Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    An Empirical Study on the Effectiveness of Adversarial Examples in Malware Detection

    Younghoon Ban, Myeonghyun Kim, Haehyun Cho*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3535-3563, 2024, DOI:10.32604/cmes.2023.046658

    Abstract Antivirus vendors and the research community employ Machine Learning (ML) or Deep Learning (DL)-based static analysis techniques for efficient identification of new threats, given the continual emergence of novel malware variants. On the other hand, numerous researchers have reported that Adversarial Examples (AEs), generated by manipulating previously detected malware, can successfully evade ML/DL-based classifiers. Commercial antivirus systems, in particular, have been identified as vulnerable to such AEs. This paper firstly focuses on conducting black-box attacks to circumvent ML/DL-based malware classifiers. Our attack method utilizes seven different perturbations, including Overlay Append, Section Append, and Break Checksum, capitalizing on the ambiguities present… More >

  • Open Access

    ARTICLE

    Parental Educational Expectations, Academic Pressure, and Adolescent Mental Health: An Empirical Study Based on CEPS Survey Data

    Tao Xu1,*, Fangqiang Zuo1, Kai Zheng2,*

    International Journal of Mental Health Promotion, Vol.26, No.2, pp. 93-103, 2024, DOI:10.32604/ijmhp.2023.043226

    Abstract Background: This study aimed to investigate the relationship between parental educational expectations and adolescent mental health problems, with academic pressure as a moderating variable. Methods: This study was based on the baseline data of the China Education Panel Survey, which was collected within one school year during 2013–2014. It included 19,958 samples from seventh and ninth graders, who ranged from 11 to 18 years old. After removing missing values and conducting relevant data processing, the effective sample size for analysis was 16344. The OLS (Ordinary Least Squares) multiple linear regression analysis was used to examine the relationship between parental educational… More >

  • Open Access

    ARTICLE

    Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study

    Shahad Alzahrani1, Hatim Alsuwat2, Emad Alsuwat3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1635-1654, 2024, DOI:10.32604/cmes.2023.044718

    Abstract Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among variables. However, the reliability and integrity of learned Bayesian network models are highly dependent on the quality of incoming data streams. One of the primary challenges with Bayesian networks is their vulnerability to adversarial data poisoning attacks, wherein malicious data is injected into the training dataset to negatively influence the Bayesian network models and impair their performance. In this research paper, we propose an efficient framework for detecting data poisoning attacks against Bayesian network structure learning algorithms. Our framework utilizes latent variables to quantify… More >

  • Open Access

    ARTICLE

    Developing Transparent IDS for VANETs Using LIME and SHAP: An Empirical Study

    Fayaz Hassan1,*, Jianguo Yu1, Zafi Sherhan Syed2, Arif Hussain Magsi3, Nadeem Ahmed4

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3185-3208, 2023, DOI:10.32604/cmc.2023.044650

    Abstract Vehicular Ad-hoc Networks (VANETs) are mobile ad-hoc networks that use vehicles as nodes to create a wireless network. Whereas VANETs offer many advantages over traditional transportation networks, ensuring security in VANETs remains a significant challenge due to the potential for malicious attacks. This study addresses the critical issue of security in VANETs by introducing an intelligent Intrusion Detection System (IDS) that merges Machine Learning (ML)–based attack detection with Explainable AI (XAI) explanations. This study ML pipeline involves utilizing correlation-based feature selection followed by a Random Forest (RF) classifier that achieves a classification accuracy of 100% for the binary classification task… More >

  • Open Access

    ARTICLE

    Neurodevelopmental in Relation to Breastfeeding–Experiences among Hungarian Preterm Infants at 12 Months of Corrected Age: Empirical Study

    Anna Szabina Szele1,*, Beáta Erika Nagy2

    International Journal of Mental Health Promotion, Vol.24, No.5, pp. 699-709, 2022, DOI:10.32604/ijmhp.2022.021809

    Abstract Preterm and low birth weight infants are at higher risk of neurodevelopmental outcomes; breastfeeding offers several beneficial aspects for them. This study aimed to describe the average neurodevelopmental outcomes of preterm infants and examine the associations between neurodevelopment and breastfeeding among Hungarian preterm infants at 12 months of corrected age. 154 preterm infants with low birth weight (<2500 g) and their mothers were participated in this study. Bayley-III Screening Test (Bayley Scales of Infant and Toddler Development Screening Test, Third Edition) was administered to measure the cognitive, language and motor skills of infants; breastfeeding data was obtained through parental anamnesis. To… More >

  • Open Access

    ARTICLE

    Green Measurements for Software Product Based on Sustainability Dimensions

    Komeil Raisian1, Jamaiah Yahaya2,*, Aziz Deraman3

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 271-288, 2022, DOI:10.32604/csse.2022.020496

    Abstract Software is a central component in the modern world and vastly affects the environment’s sustainability. The demand for energy and resource requirements is rising when producing hardware and software units. Literature study reveals that many studies focused on green hardware; however, limited efforts were made in the greenness of software products. Green software products are necessary to solve the issues and problems related to the long-term use of software, especially from a sustainability perspective. Without a proper mechanism for measuring the greenness of a particular software product executed in a specific environment, the mentioned benefits will not be attained. Currently,… More >

  • Open Access

    ARTICLE

    The Relationship between Urbanization and Domestic Energy Consumption: An Empirical Study of Shandong Province, China

    Doudou Liu1,*, Liang Qiao2,3, Feng Zhang4, Xueliang Yuan2

    Energy Engineering, Vol.118, No.5, pp. 1395-1409, 2021, DOI:10.32604/EE.2021.014697

    Abstract The rapid development of urbanization has led to a rapid increase in total energy consumption. The proportion of domestic energy consumption to total energy consumption has gradually increased and has become the major driving force for energy consumption. With the pressure from urbanization and domestic energy consumption, it is necessary to study the impact of urbanization on domestic energy consumption of the regional level and to explore the function paths of these two factors. The findings are helpful to realize sustainable development based on the actual situation analysis, horizontal survey data and statistical yearbook panel data. The current situation and… More >

  • Open Access

    ARTICLE

    Ordering Method and Empirical Study on Multiple Factor Sensitivity of Group Social Attitudes Based on Entropy Theory

    Qin He1, Shuang Dong1,*, Yaxin Cheng1

    Computer Systems Science and Engineering, Vol.34, No.4, pp. 225-230, 2019, DOI:10.32604/csse.2019.34.225

    Abstract When studying the various factors affecting a group’s social attitudes, minor changes in a factor will easily cause changes to other factors due to their association and relevance to each other; therefore, such a factor is more sensitive, although there is a difference between sensitivity and importance. In order to comprehensively learn about the influence of multiple factors, explorations based on entropy theory have been conducted to determine the sensitivity of each factor, to specify the difference between the frequency and sensitivity priority of entropy theory, and to provide a method, a way of thinking, and a detailed basis for… More >

Displaying 1-10 on page 1 of 8. Per Page