Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Fine-Grained Point Cloud Intensity Correction Modeling Method Based on Mobile Laser Scanning

    Xu Liu1, Qiujie Li1,*, Youlin Xu1, Musaed Alhussein2, Khursheed Aurangzeb2,*, Fa Zhu1

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 575-593, 2025, DOI:10.32604/cmc.2025.062445 - 26 March 2025

    Abstract The correction of Light Detection and Ranging (LiDAR) intensity data is of great significance for enhancing its application value. However, traditional intensity correction methods based on Terrestrial Laser Scanning (TLS) technology rely on manual site setup to collect intensity training data at different distances and incidence angles, which is noisy and limited in sample quantity, restricting the improvement of model accuracy. To overcome this limitation, this study proposes a fine-grained intensity correction modeling method based on Mobile Laser Scanning (MLS) technology. The method utilizes the continuous scanning characteristics of MLS technology to obtain dense point… More >

  • Open Access

    ARTICLE

    LEGF-DST: LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection

    Xin Tong1, Jingya Wang1,*, Ying Yang2, Tian Peng3, Hanming Zhai1, Guangming Ling4

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1901-1924, 2025, DOI:10.32604/cmc.2024.059018 - 17 February 2025

    Abstract With the widespread use of SMS (Short Message Service), the proliferation of malicious SMS has emerged as a pressing societal issue. While deep learning-based text classifiers offer promise, they often exhibit suboptimal performance in fine-grained detection tasks, primarily due to imbalanced datasets and insufficient model representation capabilities. To address this challenge, this paper proposes an LLMs-enhanced graph fusion dual-stream Transformer model for fine-grained Chinese malicious SMS detection. During the data processing stage, Large Language Models (LLMs) are employed for data augmentation, mitigating dataset imbalance. In the data input stage, both word-level and character-level features are More >

  • Open Access

    ARTICLE

    A Fine-Grained Defect Prediction Method Based on Drift-Immune Graph Neural Networks

    Fengyu Yang1,2,*, Fa Zhong2, Xiaohui Wei1, Guangdong Zeng2

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3563-3590, 2025, DOI:10.32604/cmc.2024.057697 - 17 February 2025

    Abstract The primary goal of software defect prediction (SDP) is to pinpoint code modules that are likely to contain defects, thereby enabling software quality assurance teams to strategically allocate their resources and manpower. Within-project defect prediction (WPDP) is a widely used method in SDP. Despite various improvements, current methods still face challenges such as coarse-grained prediction and ineffective handling of data drift due to differences in project distribution. To address these issues, we propose a fine-grained SDP method called DIDP (drift-immune defect prediction), based on drift-immune graph neural networks (DI-GNN). DIDP converts source code into graph… More >

  • Open Access

    ARTICLE

    Text-Image Feature Fine-Grained Learning for Joint Multimodal Aspect-Based Sentiment Analysis

    Tianzhi Zhang1, Gang Zhou1,*, Shuang Zhang2, Shunhang Li1, Yepeng Sun1, Qiankun Pi1, Shuo Liu3

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 279-305, 2025, DOI:10.32604/cmc.2024.055943 - 03 January 2025

    Abstract Joint Multimodal Aspect-based Sentiment Analysis (JMASA) is a significant task in the research of multimodal fine-grained sentiment analysis, which combines two subtasks: Multimodal Aspect Term Extraction (MATE) and Multimodal Aspect-oriented Sentiment Classification (MASC). Currently, most existing models for JMASA only perform text and image feature encoding from a basic level, but often neglect the in-depth analysis of unimodal intrinsic features, which may lead to the low accuracy of aspect term extraction and the poor ability of sentiment prediction due to the insufficient learning of intra-modal features. Given this problem, we propose a Text-Image Feature Fine-grained… More >

  • Open Access

    ARTICLE

    Integrating Ontology-Based Approaches with Deep Learning Models for Fine-Grained Sentiment Analysis

    Longgang Zhao1, Seok-Won Lee2,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1855-1877, 2024, DOI:10.32604/cmc.2024.056215 - 15 October 2024

    Abstract Although sentiment analysis is pivotal to understanding user preferences, existing models face significant challenges in handling context-dependent sentiments, sarcasm, and nuanced emotions. This study addresses these challenges by integrating ontology-based methods with deep learning models, thereby enhancing sentiment analysis accuracy in complex domains such as film reviews and restaurant feedback. The framework comprises explicit topic recognition, followed by implicit topic identification to mitigate topic interference in subsequent sentiment analysis. In the context of sentiment analysis, we develop an expanded sentiment lexicon based on domain-specific corpora by leveraging techniques such as word-frequency analysis and word embedding. More >

