Home / Journals / CMC / Vol.82, No.3, 2025
Special Issues
Table of Content
  • Open AccessOpen Access

    REVIEW

    Artificial Intelligence Revolutionising the Automotive Sector: A Comprehensive Review of Current Insights, Challenges, and Future Scope

    Md Naeem Hossain1, Md. Abdur Rahim2, Md Mustafizur Rahman1,3,*, Devarajan Ramasamy1
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3643-3692, 2025, DOI:10.32604/cmc.2025.061749 - 06 March 2025
    (This article belongs to the Special Issue: Artificial Intelligence Current Perspectives and Alternative Paths: From eXplainable AI to Generative AI and Data Visualization Technologies)
    Abstract The automotive sector is crucial in modern society, facilitating essential transportation needs across personal, commercial, and logistical domains while significantly contributing to national economic development and employment generation. The transformative impact of Artificial Intelligence (AI) has revolutionised multiple facets of the automotive industry, encompassing intelligent manufacturing processes, diagnostic systems, control mechanisms, supply chain operations, customer service platforms, and traffic management solutions. While extensive research exists on the above aspects of AI applications in automotive contexts, there is a compelling need to synthesise this knowledge comprehensively to guide and inspire future research. This review introduces a… More >

  • Open AccessOpen Access

    REVIEW

    A Comprehensive Review of Pill Image Recognition

    Linh Nguyen Thi My1,2,*, Viet-Tuan Le3, Tham Vo1, Vinh Truong Hoang3,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3693-3740, 2025, DOI:10.32604/cmc.2025.060793 - 06 March 2025
    (This article belongs to the Special Issue: Novel Methods for Image Classification, Object Detection, and Segmentation)
    Abstract Pill image recognition is an important field in computer vision. It has become a vital technology in healthcare and pharmaceuticals due to the necessity for precise medication identification to prevent errors and ensure patient safety. This survey examines the current state of pill image recognition, focusing on advancements, methodologies, and the challenges that remain unresolved. It provides a comprehensive overview of traditional image processing-based, machine learning-based, deep learning-based, and hybrid-based methods, and aims to explore the ongoing difficulties in the field. We summarize and classify the methods used in each article, compare the strengths and More >

  • Open AccessOpen Access

    REVIEW

    Ensemble Deep Learning Approaches in Health Care: A Review

    Aziz Alotaibi*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3741-3771, 2025, DOI:10.32604/cmc.2025.061998 - 06 March 2025
    (This article belongs to the Special Issue: Advancements in Machine Learning and Artificial Intelligence for Pattern Detection and Predictive Analytics in Healthcare)
    Abstract Deep learning algorithms have been rapidly incorporated into many different applications due to the increase in computational power and the availability of massive amounts of data. Recently, both deep learning and ensemble learning have been used to recognize underlying structures and patterns from high-level features to make predictions/decisions. With the growth in popularity of deep learning and ensemble learning algorithms, they have received significant attention from both scientists and the industrial community due to their superior ability to learn features from big data. Ensemble deep learning has exhibited significant performance in enhancing learning generalization through… More >

  • Open AccessOpen Access

    REVIEW

    A Review of Joint Extraction Techniques for Relational Triples Based on NYT and WebNLG Datasets

    Chenglong Mi1, Huaibin Qin1,*, Quan Qi1, Pengxiang Zuo2
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3773-3796, 2025, DOI:10.32604/cmc.2024.059455 - 06 March 2025
    Abstract In recent years, with the rapid development of deep learning technology, relational triplet extraction techniques have also achieved groundbreaking progress. Traditional pipeline models have certain limitations due to error propagation. To overcome the limitations of traditional pipeline models, recent research has focused on jointly modeling the two key subtasks-named entity recognition and relation extraction-within a unified framework. To support future research, this paper provides a comprehensive review of recently published studies in the field of relational triplet extraction. The review examines commonly used public datasets for relational triplet extraction techniques and systematically reviews current mainstream… More >

  • Open AccessOpen Access

    ARTICLE

    Delocalized Nonlinear Vibrational Modes in Bcc Lattice for Testing and Improving Interatomic Potentials

    Denis S. Ryabov1, Igor V. Kosarev2,3, Daxing Xiong4, Aleksey A. Kudreyko5, Sergey V. Dmitriev2,6,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3797-3820, 2025, DOI:10.32604/cmc.2025.062079 - 06 March 2025
    Abstract Molecular dynamics (MD) is a powerful method widely used in materials science and solid-state physics. The accuracy of MD simulations depends on the quality of the interatomic potentials. In this work, a special class of exact solutions to the equations of motion of atoms in a body-centered cubic (bcc) lattice is analyzed. These solutions take the form of delocalized nonlinear vibrational modes (DNVMs) and can serve as an excellent test of the accuracy of the interatomic potentials used in MD modeling for bcc crystals. The accuracy of the potentials can be checked by comparing the… More >

