Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (368)
  • Open Access

    ARTICLE

    A Framework Based on the DAO and NFT in Blockchain for Electronic Document Sharing

    Lin Chen1, Jiaming Zhu1, Yuting Xu1, Huanqin Zheng1, Shen Su1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2373-2395, 2024, DOI:10.32604/cmes.2024.049996

    Abstract In the information age, electronic documents (e-documents) have become a popular alternative to paper documents due to their lower costs, higher dissemination rates, and ease of knowledge sharing. However, digital copyright infringements occur frequently due to the ease of copying, which not only infringes on the rights of creators but also weakens their creative enthusiasm. Therefore, it is crucial to establish an e-document sharing system that enforces copyright protection. However, the existing centralized system has outstanding vulnerabilities, and the plagiarism detection algorithm used cannot fully detect the context, semantics, style, and other factors of the… More >

  • Open Access

    ARTICLE

    A Novel Graph Structure Learning Based Semi-Supervised Framework for Anomaly Identification in Fluctuating IoT Environment

    Weijian Song1,, Xi Li1,, Peng Chen1,*, Juan Chen1, Jianhua Ren2, Yunni Xia3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 3001-3016, 2024, DOI:10.32604/cmes.2024.048563

    Abstract With the rapid development of Internet of Things (IoT) technology, IoT systems have been widely applied in healthcare, transportation, home, and other fields. However, with the continuous expansion of the scale and increasing complexity of IoT systems, the stability and security issues of IoT systems have become increasingly prominent. Thus, it is crucial to detect anomalies in the collected IoT time series from various sensors. Recently, deep learning models have been leveraged for IoT anomaly detection. However, owing to the challenges associated with data labeling, most IoT anomaly detection methods resort to unsupervised learning techniques.… More >

  • Open Access

    ARTICLE

    A Federated Learning Framework with Blockchain-Based Auditable Participant Selection

    Huang Zeng, Mingtian Zhang, Tengfei Liu, Anjia Yang*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5125-5142, 2024, DOI:10.32604/cmc.2024.052846

    Abstract Federated learning is an important distributed model training technique in Internet of Things (IoT), in which participant selection is a key component that plays a role in improving training efficiency and model accuracy. This module enables a central server to select a subset of participants to perform model training based on data and device information. By doing so, selected participants are rewarded and actively perform model training, while participants that are detrimental to training efficiency and model accuracy are excluded. However, in practice, participants may suspect that the central server may have miscalculated and thus… More >

  • Open Access

    ARTICLE

    SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm

    Jiahui Liu1,2, Lang Li1,2,*, Di Li1,2, Yu Ou1,2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4641-4657, 2024, DOI:10.32604/cmc.2024.051613

    Abstract Correlation power analysis (CPA) combined with genetic algorithms (GA) now achieves greater attack efficiency and can recover all subkeys simultaneously. However, two issues in GA-based CPA still need to be addressed: key degeneration and slow evolution within populations. These challenges significantly hinder key recovery efforts. This paper proposes a screening correlation power analysis framework combined with a genetic algorithm, named SFGA-CPA, to address these issues. SFGA-CPA introduces three operations designed to exploit CPA characteristics: propagative operation, constrained crossover, and constrained mutation. Firstly, the propagative operation accelerates population evolution by maximizing the number of correct bytes… More >

  • Open Access

    ARTICLE

    Detecting Malicious Uniform Resource Locators Using an Applied Intelligence Framework

    Simona-Vasilica Oprea*, Adela Bâra

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3827-3853, 2024, DOI:10.32604/cmc.2024.051598

    Abstract The potential of text analytics is revealed by Machine Learning (ML) and Natural Language Processing (NLP) techniques. In this paper, we propose an NLP framework that is applied to multiple datasets to detect malicious Uniform Resource Locators (URLs). Three categories of features, both ML and Deep Learning (DL) algorithms and a ranking schema are included in the proposed framework. We apply frequency and prediction-based embeddings, such as hash vectorizer, Term Frequency-Inverse Dense Frequency (TF-IDF) and predictors, word to vector-word2vec (continuous bag of words, skip-gram) from Google, to extract features from text. Further, we apply more… More >

  • Open Access

    ARTICLE

    Enhancing Secure Development in Globally Distributed Software Product Lines: A Machine Learning-Powered Framework for Cyber-Resilient Ecosystems

