Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Information Extraction Based on Multi-turn Question Answering for Analyzing Korean Research Trends

    Seongung Jo1, Heung-Seon Oh1,*, Sanghun Im1, Gibaeg Kim1, Seonho Kim2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2967-2980, 2023, DOI:10.32604/cmc.2023.031983

    Abstract Analyzing Research and Development (R&D) trends is important because it can influence future decisions regarding R&D direction. In typical trend analysis, topic or technology taxonomies are employed to compute the popularities of the topics or codes over time. Although it is simple and effective, the taxonomies are difficult to manage because new technologies are introduced rapidly. Therefore, recent studies exploit deep learning to extract pre-defined targets such as problems and solutions. Based on the recent advances in question answering (QA) using deep learning, we adopt a multi-turn QA model to extract problems and solutions from Korean R&D reports. With the… More >

  • Open Access

    ARTICLE

    Understanding Research Trends in Android Malware Research Using Information Modelling Techniques

    Jaiteg Singh1, Tanya Gera1, Farman Ali2, Deepak Thakur1, Karamjeet Singh3, Kyung-sup Kwak4,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2655-2670, 2021, DOI:10.32604/cmc.2021.014504

    Abstract Android has been dominating the smartphone market for more than a decade and has managed to capture 87.8% of the market share. Such popularity of Android has drawn the attention of cybercriminals and malware developers. The malicious applications can steal sensitive information like contacts, read personal messages, record calls, send messages to premium-rate numbers, cause financial loss, gain access to the gallery and can access the user’s geographic location. Numerous surveys on Android security have primarily focused on types of malware attack, their propagation, and techniques to mitigate them. To the best of our knowledge, Android malware literature has never… More >

Displaying 1-10 on page 1 of 2. Per Page