  • Open AccessOpen Access

    ARTICLE

    Coupling Magneto-Electro-Elastic Multiscale Finite Element Method for Transient Responses of Heterogeneous MEE Structures

    Xiaolin Li1, Xinyue Li1, Liming Zhou2,*, Hangran Yang1, Xiaoqing Yuan1
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3821-3841, 2025, DOI:10.32604/cmc.2025.059937 - 06 March 2025
    (This article belongs to the Special Issue: Multiscale and Multiphysics Computational Methods of Heterogeneous Materials and Structures)
    Abstract Magneto-electro-elastic (MEE) materials are widely utilized across various fields due to their multi-field coupling effects. Consequently, investigating the coupling behavior of MEE composite materials is of significant importance. The traditional finite element method (FEM) remains one of the primary approaches for addressing such issues. However, the application of FEM typically necessitates the use of a fine finite element mesh to accurately capture the heterogeneous properties of the materials and meet the required computational precision, which inevitably leads to a reduction in computational efficiency. To enhance the computational accuracy and efficiency of the FEM for heterogeneous… More >

  • Open AccessOpen Access

    ARTICLE

    Quantitative Assessment of Generative Large Language Models on Design Pattern Application

    Dae-Kyoo Kim*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3843-3872, 2025, DOI:10.32604/cmc.2025.062552 - 06 March 2025
    (This article belongs to the Special Issue: Emerging Multimedia Tools for Software Engineering Process Optimization)
    Abstract Design patterns offer reusable solutions for common software issues, enhancing quality. The advent of generative large language models (LLMs) marks progress in software development, but their efficacy in applying design patterns is not fully assessed. The recent introduction of generative large language models (LLMs) like ChatGPT and CoPilot has demonstrated significant promise in software development. They assist with a variety of tasks including code generation, modeling, bug fixing, and testing, leading to enhanced efficiency and productivity. Although initial uses of these LLMs have had a positive effect on software development, their potential influence on the… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Order Neighborhood Fusion Based Multi-View Deep Subspace Clustering

    Kai Zhou1, Yanan Bai2, Yongli Hu3, Boyue Wang3,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3873-3890, 2025, DOI:10.32604/cmc.2025.060918 - 06 March 2025
    Abstract Existing multi-view deep subspace clustering methods aim to learn a unified representation from multi-view data, while the learned representation is difficult to maintain the underlying structure hidden in the origin samples, especially the high-order neighbor relationship between samples. To overcome the above challenges, this paper proposes a novel multi-order neighborhood fusion based multi-view deep subspace clustering model. We creatively integrate the multi-order proximity graph structures of different views into the self-expressive layer by a multi-order neighborhood fusion module. By this design, the multi-order Laplacian matrix supervises the learning of the view-consistent self-representation affinity matrix; then, More >

  • Open AccessOpen Access

    ARTICLE

    Employing a Diversity Control Approach to Optimize Self-Organizing Particle Swarm Optimization Algorithms

    Sung-Jung Hsiao1, Wen-Tsai Sung2,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3891-3905, 2025, DOI:10.32604/cmc.2025.060056 - 06 March 2025
    Abstract For optimization algorithms, the most important consideration is their global optimization performance. Our research is conducted with the hope that the algorithm can robustly find the optimal solution to the target problem at a lower computational cost or faster speed. For stochastic optimization algorithms based on population search methods, the search speed and solution quality are always contradictory. Suppose that the random range of the group search is larger; in that case, the probability of the algorithm converging to the global optimal solution is also greater, but the search speed will inevitably slow. The smaller… More >

  • Open AccessOpen Access

    ARTICLE

    Harmonization of Heart Disease Dataset for Accurate Diagnosis: A Machine Learning Approach Enhanced by Feature Engineering

    Ruhul Amin1, Md. Jamil Khan1, Tonway Deb Nath1, Md. Shamim Reza2, Jungpil Shin3,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3907-3919, 2025, DOI:10.32604/cmc.2025.061645 - 06 March 2025
    (This article belongs to the Special Issue: Advanced Medical Imaging Techniques Using Generative Artificial Intelligence)
    Abstract Heart disease includes a multiplicity of medical conditions that affect the structure, blood vessels, and general operation of the heart. Numerous researchers have made progress in correcting and predicting early heart disease, but more remains to be accomplished. The diagnostic accuracy of many current studies is inadequate due to the attempt to predict patients with heart disease using traditional approaches. By using data fusion from several regions of the country, we intend to increase the accuracy of heart disease prediction. A statistical approach that promotes insights triggered by feature interactions to reveal the intricate pattern… More >

