Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (46)
  • Open Access

    ARTICLE

    Motion In-Betweening via Frequency-Domain Diffusion Model

    Qiang Zhang1, Shuo Feng1, Shanxiong Chen2, Teng Wan1, Ying Qi1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-22, 2026, DOI:10.32604/cmc.2025.068247 - 10 November 2025

    Abstract Human motion modeling is a core technology in computer animation, game development, and human-computer interaction. In particular, generating natural and coherent in-between motion using only the initial and terminal frames remains a fundamental yet unresolved challenge. Existing methods typically rely on dense keyframe inputs or complex prior structures, making it difficult to balance motion quality and plausibility under conditions such as sparse constraints, long-term dependencies, and diverse motion styles. To address this, we propose a motion generation framework based on a frequency-domain diffusion model, which aims to better model complex motion distributions and enhance generation… More >

  • Open Access

    REVIEW

    Anime Generation through Diffusion and Language Models: A Comprehensive Survey of Techniques and Trends

    Yujie Wu1, Xing Deng1,*, Haijian Shao1, Ke Cheng1, Ming Zhang1, Yingtao Jiang2, Fei Wang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 2709-2778, 2025, DOI:10.32604/cmes.2025.066647 - 30 September 2025

    Abstract The application of generative artificial intelligence (AI) is bringing about notable changes in anime creation. This paper surveys recent advancements and applications of diffusion and language models in anime generation, focusing on their demonstrated potential to enhance production efficiency through automation and personalization. Despite these benefits, it is crucial to acknowledge the substantial initial computational investments required for training and deploying these models. We conduct an in-depth survey of cutting-edge generative AI technologies, encompassing models such as Stable Diffusion and GPT, and appraise pivotal large-scale datasets alongside quantifiable evaluation metrics. Review of the surveyed literature… More >

  • Open Access

    ARTICLE

    PolyDiffusion: A Multi-Objective Optimized Contour-to-Image Diffusion Framework

    Yuzhen Liu1,2, Jiasheng Yin1,2, Yixuan Chen1,2, Jin Wang1,2, Xiaolan Zhou1,2, Xiaoliang Wang1,2,*

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3965-3980, 2025, DOI:10.32604/cmc.2025.068500 - 23 September 2025

    Abstract Multi-instance image generation remains a challenging task in the field of computer vision. While existing diffusion models demonstrate impressive fidelity in image generation, they often struggle with precisely controlling each object’s shape, pose, and size. Methods like layout-to-image and mask-to-image provide spatial guidance but frequently suffer from object shape distortion, overlaps, and poor consistency, particularly in complex scenes with multiple objects. To address these issues, we introduce PolyDiffusion, a contour-based diffusion framework that encodes each object’s contour as a boundary-coordinate sequence, decoupling object shapes and positions. This approach allows for better control over object geometry… More >

  • Open Access

    ARTICLE

    Diff-Fastener: A Few-Shot Rail Fastener Anomaly Detection Framework Based on Diffusion Model

    Peng Sun1,2, Dechen Yao1,2,*, Jianwei Yang1,2, Quanyu Long1,2

    Structural Durability & Health Monitoring, Vol.19, No.5, pp. 1221-1239, 2025, DOI:10.32604/sdhm.2025.066098 - 05 September 2025

    Abstract Supervised learning-based rail fastener anomaly detection models are limited by the scarcity of anomaly samples and perform poorly under data imbalance conditions. However, unsupervised anomaly detection methods based on diffusion models reduce the dependence on the number of anomalous samples but suffer from too many iterations and excessive smoothing of reconstructed images. In this work, we have established a rail fastener anomaly detection framework called Diff-Fastener, the diffusion model is introduced into the fastener detection task, half of the normal samples are converted into anomaly samples online in the model training stage, and One-Step denoising… More >

  • Open Access

    ARTICLE

    Optimizing Semantic and Texture Consistency in Video Generation

    Xian Yu, Jianxun Zhang*, Siran Tian, Xiaobao He

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1883-1897, 2025, DOI:10.32604/cmc.2025.065529 - 29 August 2025

    Abstract In recent years, diffusion models have achieved remarkable progress in image generation. However, extending them to text-to-video (T2V) generation remains challenging, particularly in maintaining semantic consistency and visual quality across frames. Existing approaches often overlook the synergy between high-level semantics and low-level texture information, resulting in blurry or temporally inconsistent outputs. To address these issues, we propose Dual Consistency Training (DCT), a novel framework designed to jointly optimize semantic and texture consistency in video generation. Specifically, we introduce a multi-scale spatial adapter to enhance spatial feature extraction, and leverage the complementary strengths of CLIP and More >

