Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (134)
  • Open Access

    ARTICLE

    Super-Resolution Generative Adversarial Network with Pyramid Attention Module for Face Generation

    Parvathaneni Naga Srinivasu1,2, G. JayaLakshmi3, Sujatha Canavoy Narahari4, Victor Hugo C. de Albuquerque2, Muhammad Attique Khan5, Hee-Chan Cho6, Byoungchol Chang7,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2117-2139, 2025, DOI:10.32604/cmc.2025.065232 - 29 August 2025

    Abstract The generation of high-quality, realistic face generation has emerged as a key field of research in computer vision. This paper proposes a robust approach that combines a Super-Resolution Generative Adversarial Network (SRGAN) with a Pyramid Attention Module (PAM) to enhance the quality of deep face generation. The SRGAN framework is designed to improve the resolution of generated images, addressing common challenges such as blurriness and a lack of intricate details. The Pyramid Attention Module further complements the process by focusing on multi-scale feature extraction, enabling the network to capture finer details and complex facial features… More >

  • Open Access

    ARTICLE

    Transmission Facility Detection with Feature-Attention Multi-Scale Robustness Network and Generative Adversarial Network

    Yunho Na1, Munsu Jeon1, Seungmin Joo1, Junsoo Kim1, Ki-Yong Oh1,2,*, Min Ku Kim1,2,*, Joon-Young Park3

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.1, pp. 1013-1044, 2025, DOI:10.32604/cmes.2025.066447 - 31 July 2025

    Abstract This paper proposes an automated detection framework for transmission facilities using a feature-attention multi-scale robustness network (FAMSR-Net) with high-fidelity virtual images. The proposed framework exhibits three key characteristics. First, virtual images of the transmission facilities generated using StyleGAN2-ADA are co-trained with real images. This enables the neural network to learn various features of transmission facilities to improve the detection performance. Second, the convolutional block attention module is deployed in FAMSR-Net to effectively extract features from images and construct multi-dimensional feature maps, enabling the neural network to perform precise object detection in various environments. Third, an… More >

  • Open Access

    ARTICLE

    Secure Text Mail Encryption with Generative Adversarial Networks

    Alexej Schelle1,2,*

    Journal of Information Hiding and Privacy Protection, Vol.7, pp. 33-44, 2025, DOI:10.32604/jihpp.2025.067510 - 31 July 2025

    Abstract This work presents an encryption model based on Generative Adversarial Networks (GANs). Encryption of RTF-8 data is realized by dynamically generating decimal numbers that lead to the encryption and decryption of alphabetic strings in integer representation by simple addition rules, the modulus of the dimension of the considered alphabet. The binary numbers for the private dynamic keys correspond to the binary numbers of public reference keys, as defined by a specific GAN configuration. For reversible encryption with a bijective mapping between dynamic and reference keys, as defined by the GAN encryptor, secure text encryption can… More >

  • Open Access

    REVIEW

    A Survey of Image Forensics: Exploring Forgery Detection in Image Colorization

    Saurabh Agarwal1, Deepak Sharma2, Nancy Girdhar3, Cheonshik Kim4, Ki-Hyun Jung5,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4195-4221, 2025, DOI:10.32604/cmc.2025.066202 - 30 July 2025

    Abstract In today’s digital era, the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation. Unfortunately, this progress has also given rise to the misuse of manipulated images across various domains. One of the pressing challenges stemming from this advancement is the increasing difficulty in discerning between unaltered and manipulated images. This paper offers a comprehensive survey of existing methodologies for detecting image tampering, shedding light on the diverse approaches employed in the field of contemporary image forensics. The methods used to identify image forgery can be broadly classified into… More >

  • Open Access

    REVIEW

    An Overview and Comparative Study of Traditional, Chaos-Based and Machine Learning Approaches in Pseudorandom Number Generation

    Issah Zabsonre Alhassan1,2,*, Gaddafi Abdul-Salaam1, Michael Asante1, Yaw Marfo Missah1, Alimatu Sadia Shirazu1

    Journal of Cyber Security, Vol.7, pp. 165-196, 2025, DOI:10.32604/jcs.2025.063529 - 07 July 2025

    Abstract Pseudorandom number generators (PRNGs) are foundational to modern cryptography, yet existing approaches face critical trade-offs between cryptographic security, computational efficiency, and adaptability to emerging threats. Traditional PRNGs (e.g., Mersenne Twister, LCG) remain widely used in low-security applications despite vulnerabilities to predictability attacks, while machine learning (ML)-driven and chaos-based alternatives struggle to balance statistical robustness with practical deployability. This study systematically evaluates traditional, chaos-based, and ML-driven PRNGs to identify design principles for next-generation systems capable of meeting the demands of high-security environment like blockchain and IoT. Using a framework that quantifies cryptographic robustness (via NIST SP… More >

  • Open Access

    ARTICLE

    A Hybrid Wasserstein GAN and Autoencoder Model for Robust Intrusion Detection in IoT

