Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (40)
  • Open Access

    ARTICLE

    Hierarchical Mixed-Effects and Stacked Machine Learning Ensembles with Data Augmentation for Leakage-Safe E-Waste Forecasting

    Hatim Madkhali1,2,*, Abdullah Sheneamer2, Linh Nguyen3, Gnana Bharathy1, Ritu Chauhan4, Mukesh Prasad1,*

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.074444 - 09 April 2026

    Abstract Consumer electronics, with 62 million tons of electronic waste (e-waste) generated in 2022 and e-waste expected to grow to 82 million tons annually by 2030, pose critical challenges when it comes to national infrastructure and circular economy policies. This paper compares forecasting approaches using sparse panel data for 32 European countries (2005–2018, Eurostat/Waste Electrical and Electronic Equipment (WEEE) Directive), focusing on leakage-safe prospective validation to guarantee true predictive performance. We make one-step-ahead predictions with conservative features (primarily lagged values) to account for temporal autocorrelation but with reduced multicollinearity (Variance Inflation Factor (VIF) ≈ 1.0). Cross-paradigm comparisons… More >

  • Open Access

    ARTICLE

    Explainable Ensemble Learning Approach for Ovarian Cancer Diagnosis Using Clinical Data

    Daniyal Asif1,*, Nabil Kerdid2, Muhammad Shoaib Arif3, Mairaj Bibi4

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.3, 2026, DOI:10.32604/cmes.2026.077334 - 30 March 2026

    Abstract Ovarian cancer (OC) is one of the leading causes of death related to gynecological cancer, with the main difficulty of its early diagnosis and a heterogeneous nature of tumor biomarkers. Machine learning (ML) has the potential to process complex datasets and support decision-making in OC diagnosis. Nevertheless, traditional ML models tend to be biased, overfitting, noisy, and less generalized. Moreover, their black-box nature reduces interpretability and limits their practical clinical applicability. In this study, we introduce an explainable ensemble learning (EL) model, TreeX-Stack, based on a stacking architecture that employs tree-based learners such as Decision… More >

  • Open Access

    ARTICLE

    Advanced AI-Driven Cybersecurity Solutions: Intelligent Threat Detection, Explainability, and Adversarial Resilience

    Kirubavathi Ganapathiyappan1,*, Kiruba Marimuthu Eswaramoorthy1, Abi Thangamuthu Shanthamani1, Aksaya Venugopal1, Asita Pon Bhavya Iyyappan1, Thilaga Manickam1, Ateeq Ur Rehman2,*, Habib Hamam3,4,5,6

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-31, 2026, DOI:10.32604/cmc.2025.070067 - 09 December 2025

    Abstract The growing use of Portable Document Format (PDF) files across various sectors such as education, government, and business has inadvertently turned them into a major target for cyberattacks. Cybercriminals take advantage of the inherent flexibility and layered structure of PDFs to inject malicious content, often employing advanced obfuscation techniques to evade detection by traditional signature-based security systems. These conventional methods are no longer adequate, especially against sophisticated threats like zero-day exploits and polymorphic malware. In response to these challenges, this study introduces a machine learning-based detection framework specifically designed to combat such threats. Central to… More >

  • Open Access

    ARTICLE

    A Filter-Based Feature Selection Framework to Detect Phishing URLs Using Stacking Ensemble Machine Learning

    Nimra Bari1, Tahir Saleem2, Munam Shah3, Abdulmohsen Algarni4, Asma Patel5,*, Insaf Ullah6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 1167-1187, 2025, DOI:10.32604/cmes.2025.070311 - 30 October 2025

    Abstract Today, phishing is an online attack designed to obtain sensitive information such as credit card and bank account numbers, passwords, and usernames. We can find several anti-phishing solutions, such as heuristic detection, virtual similarity detection, black and white lists, and machine learning (ML). However, phishing attempts remain a problem, and establishing an effective anti-phishing strategy is a work in progress. Furthermore, while most anti-phishing solutions achieve the highest levels of accuracy on a given dataset, their methods suffer from an increased number of false positives. These methods are ineffective against zero-hour attacks. Phishing sites with… More >

  • Open Access

    ARTICLE

    Short-Term Electricity Load Forecasting Based on T-CFSFDP Clustering and Stacking-BiGRU-CBAM

    Mingliang Deng1, Zhao Zhang1,*, Hongyan Zhou2, Xuebo Chen2

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1189-1202, 2025, DOI:10.32604/cmc.2025.064509 - 09 June 2025

    Abstract To fully explore the potential features contained in power load data, an innovative short-term power load forecasting method that integrates data mining and deep learning techniques is proposed. Firstly, a density peak fast search algorithm optimized by time series weighting factors is used to cluster and analyze load data, accurately dividing subsets of data into different categories. Secondly, introducing convolutional block attention mechanism into the bidirectional gated recurrent unit (BiGRU) structure significantly enhances its ability to extract key features. On this basis, in order to make the model more accurately adapt to the dynamic changes… More >