  • Open AccessOpen Access

    ARTICLE

    Pseudo Label Purification with Dual Contrastive Learning for Unsupervised Vehicle Re-Identification

    Jiyang Xu1, Qi Wang1,*, Xin Xiong2, Weidong Min1,3, Jiang Luo4, Di Gai1, Qing Han1,3
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3921-3941, 2025, DOI:10.32604/cmc.2024.058586 - 06 March 2025
    Abstract The unsupervised vehicle re-identification task aims at identifying specific vehicles in surveillance videos without utilizing annotation information. Due to the higher similarity in appearance between vehicles compared to pedestrians, pseudo-labels generated through clustering are ineffective in mitigating the impact of noise, and the feature distance between inter-class and intra-class has not been adequately improved. To address the aforementioned issues, we design a dual contrastive learning method based on knowledge distillation. During each iteration, we utilize a teacher model to randomly partition the entire dataset into two sub-domains based on clustering pseudo-label categories. By conducting contrastive… More >

  • Open AccessOpen Access

    ARTICLE

    A Novelty Framework in Image-Captioning with Visual Attention-Based Refined Visual Features

    Alaa Thobhani1,*, Beiji Zou1, Xiaoyan Kui1,*, Amr Abdussalam2, Muhammad Asim3, Mohammed ELAffendi3, Sajid Shah3
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3943-3964, 2025, DOI:10.32604/cmc.2025.060788 - 06 March 2025
    Abstract Image captioning, the task of generating descriptive sentences for images, has advanced significantly with the integration of semantic information. However, traditional models still rely on static visual features that do not evolve with the changing linguistic context, which can hinder the ability to form meaningful connections between the image and the generated captions. This limitation often leads to captions that are less accurate or descriptive. In this paper, we propose a novel approach to enhance image captioning by introducing dynamic interactions where visual features continuously adapt to the evolving linguistic context. Our model strengthens the… More >

  • Open AccessOpen Access

    ARTICLE

    A Latency-Efficient Integration of Channel Attention for ConvNets

    Woongkyu Park1, Yeongyu Choi2, Mahammad Shareef Mekala3, Gyu Sang Choi1, Kook-Yeol Yoo1, Ho-youl Jung1,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3965-3981, 2025, DOI:10.32604/cmc.2025.059966 - 06 March 2025
    Abstract Designing fast and accurate neural networks is becoming essential in various vision tasks. Recently, the use of attention mechanisms has increased, aimed at enhancing the vision task performance by selectively focusing on relevant parts of the input. In this paper, we concentrate on squeeze-and-excitation (SE)-based channel attention, considering the trade-off between latency and accuracy. We propose a variation of the SE module, called squeeze-and-excitation with layer normalization (SELN), in which layer normalization (LN) replaces the sigmoid activation function. This approach reduces the vanishing gradient problem while enhancing feature diversity and discriminability of channel attention. In… More >

  • Open AccessOpen Access

    ARTICLE

    A Blockchain Cross-Chain Transaction Protection Scheme Based on FHE

    Hongliang Tian, Zuoqing Li*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3983-4002, 2025, DOI:10.32604/cmc.2025.059103 - 06 March 2025
    Abstract Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes. To address these issues, a blockchain cross-chain transaction protection scheme based on Fully Homomorphic Encryption (FHE) is proposed. In the proposed scheme, the functional relationship is established by Box-Muller, Discrete Gaussian Distribution Function (DGDF) and Uniform Random Distribution Function (URDF) are used to improve the security and efficiency of key generation. Subsequently, the data preprocessing function is introduced to perform cleaning, deduplication, and normalization operations on the transaction data of multi-key signature, and it is classified into… More >

  • Open AccessOpen Access

    ARTICLE

    AdaptForever: Elastic and Mutual Learning for Continuous NLP Task Mastery

    Ke Chen1,2, Cheng Peng1,2, Xinyang He1,2, Jiakang Sun1,2, Xu Liu1,2, Xiaolin Qin1,2,*, Yong Zhong1,2,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4003-4019, 2025, DOI:10.32604/cmc.2025.057443 - 06 March 2025
    (This article belongs to the Special Issue: Advancements in Natural Language Processing (NLP) and Fuzzy Logic)
    Abstract In natural language processing (NLP), managing multiple downstream tasks through fine-tuning pre-trained models often requires maintaining separate task-specific models, leading to practical inefficiencies. To address this challenge, we introduce AdaptForever, a novel approach that enables continuous mastery of NLP tasks through the integration of elastic and mutual learning strategies with a stochastic expert mechanism. Our method freezes the pre-trained model weights while incorporating adapters enhanced with mutual learning capabilities, facilitating effective knowledge transfer from previous tasks to new ones. By combining Elastic Weight Consolidation (EWC) for knowledge preservation with specialized regularization terms, AdaptForever successfully maintains More >