    Mohammed S. Alshehri1,*, Oumaima Saidani2, Wajdan Al Malwi3, Fatima Asiri3, Shahid Latif 4, Aizaz Ahmad Khattak5, Jawad Ahmad6

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3899-3920, 2025, DOI:10.32604/cmes.2025.064874 - 30 June 2025

    Abstract The emergence of Generative Adversarial Network (GAN) techniques has garnered significant attention from the research community for the development of Intrusion Detection Systems (IDS). However, conventional GAN-based IDS models face several challenges, including training instability, high computational costs, and system failures. To address these limitations, we propose a Hybrid Wasserstein GAN and Autoencoder Model (WGAN-AE) for intrusion detection. The proposed framework leverages the stability of WGAN and the feature extraction capabilities of the Autoencoder Model. The model was trained and evaluated using two recent benchmark datasets, 5GNIDD and IDSIoT2024. When trained on the 5GNIDD dataset,… More >

  • Open Access

    ARTICLE

    Rolling Bearing Fault Detection Based on Self-Adaptive Wasserstein Dual Generative Adversarial Networks and Feature Fusion under Small Sample Conditions

    Qiang Ma1,2,3,4,5, Zhuopei Wei1,2, Kai Yang1,2,*, Long Tian1,2, Zepeng Li1,2

    Structural Durability & Health Monitoring, Vol.19, No.4, pp. 1011-1035, 2025, DOI:10.32604/sdhm.2025.060596 - 30 June 2025

    Abstract An intelligent diagnosis method based on self-adaptive Wasserstein dual generative adversarial networks and feature fusion is proposed due to problems such as insufficient sample size and incomplete fault feature extraction, which are commonly faced by rolling bearings and lead to low diagnostic accuracy. Initially, dual models of the Wasserstein deep convolutional generative adversarial network incorporating gradient penalty (1D-2DWDCGAN) are constructed to augment the original dataset. A self-adaptive loss threshold control training strategy is introduced, and establishing a self-adaptive balancing mechanism for stable model training. Subsequently, a diagnostic model based on multidimensional feature fusion is designed,… More >

  • Open Access

    ARTICLE

    Integrating Speech-to-Text for Image Generation Using Generative Adversarial Networks

    Smita Mahajan1, Shilpa Gite1,2, Biswajeet Pradhan3,*, Abdullah Alamri4, Shaunak Inamdar5, Deva Shriyansh5, Akshat Ashish Shah5, Shruti Agarwal5

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.2, pp. 2001-2026, 2025, DOI:10.32604/cmes.2025.058456 - 30 May 2025

    Abstract The development of generative architectures has resulted in numerous novel deep-learning models that generate images using text inputs. However, humans naturally use speech for visualization prompts. Therefore, this paper proposes an architecture that integrates speech prompts as input to image-generation Generative Adversarial Networks (GANs) model, leveraging Speech-to-Text translation along with the CLIP + VQGAN model. The proposed method involves translating speech prompts into text, which is then used by the Contrastive Language-Image Pretraining (CLIP) + Vector Quantized Generative Adversarial Network (VQGAN) model to generate images. This paper outlines the steps required to implement such a… More >

  • Open Access

    ARTICLE

    Expo-GAN: A Style Transfer Generative Adversarial Network for Exhibition Hall Design Based on Optimized Cyclic and Neural Architecture Search

    Qing Xie*, Ruiyun Yu

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4757-4774, 2025, DOI:10.32604/cmc.2025.063345 - 19 May 2025

    Abstract This study presents a groundbreaking method named Expo-GAN (Exposition-Generative Adversarial Network) for style transfer in exhibition hall design, using a refined version of the Cycle Generative Adversarial Network (CycleGAN). The primary goal is to enhance the transformation of image styles while maintaining visual consistency, an area where current CycleGAN models often fall short. These traditional models typically face difficulties in accurately capturing expansive features as well as the intricate stylistic details necessary for high-quality image transformation. To address these limitations, the research introduces several key modifications to the CycleGAN architecture. Enhancements to the generator involve… More >

  • Open Access

    ARTICLE

    SMNDNet for Multiple Types of Deepfake Image Detection

    Qin Wang1, Xiaofeng Wang2,*, Jianghua Li2, Ruidong Han2, Zinian Liu1, Mingtao Guo3

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4607-4621, 2025, DOI:10.32604/cmc.2025.063141 - 19 May 2025

    Abstract The majority of current deepfake detection methods are constrained to identifying one or two specific types of counterfeit images, which limits their ability to keep pace with the rapid advancements in deepfake technology. Therefore, in this study, we propose a novel algorithm, Stereo Mixture Density Network (SMNDNet), which can detect multiple types of deepfake face manipulations using a single network framework. SMNDNet is an end-to-end CNN-based network specially designed for detecting various manipulation types of deepfake face images. First, we design a Subtle Distinguishable Feature Enhancement Module to emphasize the differentiation between authentic and forged… More >

Displaying 21-30 on page 3 of 134. Per Page