at… More >

  • Open Access

    ARTICLE

    MBB-IoT: Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective

    Yi Qing1, Xiangyu Liu2, Yanhui Du2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2095-2119, 2023, DOI:10.32604/cmc.2023.039980 - 30 August 2023

    Abstract Distributed Denial of Service (DDoS) attacks have always been a major concern in the security field. With the release of malware source codes such as BASHLITE and Mirai, Internet of Things (IoT) devices have become the new source of DDoS attacks against many Internet applications. Although there are many datasets in the field of IoT intrusion detection, such as Bot-IoT, Constrained Application Protocol–Denial of Service (CoAP-DoS), and LATAM-DDoS-IoT (some of the names of DDoS datasets), which mainly focus on DDoS attacks, the datasets describing new IoT DDoS attack scenarios are extremely rare, and only N-BaIoT… More >

  • Open Access

    ARTICLE

    A Survey on Deep Learning-Based 2D Human Pose Estimation Models

    Sani Salisu1,2, A. S. A. Mohamed1,*, M. H. Jaafar3, Ainun S. B. Pauzi1, Hussain A. Younis1,4

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2385-2400, 2023, DOI:10.32604/cmc.2023.035904 - 30 August 2023

    Abstract In this article, a comprehensive survey of deep learning-based (DL-based) human pose estimation (HPE) that can help researchers in the domain of computer vision is presented. HPE is among the fastest-growing research domains of computer vision and is used in solving several problems for human endeavours. After the detailed introduction, three different human body modes followed by the main stages of HPE and two pipelines of two-dimensional (2D) HPE are presented. The details of the four components of HPE are also presented. The keypoints output format of two popular 2D HPE datasets and the most More >

  • Open Access

    ARTICLE

    Towards Generating a Practical SUNBURST Attack Dataset for Network Attack Detection

    Ehab AlMasri1, Mouhammd Alkasassbeh1, Amjad Aldweesh2,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2643-2669, 2023, DOI:10.32604/csse.2023.040626 - 28 July 2023

    Abstract Supply chain attacks, exemplified by the SUNBURST attack utilizing SolarWinds Orion updates, pose a growing cybersecurity threat to entities worldwide. However, the need for suitable datasets for detecting and anticipating SUNBURST attacks is a significant challenge. We present a novel dataset collected using a unique network traffic data collection methodology to address this gap. Our study aims to enhance intrusion detection and prevention systems by understanding SUNBURST attack features. We construct realistic attack scenarios by combining relevant data and attack indicators. The dataset is validated with the J48 machine learning algorithm, achieving an average F-Measure More >

  • Open Access

    ARTICLE

    Towards Intelligent Detection and Classification of Rice Plant Diseases Based on Leaf Image Dataset

    Fawad Ali Shah1, Habib Akbar1, Abid Ali2,3, Parveen Amna4, Maha Aljohani5, Eman A. Aldhahri6, Harun Jamil7,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1385-1413, 2023, DOI:10.32604/csse.2023.036144 - 28 July 2023

    Abstract The detection of rice leaf disease is significant because, as an agricultural and rice exporter country, Pakistan needs to advance in production and lower the risk of diseases. In this rapid globalization era, information technology has increased. A sensing system is mandatory to detect rice diseases using Artificial Intelligence (AI). It is being adopted in all medical and plant sciences fields to access and measure the accuracy of results and detection while lowering the risk of diseases. Deep Neural Network (DNN) is a novel technique that will help detect disease present on a rice leave… More >

  • Open Access

    ARTICLE

    New Denial of Service Attacks Detection Approach Using Hybridized Deep Neural Networks and Balanced Datasets

    Ouail Mjahed1,*, Salah El Hadaj1, El Mahdi El Guarmah1,2, Soukaina Mjahed1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 757-775, 2023, DOI:10.32604/csse.2023.039111 - 26 May 2023