  • Open AccessOpen Access

    ARTICLE

    GENOME: Genetic Encoding for Novel Optimization of Malware Detection and Classification in Edge Computing

    Sang-Hoon Choi1, Ki-Woong Park2,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4021-4039, 2025, DOI:10.32604/cmc.2025.061267 - 06 March 2025
    (This article belongs to the Special Issue: Practical Application and Services in Fog/Edge Computing System)
    Abstract The proliferation of Internet of Things (IoT) devices has established edge computing as a critical paradigm for real-time data analysis and low-latency processing. Nevertheless, the distributed nature of edge computing presents substantial security challenges, rendering it a prominent target for sophisticated malware attacks. Existing signature-based and behavior-based detection methods are ineffective against the swiftly evolving nature of malware threats and are constrained by the availability of resources. This paper suggests the Genetic Encoding for Novel Optimization of Malware Evaluation (GENOME) framework, a novel solution that is intended to improve the performance of malware detection and… More >

  • Open AccessOpen Access

    ARTICLE

    An Improved Hybrid Deep Learning Approach for Security Requirements Classification

    Shoaib Hassan1,*, Qianmu Li1,*, Muhammad Zubair2, Rakan A. Alsowail3, Muhammad Umair2
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4041-4067, 2025, DOI:10.32604/cmc.2025.059832 - 06 March 2025
    Abstract As the trend to use the latest machine learning models to automate requirements engineering processes continues, security requirements classification is tuning into the most researched field in the software engineering community. Previous literature studies have proposed numerous models for the classification of security requirements. However, adopting those models is constrained due to the lack of essential datasets permitting the repetition and generalization of studies employing more advanced machine learning algorithms. Moreover, most of the researchers focus only on the classification of requirements with security keywords. They did not consider other nonfunctional requirements (NFR) directly or… More >

  • Open AccessOpen Access

    ARTICLE

    LLE-Fuse: Lightweight Infrared and Visible Light Image Fusion Based on Low-Light Image Enhancement

    Song Qian, Guzailinuer Yiming, Ping Li, Junfei Yang, Yan Xue, Shuping Zhang*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4069-4091, 2025, DOI:10.32604/cmc.2025.059931 - 06 March 2025
    Abstract Infrared and visible light image fusion technology integrates feature information from two different modalities into a fused image to obtain more comprehensive information. However, in low-light scenarios, the illumination degradation of visible light images makes it difficult for existing fusion methods to extract texture detail information from the scene. At this time, relying solely on the target saliency information provided by infrared images is far from sufficient. To address this challenge, this paper proposes a lightweight infrared and visible light image fusion method based on low-light enhancement, named LLE-Fuse. The method is based on the… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Convolution Neural Networks for Image-Based Android Malware Classification

    Amel Ksibi1,*, Mohammed Zakariah2, Latifah Almuqren1, Ala Saleh Alluhaidan1
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4093-4116, 2025, DOI:10.32604/cmc.2025.059615 - 06 March 2025
    Abstract The analysis of Android malware shows that this threat is constantly increasing and is a real threat to mobile devices since traditional approaches, such as signature-based detection, are no longer effective due to the continuously advancing level of sophistication. To resolve this problem, efficient and flexible malware detection tools are needed. This work examines the possibility of employing deep CNNs to detect Android malware by transforming network traffic into image data representations. Moreover, the dataset used in this study is the CIC-AndMal2017, which contains 20,000 instances of network traffic across five distinct malware categories: a.… More >

  • Open AccessOpen Access

    ARTICLE

    Learning Temporal User Features for Repost Prediction with Large Language Models

    Wu-Jiu Sun1, Xiao Fan Liu1,2,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4117-4136, 2025, DOI:10.32604/cmc.2025.059528 - 06 March 2025
    Abstract Predicting information dissemination on social media, specifically users’ reposting behavior, is crucial for applications such as advertising campaigns. Conventional methods use deep neural networks to make predictions based on features related to user topic interests and social preferences. However, these models frequently fail to account for the difficulties arising from limited training data and model size, which restrict their capacity to learn and capture the intricate patterns within microblogging data. To overcome this limitation, we introduce a novel model Adapt pre-trained Large Language model for Reposting Prediction (ALL-RP), which incorporates two key steps: (1)… More >