    Marya Iqbal1, Yaser Hafeez1, Nabil Almashfi2, Amjad Alsirhani3, Faeiz Alserhani4, Sadia Ali1, Mamoona Humayun5,*, Muhammad Jamal6

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5031-5049, 2024, DOI:10.32604/cmc.2024.051371

    Abstract Embracing software product lines (SPLs) is pivotal in the dynamic landscape of contemporary software development. However, the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL variability, underscoring the critical importance of robust cybersecurity measures. This paper advocates for leveraging machine learning (ML) to address variability management issues and fortify the security of SPL. In the context of the broader special issue theme on innovative cybersecurity approaches, our proposed ML-based framework offers an interdisciplinary perspective, blending insights from computing, social sciences, and business. Specifically, it employs ML for demand analysis, More >

  • Open Access

    ARTICLE

    A New Framework for Software Vulnerability Detection Based on an Advanced Computing

    Bui Van Cong1, Cho Do Xuan2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3699-3723, 2024, DOI:10.32604/cmc.2024.050019

    Abstract The detection of software vulnerabilities written in C and C++ languages takes a lot of attention and interest today. This paper proposes a new framework called DrCSE to improve software vulnerability detection. It uses an intelligent computation technique based on the combination of two methods: Rebalancing data and representation learning to analyze and evaluate the code property graph (CPG) of the source code for detecting abnormal behavior of software vulnerabilities. To do that, DrCSE performs a combination of 3 main processing techniques: (i) building the source code feature profiles, (ii) rebalancing data, and (iii) contrastive… More >

  • Open Access

    ARTICLE

    CrossLinkNet: An Explainable and Trustworthy AI Framework for Whole-Slide Images Segmentation

    Peng Xiao1, Qi Zhong2, Jingxue Chen1, Dongyuan Wu1, Zhen Qin1, Erqiang Zhou1,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4703-4724, 2024, DOI:10.32604/cmc.2024.049791

    Abstract In the intelligent medical diagnosis area, Artificial Intelligence (AI)’s trustworthiness, reliability, and interpretability are critical, especially in cancer diagnosis. Traditional neural networks, while excellent at processing natural images, often lack interpretability and adaptability when processing high-resolution digital pathological images. This limitation is particularly evident in pathological diagnosis, which is the gold standard of cancer diagnosis and relies on a pathologist’s careful examination and analysis of digital pathological slides to identify the features and progression of the disease. Therefore, the integration of interpretable AI into smart medical diagnosis is not only an inevitable technological trend but… More >

  • Open Access

    ARTICLE

    LKPNR: Large Language Models and Knowledge Graph for Personalized News Recommendation Framework

    Hao Chen#, Runfeng Xie#, Xiangyang Cui, Zhou Yan, Xin Wang, Zhanwei Xuan*, Kai Zhang*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4283-4296, 2024, DOI:10.32604/cmc.2024.049129

    Abstract Accurately recommending candidate news to users is a basic challenge of personalized news recommendation systems. Traditional methods are usually difficult to learn and acquire complex semantic information in news texts, resulting in unsatisfactory recommendation results. Besides, these traditional methods are more friendly to active users with rich historical behaviors. However, they can not effectively solve the long tail problem of inactive users. To address these issues, this research presents a novel general framework that combines Large Language Models (LLM) and Knowledge Graphs (KG) into traditional methods. To learn the contextual information of news text, we… More >

  • Open Access

    ARTICLE

    A Proposed Feature Selection Particle Swarm Optimization Adaptation for Intelligent Logistics—A Supply Chain Backlog Elimination Framework

    Yasser Hachaichi1, Ayman E. Khedr1, Amira M. Idrees2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4081-4105, 2024, DOI:10.32604/cmc.2024.048929

    Abstract The diversity of data sources resulted in seeking effective manipulation and dissemination. The challenge that arises from the increasing dimensionality has a negative effect on the computation performance, efficiency, and stability of computing. One of the most successful optimization algorithms is Particle Swarm Optimization (PSO) which has proved its effectiveness in exploring the highest influencing features in the search space based on its fast convergence and the ability to utilize a small set of parameters in the search task. This research proposes an effective enhancement of PSO that tackles the challenge of randomness search which… More >

Displaying 1-10 on page 1 of 368. Per Page