    Abstract Denial of Service (DoS/DDoS) intrusions are damaging cyber-attacks, and their identification is of great interest to the Intrusion Detection System (IDS). Existing IDS are mainly based on Machine Learning (ML) methods including Deep Neural Networks (DNN), but which are rarely hybridized with other techniques. The intrusion data used are generally imbalanced and contain multiple features. Thus, the proposed approach aims to use a DNN-based method to detect DoS/DDoS attacks using CICIDS2017, CSE-CICIDS2018 and CICDDoS 2019 datasets, according to the following key points. a) Three imbalanced CICIDS2017-2018-2019 datasets, including Benign and DoS/DDoS attack classes, are used.… More >

  • Open Access

    ARTICLE

    A New Hybrid Feature Selection Sequence for Predicting Breast Cancer Survivability Using Clinical Datasets

    E. Jenifer Sweetlin*, S. Saudia

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 343-367, 2023, DOI:10.32604/iasc.2023.036742 - 29 April 2023

    Abstract This paper proposes a hybrid feature selection sequence complemented with filter and wrapper concepts to improve the accuracy of Machine Learning (ML) based supervised classifiers for classifying the survivability of breast cancer patients into classes, living and deceased using METABRIC and Surveillance, Epidemiology and End Results (SEER) datasets. The ML-based classifiers used in the analysis are: Multiple Logistic Regression, K-Nearest Neighbors, Decision Tree, Random Forest, Support Vector Machine and Multilayer Perceptron. The workflow of the proposed ML algorithm sequence comprises the following stages: data cleaning, data balancing, feature selection via a filter and wrapper sequence, More >

  • Open Access

    ARTICLE

    Multi-Attack Intrusion Detection System for Software-Defined Internet of Things Network

    Tarcízio Ferrão1,*, Franklin Manene2, Adeyemi Abel Ajibesin3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4985-5007, 2023, DOI:10.32604/cmc.2023.038276 - 29 April 2023

    Abstract Currently, the Internet of Things (IoT) is revolutionizing communication technology by facilitating the sharing of information between different physical devices connected to a network. To improve control, customization, flexibility, and reduce network maintenance costs, a new Software-Defined Network (SDN) technology must be used in this infrastructure. Despite the various advantages of combining SDN and IoT, this environment is more vulnerable to various attacks due to the centralization of control. Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service (DDoS) attacks, but they often lack mechanisms to mitigate their severity. This paper proposes… More >

  • Open Access

    ARTICLE

    RRCNN: Request Response-Based Convolutional Neural Network for ICS Network Traffic Anomaly Detection

    Yan Du1,2, Shibin Zhang1,2,*, Guogen Wan1,2, Daohua Zhou3, Jiazhong Lu1,2, Yuanyuan Huang1,2, Xiaoman Cheng4, Yi Zhang4, Peilin He5

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5743-5759, 2023, DOI:10.32604/cmc.2023.035919 - 29 April 2023

    Abstract Nowadays, industrial control system (ICS) has begun to integrate with the Internet. While the Internet has brought convenience to ICS, it has also brought severe security concerns. Traditional ICS network traffic anomaly detection methods rely on statistical features manually extracted using the experience of network security experts. They are not aimed at the original network data, nor can they capture the potential characteristics of network packets. Therefore, the following improvements were made in this study: (1) A dataset that can be used to evaluate anomaly detection algorithms is produced, which provides raw network data. (2)… More >

  • Open Access

    ARTICLE

    Data Augmentation Using Contour Image for Convolutional Neural Network

    Seung-Yeon Hwang1, Jeong-Joon Kim2,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4669-4680, 2023, DOI:10.32604/cmc.2023.031129 - 29 April 2023

    Abstract With the development of artificial intelligence-related technologies such as deep learning, various organizations, including the government, are making various efforts to generate and manage big data for use in artificial intelligence. However, it is difficult to acquire big data due to various social problems and restrictions such as personal information leakage. There are many problems in introducing technology in fields that do not have enough training data necessary to apply deep learning technology. Therefore, this study proposes a mixed contour data augmentation technique, which is a data augmentation technique using contour images, to solve a… More >

Displaying 31-40 on page 4 of 143. Per Page