  • Open AccessOpen Access

    ARTICLE

    Digital Twin-Driven Modeling and Application of High-Temperature Biaxial Materials Testing Apparatus

    Xiyu Gao, Peng Liu, Anran Zhao, Guotai Huang, Jianhai Zhang, Liming Zhou*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4137-4159, 2025, DOI:10.32604/cmc.2025.060194 - 06 March 2025
    Abstract The High-Temperature Biaxial Testing Apparatus (HTBTA) is a critical tool for studying the damage and failure mechanisms of heat-resistant composite materials under extreme conditions. However, existing methods for managing and monitoring such apparatus face challenges, including limited real-time modeling capabilities, inadequate integration of multi-source data, and inefficiencies in human-machine interaction. To address these gaps, this study proposes a novel digital twin-driven framework for HTBTA, encompassing the design, validation, operation, and maintenance phases. By integrating advanced modeling techniques, such as finite element analysis and Long Short-Term Memory (LSTM) networks, the digital twin enables high-fidelity simulation, real-time… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Dynamic Residual Self-Attention Transfer Adaptive Learning Fusion Approach for Brain Tumor Diagnosis

    Tawfeeq Shawly1, Ahmed A. Alsheikhy2,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4161-4179, 2025, DOI:10.32604/cmc.2025.061497 - 06 March 2025
    (This article belongs to the Special Issue: Advancements in Machine Learning and Artificial Intelligence for Pattern Detection and Predictive Analytics in Healthcare)
    Abstract A healthy brain is vital to every person since the brain controls every movement and emotion. Sometimes, some brain cells grow unexpectedly to be uncontrollable and cancerous. These cancerous cells are called brain tumors. For diagnosed patients, their lives depend mainly on the early diagnosis of these tumors to provide suitable treatment plans. Nowadays, Physicians and radiologists rely on Magnetic Resonance Imaging (MRI) pictures for their clinical evaluations of brain tumors. These evaluations are time-consuming, expensive, and require expertise with high skills to provide an accurate diagnosis. Scholars and industrials have recently partnered to implement… More >

  • Open AccessOpen Access

    ARTICLE

    A Barrier-Based Machine Learning Approach for Intrusion Detection in Wireless Sensor Networks

    Haydar Abdulameer Marhoon1,2,*, Rafid Sagban3,4, Atheer Y. Oudah1,5, Saadaldeen Rashid Ahmed6,7
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4181-4218, 2025, DOI:10.32604/cmc.2025.058822 - 06 March 2025
    (This article belongs to the Special Issue: Fortifying the Foundations: IoT Intrusion Detection Systems in Cloud-Edge-End Architecture)
    Abstract In order to address the critical security challenges inherent to Wireless Sensor Networks (WSNs), this paper presents a groundbreaking barrier-based machine learning technique. Vital applications like military operations, healthcare monitoring, and environmental surveillance increasingly deploy WSNs, recognizing the critical importance of effective intrusion detection in protecting sensitive data and maintaining operational integrity. The proposed method innovatively partitions the network into logical segments or virtual barriers, allowing for targeted monitoring and data collection that aligns with specific traffic patterns. This approach not only improves the diversit. There are more types of data in the training set,… More >

  • Open AccessOpen Access

    ARTICLE

    Heuristic Feature Engineering for Enhancing Neural Network Performance in Spatiotemporal Traffic Prediction

    Bin Sun1, Yinuo Wang1, Tao Shen1,*, Lu Zhang1, Renkang Geng2
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4219-4236, 2025, DOI:10.32604/cmc.2025.060567 - 06 March 2025
    Abstract Traffic datasets exhibit complex spatiotemporal characteristics, including significant fluctuations in traffic volume and intricate periodical patterns, which pose substantial challenges for the accurate forecasting and effective management of traffic conditions. Traditional forecasting models often struggle to adequately capture these complexities, leading to suboptimal predictive performance. While neural networks excel at modeling intricate and nonlinear data structures, they are also highly susceptible to overfitting, resulting in inefficient use of computational resources and decreased model generalization. This paper introduces a novel heuristic feature extraction method that synergistically combines the strengths of non-neural network algorithms with neural networks… More >

  • Open AccessOpen Access

    ARTICLE

    Improving Robustness for Tag Recommendation via Self-Paced Adversarial Metric Learning