  • Open Access

    ARTICLE

    A Two-Layer Network Intrusion Detection Method Incorporating LSTM and Stacking Ensemble Learning

    Jun Wang1,2, Chaoren Ge1,2, Yihong Li1,2, Huimin Zhao1,2, Qiang Fu1,2,*, Kerang Cao1,2, Hoekyung Jung3,*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5129-5153, 2025, DOI:10.32604/cmc.2025.062094 - 19 May 2025

    Abstract Network Intrusion Detection System (NIDS) detection of minority class attacks is always a difficult task when dealing with attacks in complex network environments. To improve the detection capability of minority-class attacks, this study proposes an intrusion detection method based on a two-layer structure. The first layer employs a CNN-BiLSTM model incorporating an attention mechanism to classify network traffic into normal traffic, majority class attacks, and merged minority class attacks. The second layer further segments the minority class attacks through Stacking ensemble learning. The datasets are selected from the generic network dataset CIC-IDS2017, NSL-KDD, and the… More >

  • Open Access

    ARTICLE

    A Novel Stacked Network Method for Enhancing the Performance of Side-Channel Attacks

    Zhicheng Yin1,2, Lang Li1,2,*, Yu Ou1,2

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1001-1022, 2025, DOI:10.32604/cmc.2025.060925 - 26 March 2025

    Abstract The adoption of deep learning-based side-channel analysis (DL-SCA) is crucial for leak detection in secure products. Many previous studies have applied this method to break targets protected with countermeasures. Despite the increasing number of studies, the problem of model overfitting. Recent research mainly focuses on exploring hyperparameters and network architectures, while offering limited insights into the effects of external factors on side-channel attacks, such as the number and type of models. This paper proposes a Side-channel Analysis method based on a Stacking ensemble, called Stacking-SCA. In our method, multiple models are deeply integrated. Through the… More >

  • Open Access

    ARTICLE

    Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting (XSS) Attack Detection

    Noor Ullah Bacha1, Songfeng Lu1, Attiq Ur Rehman1, Muhammad Idrees2, Yazeed Yasin Ghadi3, Tahani Jaser Alahmadi4,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 707-748, 2024, DOI:10.32604/cmc.2024.054780 - 15 October 2024

    Abstract Cross-Site Scripting (XSS) remains a significant threat to web application security, exploiting vulnerabilities to hijack user sessions and steal sensitive data. Traditional detection methods often fail to keep pace with the evolving sophistication of cyber threats. This paper introduces a novel hybrid ensemble learning framework that leverages a combination of advanced machine learning algorithms—Logistic Regression (LR), Support Vector Machines (SVM), eXtreme Gradient Boosting (XGBoost), Categorical Boosting (CatBoost), and Deep Neural Networks (DNN). Utilizing the XSS-Attacks-2021 dataset, which comprises 460 instances across various real-world traffic-related scenarios, this framework significantly enhances XSS attack detection. Our approach, which… More >

  • Open Access

    ARTICLE

    A Stacking Machine Learning Model for Student Performance Prediction Based on Class Activities in E-Learning

    Mohammad Javad Shayegan*, Rosa Akhtari

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1251-1272, 2024, DOI:10.32604/csse.2024.052587 - 13 September 2024

    Abstract After the spread of COVID-19, e-learning systems have become crucial tools in educational systems worldwide, spanning all levels of education. This widespread use of e-learning platforms has resulted in the accumulation of vast amounts of valuable data, making it an attractive resource for predicting student performance. In this study, we aimed to predict student performance based on the analysis of data collected from the OULAD and Deeds datasets. The stacking method was employed for modeling in this research. The proposed model utilized weak learners, including nearest neighbor, decision tree, random forest, enhanced gradient, simple Bayes, More >

  • Open Access

    ARTICLE

    A Robust Approach for Multi Classification-Based Intrusion Detection through Stacking Deep Learning Models

    Samia Allaoua Chelloug*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4845-4861, 2024, DOI:10.32604/cmc.2024.051539 - 20 June 2024

    Abstract Intrusion detection is a predominant task that monitors and protects the network infrastructure. Therefore, many datasets have been published and investigated by researchers to analyze and understand the problem of intrusion prediction and detection. In particular, the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) is an extensively used benchmark dataset for evaluating intrusion detection systems (IDSs) as it incorporates various network traffic attacks. It is worth mentioning that a large number of studies have tackled the problem of intrusion detection using machine learning models, but the performance of these models often decreases when evaluated on… More >

Displaying 1-10 on page 1 of 40. Per Page