Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Intrumer: A Multi Module Distributed Explainable IDS/IPS for Securing Cloud Environment

    Nazreen Banu A*, S.K.B. Sangeetha

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 579-607, 2025, DOI:10.32604/cmc.2024.059805 - 03 January 2025

    Abstract The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network traffic. Cloud environments pose significant challenges in maintaining privacy and security. Global approaches, such as IDS, have been developed to tackle these issues. However, most conventional Intrusion Detection System (IDS) models struggle with unseen cyberattacks and complex high-dimensional data. In fact, this paper introduces the idea of a novel distributed explainable and heterogeneous transformer-based intrusion detection system, named INTRUMER, which offers balanced accuracy, reliability, and security in cloud settings by multiple modules working together within it. The traffic captured… More >

  • Open Access

    ARTICLE

    A Deep Learning-Based Automated Approach of Schizophrenia Detection from Facial Micro-Expressions

    Anum Saher1, Ghulam Gilanie1,*, Sana Cheema1, Akkasha Latif1, Syeda Naila Batool1, Hafeez Ullah2

    Intelligent Automation & Soft Computing, Vol.39, No.6, pp. 1053-1071, 2024, DOI:10.32604/iasc.2024.057047 - 30 December 2024

    Abstract Schizophrenia is a severe mental illness responsible for many of the world’s disabilities. It significantly impacts human society; thus, rapid, and efficient identification is required. This research aims to diagnose schizophrenia directly from a high-resolution camera, which can capture the subtle micro facial expressions that are difficult to spot with the help of the naked eye. In a clinical study by a team of experts at Bahawal Victoria Hospital (BVH), Bahawalpur, Pakistan, there were 300 people with schizophrenia and 299 healthy subjects. Videos of these participants have been captured and converted into their frames using… More >

  • Open Access

    ARTICLE

    Image Captioning Using Multimodal Deep Learning Approach

    Rihem Farkh1,*, Ghislain Oudinet1, Yasser Foued2

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3951-3968, 2024, DOI:10.32604/cmc.2024.053245 - 19 December 2024

    Abstract The process of generating descriptive captions for images has witnessed significant advancements in last years, owing to the progress in deep learning techniques. Despite significant advancements, the task of thoroughly grasping image content and producing coherent, contextually relevant captions continues to pose a substantial challenge. In this paper, we introduce a novel multimodal method for image captioning by integrating three powerful deep learning architectures: YOLOv8 (You Only Look Once) for robust object detection, EfficientNetB7 for efficient feature extraction, and Transformers for effective sequence modeling. Our proposed model combines the strengths of YOLOv8 in detecting objects,… More >

  • Open Access

    ARTICLE

    Data-Efficient Image Transformers for Robust Malware Family Classification

    Boadu Nkrumah1,*, Michal Asante1, Gaddafi Adbdul-Salam1, Wofa K. Adu-Gyamfi2

    Journal of Cyber Security, Vol.6, pp. 131-153, 2024, DOI:10.32604/jcs.2024.053954 - 17 December 2024

    Abstract The changing nature of malware poses a cybersecurity threat, resulting in significant financial losses each year. However, traditional antivirus tools for detecting malware based on signatures are ineffective against disguised variations as they have low levels of accuracy. This study introduces Data Efficient Image Transformer-Malware Classifier (DeiT-MC), a system for classifying malware that utilizes Data-Efficient Image Transformers. DeiT-MC treats malware samples as visual data and integrates a newly developed Hybrid GridBay Optimizer (HGBO) for hyperparameter optimization and better model performance under varying malware scenarios. With HGBO, DeiT-MC outperforms the state-of-the-art techniques with a strong accuracy More >

  • Open Access

    ARTICLE

    Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT

    Arar Al Tawil1,*, Laiali Almazaydeh2, Doaa Qawasmeh3, Baraah Qawasmeh4, Mohammad Alshinwan1,5, Khaled Elleithy6

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3395-3412, 2024, DOI:10.32604/cmc.2024.057279 - 18 November 2024

    Abstract Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information, a practice known as phishing. This study utilizes three distinct methodologies, Term Frequency-Inverse Document Frequency, Word2Vec, and Bidirectional Encoder Representations from Transformers, to evaluate the effectiveness of various machine learning algorithms in detecting phishing attacks. The study uses feature extraction methods to assess the performance of Logistic Regression, Decision Tree, Random Forest, and Multilayer Perceptron algorithms. The best results for each classifier using Term Frequency-Inverse Document Frequency were Multilayer Perceptron (Precision: 0.98, Recall: 0.98, F1-score: 0.98, Accuracy: 0.98). Word2Vec’s More >