    Zhengshun Fei1,*, Jianxin Chen1, Gui Chen2, Xinjian Xiang1,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4237-4261, 2025, DOI:10.32604/cmc.2025.059262 - 06 March 2025
    Abstract Tag recommendation systems can significantly improve the accuracy of information retrieval by recommending relevant tag sets that align with user preferences and resource characteristics. However, metric learning methods often suffer from high sensitivity, leading to unstable recommendation results when facing adversarial samples generated through malicious user behavior. Adversarial training is considered to be an effective method for improving the robustness of tag recommendation systems and addressing adversarial samples. However, it still faces the challenge of overfitting. Although curriculum learning-based adversarial training somewhat mitigates this issue, challenges still exist, such as the lack of a quantitative… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Malware Detection Resilience: A U-Net GAN Denoising Framework for Image-Based Classification

    Huiyao Dong1, Igor Kotenko2,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4263-4285, 2025, DOI:10.32604/cmc.2025.062439 - 06 March 2025
    (This article belongs to the Special Issue: Securing the Future: Innovations and Challenges in Next-Generation Network Security)
    Abstract The growing complexity of cyber threats requires innovative machine learning techniques, and image-based malware classification opens up new possibilities. Meanwhile, existing research has largely overlooked the impact of noise and obfuscation techniques commonly employed by malware authors to evade detection, and there is a critical gap in using noise simulation as a means of replicating real-world malware obfuscation techniques and adopting denoising framework to counteract these challenges. This study introduces an image denoising technique based on a U-Net combined with a GAN framework to address noise interference and obfuscation challenges in image-based malware analysis. The… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Parameterization for Knowledge Graph Embedding Using Hierarchical Attention Network

    Zhen-Yu Chen1, Feng-Chi Liu2, Xin Wang3, Cheng-Hsiung Lee1, Ching-Sheng Lin1,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4287-4300, 2025, DOI:10.32604/cmc.2025.061661 - 06 March 2025
    Abstract In the domain of knowledge graph embedding, conventional approaches typically transform entities and relations into continuous vector spaces. However, parameter efficiency becomes increasingly crucial when dealing with large-scale knowledge graphs that contain vast numbers of entities and relations. In particular, resource-intensive embeddings often lead to increased computational costs, and may limit scalability and adaptability in practical environments, such as in low-resource settings or real-world applications. This paper explores an approach to knowledge graph representation learning that leverages small, reserved entities and relation sets for parameter-efficient embedding. We introduce a hierarchical attention network designed to refine More >

  • Open AccessOpen Access

    ARTICLE

    LT-YOLO: A Lightweight Network for Detecting Tomato Leaf Diseases

    Zhenyang He, Mengjun Tong*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4301-4317, 2025, DOI:10.32604/cmc.2025.060550 - 06 March 2025
    Abstract Tomato plant diseases often first manifest on the leaves, making the detection of tomato leaf diseases particularly crucial for the tomato cultivation industry. However, conventional deep learning models face challenges such as large model sizes and slow detection speeds when deployed on resource-constrained platforms and agricultural machinery. This paper proposes a lightweight model for detecting tomato leaf diseases, named LT-YOLO, based on the YOLOv8n architecture. First, we enhance the C2f module into a RepViT Block (RVB) with decoupled token and channel mixers to reduce the cost of feature extraction. Next, we incorporate a novel Efficient… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Spatiotemporal Information Utilization for Video Camouflaged Object Detection

    Dongdong Zhang, Chunping Wang, Huiying Wang, Qiang Fu*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4319-4338, 2025, DOI:10.32604/cmc.2025.060653 - 06 March 2025
    Abstract Video camouflaged object detection (VCOD) has become a fundamental task in computer vision that has attracted significant attention in recent years. Unlike image camouflaged object detection (ICOD), VCOD not only requires spatial cues but also needs motion cues. Thus, effectively utilizing spatiotemporal information is crucial for generating accurate segmentation results. Current VCOD methods, which typically focus on exploring motion representation, often ineffectively integrate spatial and motion features, leading to poor performance in diverse scenarios. To address these issues, we design a novel spatiotemporal network with an encoder-decoder structure. During the encoding stage, an adjacent space-time More >

  • Open AccessOpen Access

    ARTICLE

    Smart Grid Security Framework for Data Transmissions with Adaptive Practices Using Machine Learning Algorithm

    Shitharth Selvarajan1,2,3,*, Hariprasath Manoharan4, Taher Al-Shehari5, Hussain Alsalman6, Taha Alfakih7
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4339-4369, 2025, DOI:10.32604/cmc.2025.056100 - 06 March 2025
    (This article belongs to the Special Issue: Best Practices for Smart Grid SCADA Security Systems Using Artificial Intelligence (AI) Models)
    Abstract This research presents an analysis of smart grid units to enhance connected units’ security during data transmissions. The major advantage of the proposed method is that the system model encompasses multiple aspects such as network flow monitoring, data expansion, control association, throughput, and losses. In addition, all the above-mentioned aspects are carried out with neural networks and adaptive optimizations to enhance the operation of smart grid networks. Moreover, the quantitative analysis of the optimization algorithm is discussed concerning two case studies, thereby achieving early convergence at reduced complexities. The suggested method ensures that each communication More >

