Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (61)
  • Open Access

    ARTICLE

    Weakly Supervised Network with Scribble-Supervised and Edge-Mask for Road Extraction from High-Resolution Remote Sensing Images

    Supeng Yu1, Fen Huang1,*, Chengcheng Fan2,3,4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 549-562, 2024, DOI:10.32604/cmc.2024.048608

    Abstract Significant advancements have been achieved in road surface extraction based on high-resolution remote sensing image processing. Most current methods rely on fully supervised learning, which necessitates enormous human effort to label the image. Within this field, other research endeavors utilize weakly supervised methods. These approaches aim to reduce the expenses associated with annotation by leveraging sparsely annotated data, such as scribbles. This paper presents a novel technique called a weakly supervised network using scribble-supervised and edge-mask (WSSE-net). This network is a three-branch network architecture, whereby each branch is equipped with a distinct decoder module dedicated to road extraction tasks. One… More >

  • Open Access

    ARTICLE

    A Web Application Fingerprint Recognition Method Based on Machine Learning

    Yanmei Shi1, Wei Yu2,*, Yanxia Zhao3,*, Yungang Jia4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 887-906, 2024, DOI:10.32604/cmes.2024.046140

    Abstract Web application fingerprint recognition is an effective security technology designed to identify and classify web applications, thereby enhancing the detection of potential threats and attacks. Traditional fingerprint recognition methods, which rely on preannotated feature matching, face inherent limitations due to the ever-evolving nature and diverse landscape of web applications. In response to these challenges, this work proposes an innovative web application fingerprint recognition method founded on clustering techniques. The method involves extensive data collection from the Tranco List, employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction. The core of the methodology lies in… More >

  • Open Access

    ARTICLE

    An Online Fake Review Detection Approach Using Famous Machine Learning Algorithms

    Asma Hassan Alshehri*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2767-2786, 2024, DOI:10.32604/cmc.2023.046838

    Abstract Online review platforms are becoming increasingly popular, encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services. Using Sybil accounts, bot farms, and real account purchases, immoral actors demonize rivals and advertise their goods. Most academic and industry efforts have been aimed at detecting fake/fraudulent product or service evaluations for years. The primary hurdle to identifying fraudulent reviews is the lack of a reliable means to distinguish fraudulent reviews from real ones. This paper adopts a semi-supervised machine learning method to detect fake reviews on any website, among other things. Online reviews… More >

  • Open Access

    ARTICLE

    Fake News Classification: Past, Current, and Future

    Muhammad Usman Ghani Khan1, Abid Mehmood2, Mourad Elhadef2, Shehzad Ashraf Chaudhry2,3,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2225-2249, 2023, DOI:10.32604/cmc.2023.038303

    Abstract The proliferation of deluding data such as fake news and phony audits on news web journals, online publications, and internet business apps has been aided by the availability of the web, cell phones, and social media. Individuals can quickly fabricate comments and news on social media. The most difficult challenge is determining which news is real or fake. Accordingly, tracking down programmed techniques to recognize fake news online is imperative. With an emphasis on false news, this study presents the evolution of artificial intelligence techniques for detecting spurious social media content. This study shows past, current, and possible methods that… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Stacked Auto-Encoder with Dynamic Differential Annealed Optimization for Skin Lesion Diagnosis

    Ahmad Alassaf*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2773-2789, 2023, DOI:10.32604/csse.2023.035899

    Abstract Intelligent diagnosis approaches with shallow architectural models play an essential role in healthcare. Deep Learning (DL) models with unsupervised learning concepts have been proposed because high-quality feature extraction and adequate labelled details significantly influence shallow models. On the other hand, skin lesion-based segregation and disintegration procedures play an essential role in earlier skin cancer detection. However, artefacts, an unclear boundary, poor contrast, and different lesion sizes make detection difficult. To address the issues in skin lesion diagnosis, this study creates the UDLS-DDOA model, an intelligent Unsupervised Deep Learning-based Stacked Auto-encoder (UDLS) optimized by Dynamic Differential Annealed Optimization (DDOA). Pre-processing, segregation,… More >

  • Open Access

    ARTICLE

    Deep Learning Models Based on Weakly Supervised Learning and Clustering Visualization for Disease Diagnosis

    Jingyao Liu1,2, Qinghe Feng4, Jiashi Zhao2,3, Yu Miao2,3, Wei He2, Weili Shi2,3, Zhengang Jiang2,3,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2649-2665, 2023, DOI:10.32604/cmc.2023.038891