  • Open Access

    ARTICLE

    Arabic Dialect Identification in Social Media: A Comparative Study of Deep Learning and Transformer Approaches

    Enas Yahya Alqulaity1, Wael M.S. Yafooz1,*, Abdullah Alourani2, Ayman Jaradat3

    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 907-928, 2024, DOI:10.32604/iasc.2024.055470 - 31 October 2024

    Abstract Arabic dialect identification is essential in Natural Language Processing (NLP) and forms a critical component of applications such as machine translation, sentiment analysis, and cross-language text generation. The difficulties in differentiating between Arabic dialects have garnered more attention in the last 10 years, particularly in social media. These difficulties result from the overlapping vocabulary of the dialects, the fluidity of online language use, and the difficulties in telling apart dialects that are closely related. Managing dialects with limited resources and adjusting to the ever-changing linguistic trends on social media platforms present additional challenges. A strong… More >

  • Open Access

    ARTICLE

    Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model

    Mohamed A. Mahdi1, Suliman Mohamed Fati2,*, Mohamed A.G. Hazber1, Shahanawaj Ahamad3, Sawsan A. Saad4

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1651-1671, 2024, DOI:10.32604/cmes.2024.052291 - 27 September 2024

    Abstract Cyberbullying, a critical concern for digital safety, necessitates effective linguistic analysis tools that can navigate the complexities of language use in online spaces. To tackle this challenge, our study introduces a new approach employing Bidirectional Encoder Representations from the Transformers (BERT) base model (cased), originally pretrained in English. This model is uniquely adapted to recognize the intricate nuances of Arabic online communication, a key aspect often overlooked in conventional cyberbullying detection methods. Our model is an end-to-end solution that has been fine-tuned on a diverse dataset of Arabic social media (SM) tweets showing a notable… More >

  • Open Access

    ARTICLE

    Enhanced Topic-Aware Summarization Using Statistical Graph Neural Networks

    Ayesha Khaliq1, Salman Afsar Awan1, Fahad Ahmad2,*, Muhammad Azam Zia1, Muhammad Zafar Iqbal3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3221-3242, 2024, DOI:10.32604/cmc.2024.053488 - 15 August 2024

    Abstract The rapid expansion of online content and big data has precipitated an urgent need for efficient summarization techniques to swiftly comprehend vast textual documents without compromising their original integrity. Current approaches in Extractive Text Summarization (ETS) leverage the modeling of inter-sentence relationships, a task of paramount importance in producing coherent summaries. This study introduces an innovative model that integrates Graph Attention Networks (GATs) with Transformer-based Bidirectional Encoder Representations from Transformers (BERT) and Latent Dirichlet Allocation (LDA), further enhanced by Term Frequency-Inverse Document Frequency (TF-IDF) values, to improve sentence selection by capturing comprehensive topical information. Our… More >

  • Open Access

    REVIEW

    A Comprehensive Survey of Recent Transformers in Image, Video and Diffusion Models

    Dinh Phu Cuong Le1,2, Dong Wang1, Viet-Tuan Le3,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 37-60, 2024, DOI:10.32604/cmc.2024.050790 - 18 July 2024

    Abstract Transformer models have emerged as dominant networks for various tasks in computer vision compared to Convolutional Neural Networks (CNNs). The transformers demonstrate the ability to model long-range dependencies by utilizing a self-attention mechanism. This study aims to provide a comprehensive survey of recent transformer-based approaches in image and video applications, as well as diffusion models. We begin by discussing existing surveys of vision transformers and comparing them to this work. Then, we review the main components of a vanilla transformer network, including the self-attention mechanism, feed-forward network, position encoding, etc. In the main part of More >

  • Open Access

    ARTICLE

    BSTFNet: An Encrypted Malicious Traffic Classification Method Integrating Global Semantic and Spatiotemporal Features

    Hong Huang1, Xingxing Zhang1,*, Ye Lu1, Ze Li1, Shaohua Zhou2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3929-3951, 2024, DOI:10.32604/cmc.2024.047918 - 26 March 2024

    Abstract While encryption technology safeguards the security of network communications, malicious traffic also uses encryption protocols to obscure its malicious behavior. To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic, we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features, called BERT-based Spatio-Temporal Features Network (BSTFNet). At the packet-level granularity, the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers (BERT)… More >

Displaying 1-10 on page 1 of 24. Per Page