  • Open AccessOpen Access

    ARTICLE

    MSCM-Net: Rail Surface Defect Detection Based on a Multi-Scale Cross-Modal Network

    Xin Wen*, Xiao Zheng, Yu He
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4371-4388, 2025, DOI:10.32604/cmc.2025.060661 - 06 March 2025
    (This article belongs to the Special Issue: Machine Vision Detection and Intelligent Recognition, 2nd Edition)
    Abstract Detecting surface defects on unused rails is crucial for evaluating rail quality and durability to ensure the safety of rail transportation. However, existing detection methods often struggle with challenges such as complex defect morphology, texture similarity, and fuzzy edges, leading to poor accuracy and missed detections. In order to resolve these problems, we propose MSCM-Net (Multi-Scale Cross-Modal Network), a multiscale cross-modal framework focused on detecting rail surface defects. MSCM-Net introduces an attention mechanism to dynamically weight the fusion of RGB and depth maps, effectively capturing and enhancing features at different scales for each modality. To… More >

  • Open AccessOpen Access

    ARTICLE

    Diff-IDS: A Network Intrusion Detection Model Based on Diffusion Model for Imbalanced Data Samples

    Yue Yang1,2, Xiangyan Tang2,3,*, Zhaowu Liu2,3,*, Jieren Cheng2,3, Haozhe Fang3, Cunyi Zhang3
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4389-4408, 2025, DOI:10.32604/cmc.2025.060357 - 06 March 2025
    Abstract With the rapid development of Internet of Things technology, the sharp increase in network devices and their inherent security vulnerabilities present a stark contrast, bringing unprecedented challenges to the field of network security, especially in identifying malicious attacks. However, due to the uneven distribution of network traffic data, particularly the imbalance between attack traffic and normal traffic, as well as the imbalance between minority class attacks and majority class attacks, traditional machine learning detection algorithms have significant limitations when dealing with sparse network traffic data. To effectively tackle this challenge, we have designed a lightweight… More >

  • Open AccessOpen Access

    ARTICLE

    Utilizing Fine-Tuning of Large Language Models for Generating Synthetic Payloads: Enhancing Web Application Cybersecurity through Innovative Penetration Testing Techniques

    Stefan Ćirković1, Vladimir Mladenović1, Siniša Tomić2, Dalibor Drljača2, Olga Ristić1,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4409-4430, 2025, DOI:10.32604/cmc.2025.059696 - 06 March 2025
    (This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
    Abstract With the increasing use of web applications, challenges in the field of cybersecurity are becoming more complex. This paper explores the application of fine-tuned large language models (LLMs) for the automatic generation of synthetic attacks, including XSS (Cross-Site Scripting), SQL Injections, and Command Injections. A web application has been developed that allows penetration testers to quickly generate high-quality payloads without the need for in-depth knowledge of artificial intelligence. The fine-tuned language model demonstrates the capability to produce synthetic payloads that closely resemble real-world attacks. This approach not only improves the model’s precision and dependability but… More >

  • Open AccessOpen Access

    ARTICLE

    MARCS: A Mobile Crowdsensing Framework Based on Data Shapley Value Enabled Multi-Agent Deep Reinforcement Learning

    Yiqin Wang1, Yufeng Wang1,*, Jianhua Ma2, Qun Jin3
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4431-4449, 2025, DOI:10.32604/cmc.2025.059880 - 06 March 2025
    Abstract Opportunistic mobile crowdsensing (MCS) non-intrusively exploits human mobility trajectories, and the participants’ smart devices as sensors have become promising paradigms for various urban data acquisition tasks. However, in practice, opportunistic MCS has several challenges from both the perspectives of MCS participants and the data platform. On the one hand, participants face uncertainties in conducting MCS tasks, including their mobility and implicit interactions among participants, and participants’ economic returns given by the MCS data platform are determined by not only their own actions but also other participants’ strategic actions. On the other hand, the platform can… More >

  • Open AccessOpen Access

    ARTICLE

    Semi-Supervised Medical Image Classification Based on Sample Intrinsic Similarity Using Canonical Correlation Analysis