  • Open Access

    ARTICLE

    Research on Fine-Grained Recognition Method for Sensitive Information in Social Networks Based on CLIP

    Menghan Zhang1,2, Fangfang Shan1,2,*, Mengyao Liu1,2, Zhenyu Wang1,2

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1565-1580, 2024, DOI:10.32604/cmc.2024.056008 - 15 October 2024

    Abstract With the emergence and development of social networks, people can stay in touch with friends, family, and colleagues more quickly and conveniently, regardless of their location. This ubiquitous digital internet environment has also led to large-scale disclosure of personal privacy. Due to the complexity and subtlety of sensitive information, traditional sensitive information identification technologies cannot thoroughly address the characteristics of each piece of data, thus weakening the deep connections between text and images. In this context, this paper adopts the CLIP model as a modality discriminator. By using comparative learning between sensitive image descriptions and… More >

  • Open Access

    ARTICLE

    Attention Guided Food Recognition via Multi-Stage Local Feature Fusion

    Gonghui Deng, Dunzhi Wu, Weizhen Chen*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1985-2003, 2024, DOI:10.32604/cmc.2024.052174 - 15 August 2024

    Abstract The task of food image recognition, a nuanced subset of fine-grained image recognition, grapples with substantial intra-class variation and minimal inter-class differences. These challenges are compounded by the irregular and multi-scale nature of food images. Addressing these complexities, our study introduces an advanced model that leverages multiple attention mechanisms and multi-stage local fusion, grounded in the ConvNeXt architecture. Our model employs hybrid attention (HA) mechanisms to pinpoint critical discriminative regions within images, substantially mitigating the influence of background noise. Furthermore, it introduces a multi-stage local fusion (MSLF) module, fostering long-distance dependencies between feature maps at… More >

  • Open Access

    ARTICLE

    FFRA: A Fine-Grained Function-Level Framework to Reduce the Attack Surface

    Xingxing Zhang1, Liang Liu1,*, Yu Fan1, Qian Zhou2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 969-987, 2024, DOI:10.32604/csse.2024.046615 - 17 July 2024

    Abstract System calls are essential interfaces that enable applications to access and utilize the operating system’s services and resources. Attackers frequently exploit application’s vulnerabilities and misuse system calls to execute malicious code, aiming to elevate privileges and so on. Consequently, restricting the misuse of system calls becomes a crucial measure in ensuring system security. It is an effective method known as reducing the attack surface. Existing attack surface reduction techniques construct a global whitelist of system calls for the entire lifetime of the application, which is coarse-grained. In this paper, we propose a Fine-grained Function-level framework… More >

  • Open Access

    ARTICLE

    Fine-Grained Ship Recognition Based on Visible and Near-Infrared Multimodal Remote Sensing Images: Dataset, Methodology and Evaluation

    Shiwen Song, Rui Zhang, Min Hu*, Feiyao Huang

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5243-5271, 2024, DOI:10.32604/cmc.2024.050879 - 20 June 2024

    Abstract Fine-grained recognition of ships based on remote sensing images is crucial to safeguarding maritime rights and interests and maintaining national security. Currently, with the emergence of massive high-resolution multi-modality images, the use of multi-modality images for fine-grained recognition has become a promising technology. Fine-grained recognition of multi-modality images imposes higher requirements on the dataset samples. The key to the problem is how to extract and fuse the complementary features of multi-modality images to obtain more discriminative fusion features. The attention mechanism helps the model to pinpoint the key information in the image, resulting in a… More >

  • Open Access

    ARTICLE

    A Blockchain and CP-ABE Based Access Control Scheme with Fine-Grained Revocation of Attributes in Cloud Health

    Ye Lu1,*, Tao Feng1, Chunyan Liu2, Wenbo Zhang3

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2787-2811, 2024, DOI:10.32604/cmc.2023.046106 - 27 February 2024

    Abstract The Access control scheme is an effective method to protect user data privacy. The access control scheme based on blockchain and ciphertext policy attribute encryption (CP–ABE) can solve the problems of single—point of failure and lack of trust in the centralized system. However, it also brings new problems to the health information in the cloud storage environment, such as attribute leakage, low consensus efficiency, complex permission updates, and so on. This paper proposes an access control scheme with fine-grained attribute revocation, keyword search, and traceability of the attribute private key distribution process. Blockchain technology tracks… More >

Displaying 1-10 on page 1 of 31. Per Page