Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    BES-Net: A Complex Road Vehicle Detection Algorithm Based on Multi-Head Self-Attention Mechanism

    Heng Wang1, Jian-Hua Qin2,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1037-1052, 2025, DOI:10.32604/cmc.2025.067650 - 29 August 2025

    Abstract Vehicle detection is a crucial aspect of intelligent transportation systems (ITS) and autonomous driving technologies. The complexity and diversity of real-world road environments, coupled with traffic congestion, pose significant challenges to the accuracy and real-time performance of vehicle detection models. To address these challenges, this paper introduces a fast and accurate vehicle detection algorithm named BES-Net. Firstly, the BoTNet module is integrated into the backbone network to bolster the model’s long-distance dependency, address the complexities and diversity of road environments, and accelerate the detection speed of the BES-Net network. Secondly, to accommodate the varying sizes… More >

  • Open Access

    ARTICLE

    A New Industrial Intrusion Detection Method Based on CNN-BiLSTM

    Jun Wang, Changfu Si, Zhen Wang, Qiang Fu*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4297-4318, 2024, DOI:10.32604/cmc.2024.050223 - 20 June 2024

    Abstract Nowadays, with the rapid development of industrial Internet technology, on the one hand, advanced industrial control systems (ICS) have improved industrial production efficiency. However, there are more and more cyber-attacks targeting industrial control systems. To ensure the security of industrial networks, intrusion detection systems have been widely used in industrial control systems, and deep neural networks have always been an effective method for identifying cyber attacks. Current intrusion detection methods still suffer from low accuracy and a high false alarm rate. Therefore, it is important to build a more efficient intrusion detection model. This paper… More >

Displaying 1-10 on page 1 of 2. Per Page