  • Open Access

    ARTICLE

    Fixed Neural Network Image Steganography Based on Secure Diffusion Models

    Yixin Tang1,2, Minqing Zhang1,2,3,*, Peizheng Lai1,2, Ya Yue1,2, Fuqiang Di1,2,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5733-5750, 2025, DOI:10.32604/cmc.2025.064901 - 30 July 2025

    Abstract Traditional steganography conceals information by modifying cover data, but steganalysis tools easily detect such alterations. While deep learning-based steganography often involves high training costs and complex deployment. Diffusion model-based methods face security vulnerabilities, particularly due to potential information leakage during generation. We propose a fixed neural network image steganography framework based on secure diffusion models to address these challenges. Unlike conventional approaches, our method minimizes cover modifications through neural network optimization, achieving superior steganographic performance in human visual perception and computer vision analyses. The cover images are generated in an anime style using state-of-the-art diffusion More >

  • Open Access

    ARTICLE

    Image Style Transfer for Exhibition Hall Design Based on Multimodal Semantic-Enhanced Algorithm

    Qing Xie*, Ruiyun Yu

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1123-1144, 2025, DOI:10.32604/cmc.2025.062712 - 09 June 2025

    Abstract Although existing style transfer techniques have made significant progress in the field of image generation, there are still some challenges in the field of exhibition hall design. The existing style transfer methods mainly focus on the transformation of single dimensional features, but ignore the deep integration of content and style features in exhibition hall design. In addition, existing methods are deficient in detail retention, especially in accurately capturing and reproducing local textures and details while preserving the content image structure. In addition, point-based attention mechanisms tend to ignore the complexity and diversity of image features… More >

  • Open Access

    ARTICLE

    Dialogue Relation Extraction Enhanced with Trigger: A Multi-Feature Filtering and Fusion Model

    Haitao Wang1,2, Yuanzhao Guo1,2, Xiaotong Han1,2, Yuan Tian1,2,*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 137-155, 2025, DOI:10.32604/cmc.2025.060534 - 26 March 2025

    Abstract Relation extraction plays a crucial role in numerous downstream tasks. Dialogue relation extraction focuses on identifying relations between two arguments within a given dialogue. To tackle the problem of low information density in dialogues, methods based on trigger enhancement have been proposed, yielding positive results. However, trigger enhancement faces challenges, which cause suboptimal model performance. First, the proportion of annotated triggers is low in DialogRE. Second, feature representations of triggers and arguments often contain conflicting information. In this paper, we propose a novel Multi-Feature Filtering and Fusion trigger enhancement approach to overcome these limitations. We first… More >

  • Open Access

    ARTICLE

    YOLO-SIFD: YOLO with Sliced Inference and Fractal Dimension Analysis for Improved Fire and Smoke Detection

    Mariam Ishtiaq1,2, Jong-Un Won1,2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5343-5361, 2025, DOI:10.32604/cmc.2025.061466 - 06 March 2025

    Abstract Fire detection has held stringent importance in computer vision for over half a century. The development of early fire detection strategies is pivotal to the realization of safe and smart cities, inhabitable in the future. However, the development of optimal fire and smoke detection models is hindered by limitations like publicly available datasets, lack of diversity, and class imbalance. In this work, we explore the possible ways forward to overcome these challenges posed by available datasets. We study the impact of a class-balanced dataset to improve the fire detection capability of state-of-the-art (SOTA) vision-based models and proposeMore >

  • Open Access

    ARTICLE

    Diff-IDS: A Network Intrusion Detection Model Based on Diffusion Model for Imbalanced Data Samples

    Yue Yang1,2, Xiangyan Tang2,3,*, Zhaowu Liu2,3,*, Jieren Cheng2,3, Haozhe Fang3, Cunyi Zhang3

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4389-4408, 2025, DOI:10.32604/cmc.2025.060357 - 06 March 2025

    Abstract With the rapid development of Internet of Things technology, the sharp increase in network devices and their inherent security vulnerabilities present a stark contrast, bringing unprecedented challenges to the field of network security, especially in identifying malicious attacks. However, due to the uneven distribution of network traffic data, particularly the imbalance between attack traffic and normal traffic, as well as the imbalance between minority class attacks and majority class attacks, traditional machine learning detection algorithms have significant limitations when dealing with sparse network traffic data. To effectively tackle this challenge, we have designed a lightweight… More >

Displaying 1-10 on page 1 of 46. Per Page