    Abstract The coronavirus disease 2019 (COVID-19) has severely disrupted both human life and the health care system. Timely diagnosis and treatment have become increasingly important; however, the distribution and size of lesions vary widely among individuals, making it challenging to accurately diagnose the disease. This study proposed a deep-learning disease diagnosis model based on weakly supervised learning and clustering visualization (W_CVNet) that fused classification with segmentation. First, the data were preprocessed. An optimizable weakly supervised segmentation preprocessing method (O-WSSPM) was used to remove redundant data and solve the category imbalance problem. Second, a deep-learning fusion method was used for feature extraction… More >

  • Open Access

    ARTICLE

    Optimizing Power Allocation for D2D Communication with URLLC under Rician Fading Channel: A Learning-to-Optimize Approach

    Owais Muhammad1, Hong Jiang1,*, Mushtaq Muhammad Umer1, Bilal Muhammad2, Naeem Muhammad Ahtsam3

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3193-3212, 2023, DOI:10.32604/iasc.2023.041232

    Abstract To meet the high-performance requirements of fifth-generation (5G) and sixth-generation (6G) wireless networks, in particular, ultra-reliable and low-latency communication (URLLC) is considered to be one of the most important communication scenarios in a wireless network. In this paper, we consider the effects of the Rician fading channel on the performance of cooperative device-to-device (D2D) communication with URLLC. For better performance, we maximize and examine the system’s minimal rate of D2D communication. Due to the interference in D2D communication, the problem of maximizing the minimum rate becomes non-convex and difficult to solve. To solve this problem, a learning-to-optimize-based algorithm is proposed… More >

  • Open Access

    ARTICLE

    Cross-Domain TSK Fuzzy System Based on Semi-Supervised Learning for Epilepsy Classification

    Zaihe Cheng1, Yuwen Tao2, Xiaoqing Gu3, Yizhang Jiang2, Pengjiang Qian2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1613-1633, 2023, DOI:10.32604/cmes.2023.027708

    Abstract Through semi-supervised learning and knowledge inheritance, a novel Takagi-Sugeno-Kang (TSK) fuzzy system framework is proposed for epilepsy data classification in this study. The new method is based on the maximum mean discrepancy (MMD) method and TSK fuzzy system, as a basic model for the classification of epilepsy data. First, for medical data, the interpretability of TSK fuzzy systems can ensure that the prediction results are traceable and safe. Second, in view of the deviation in the data distribution between the real source domain and the target domain, MMD is used to measure the distance between dierent data distributions. The objective… More >

  • Open Access

    ARTICLE

    Attentive Neighborhood Feature Augmentation for Semi-supervised Learning

    Qi Liu1,2, Jing Li1,2,*, Xianmin Wang1,*, Wenpeng Zhao1

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1753-1771, 2023, DOI:10.32604/iasc.2023.039600

    Abstract Recent state-of-the-art semi-supervised learning (SSL) methods usually use data augmentations as core components. Such methods, however, are limited to simple transformations such as the augmentations under the instance’s naive representations or the augmentations under the instance’s semantic representations. To tackle this problem, we offer a unique insight into data augmentations and propose a novel data-augmentation-based semi-supervised learning method, called Attentive Neighborhood Feature Augmentation (ANFA). The motivation of our method lies in the observation that the relationship between the given feature and its neighborhood may contribute to constructing more reliable transformations for the data, and further facilitating the classifier to distinguish… More >

  • Open Access

    ARTICLE

    XA-GANomaly: An Explainable Adaptive Semi-Supervised Learning Method for Intrusion Detection Using GANomaly

    Yuna Han1, Hangbae Chang2,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 221-237, 2023, DOI:10.32604/cmc.2023.039463

    Abstract Intrusion detection involves identifying unauthorized network activity and recognizing whether the data constitute an abnormal network transmission. Recent research has focused on using semi-supervised learning mechanisms to identify abnormal network traffic to deal with labeled and unlabeled data in the industry. However, real-time training and classifying network traffic pose challenges, as they can lead to the degradation of the overall dataset and difficulties preventing attacks. Additionally, existing semi-supervised learning research might need to analyze the experimental results comprehensively. This paper proposes XA-GANomaly, a novel technique for explainable adaptive semi-supervised learning using GANomaly, an image anomalous detection model that dynamically trains… More >

Displaying 1-10 on page 1 of 61. Per Page