    Kun Liu1, Chen Bao1,*, Sidong Liu2
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4451-4468, 2025, DOI:10.32604/cmc.2024.059053 - 06 March 2025
    (This article belongs to the Special Issue: Novel Methods for Image Classification, Object Detection, and Segmentation)
    Abstract Large amounts of labeled data are usually needed for training deep neural networks in medical image studies, particularly in medical image classification. However, in the field of semi-supervised medical image analysis, labeled data is very scarce due to patient privacy concerns. For researchers, obtaining high-quality labeled images is exceedingly challenging because it involves manual annotation and clinical understanding. In addition, skin datasets are highly suitable for medical image classification studies due to the inter-class relationships and the inter-class similarities of skin lesions. In this paper, we propose a model called Coalition Sample Relation Consistency (CSRC),… More >

  • Open AccessOpen Access

    ARTICLE

    FractalNet-LSTM Model for Time Series Forecasting

    Nataliya Shakhovska, Volodymyr Shymanskyi*, Maksym Prymachenko
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4469-4484, 2025, DOI:10.32604/cmc.2025.062675 - 06 March 2025
    Abstract Time series forecasting is important in the fields of finance, energy, and meteorology, but traditional methods often fail to cope with the complex nonlinear and nonstationary processes of real data. In this paper, we propose the FractalNet-LSTM model, which combines fractal convolutional units with recurrent long short-term memory (LSTM) layers to model time series efficiently. To test the effectiveness of the model, data with complex structures and patterns, in particular, with seasonal and cyclical effects, were used. To better demonstrate the obtained results and the formed conclusions, the model performance was shown on the datasets More >

  • Open AccessOpen Access

    ARTICLE

    An Advanced Bald Eagle Search Algorithm for Image Enhancement

    Pei Hu1, Yibo Han1, Jeng-Shyang Pan2,3,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4485-4501, 2025, DOI:10.32604/cmc.2024.059773 - 06 March 2025
    Abstract Image enhancement utilizes intensity transformation functions to maximize the information content of enhanced images. This paper approaches the topic as an optimization problem and uses the bald eagle search (BES) algorithm to achieve optimal results. In our proposed model, gamma correction and Retinex address color cast issues and enhance image edges and details. The final enhanced image is obtained through color balancing. The BES algorithm seeks the optimal solution through the selection, search, and swooping stages. However, it is prone to getting stuck in local optima and converges slowly. To overcome these limitations, we propose… More >

  • Open AccessOpen Access

    ARTICLE

    Harnessing Trend Theory to Enhance Distributed Proximal Point Algorithm Approaches for Multi-Area Economic Dispatch Optimization

    Yaming Ren1,*, Xing Deng2
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4503-4533, 2025, DOI:10.32604/cmc.2024.059864 - 06 March 2025
    Abstract The exponential growth in the scale of power systems has led to a significant increase in the complexity of dispatch problem resolution, particularly within multi-area interconnected power grids. This complexity necessitates the employment of distributed solution methodologies, which are not only essential but also highly desirable. In the realm of computational modelling, the multi-area economic dispatch problem (MAED) can be formulated as a linearly constrained separable convex optimization problem. The proximal point algorithm (PPA) is particularly adept at addressing such mathematical constructs effectively. This study introduces parallel (PPPA) and serial (SPPA) variants of the PPA… More >

  • Open AccessOpen Access

    ARTICLE

    An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment

    Tarak Dhaouadi1, Hichem Mrabet1,2,*, Adeeb Alhomoud3, Abderrazak Jemai1,4
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4535-4554, 2025, DOI:10.32604/cmc.2025.060935 - 06 March 2025
    (This article belongs to the Special Issue: Exploring Recent Trends and Advances in Sensors Cybersecurity)
    Abstract The increasing adoption of Industrial Internet of Things (IIoT) systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems (IDS) to be effective. However, existing datasets for IDS training often lack relevance to modern IIoT environments, limiting their applicability for research and development. To address the latter gap, this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems. As a consequence, that can be used by an IDS to detect imminent threats. Likewise, HiTar-2024 was generated using the AREZZO simulator, which replicates realistic smart manufacturing scenarios.… More >

  • Open AccessOpen Access

    ARTICLE

    YOLO-S3DT: A Small Target Detection Model for UAV Images Based on YOLOv8

    Pengcheng Gao*, Zhenjiang Li
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4555-4572, 2025, DOI:10.32604/cmc.2025.060873 - 06 March 2025
    (This article belongs to the Special Issue: Intelligent Soft Computing Techniques for Enhancing Wireless Networks with Unmanned Aerial Vehicles)
    Abstract The application of deep learning for target detection in aerial images captured by Unmanned Aerial Vehicles (UAV) has emerged as a prominent research focus. Due to the considerable distance between UAVs and the photographed objects, coupled with complex shooting environments, existing models often struggle to achieve accurate real-time target detection. In this paper, a You Only Look Once v8 (YOLOv8) model is modified from four aspects: the detection head, the up-sampling module, the feature extraction module, and the parameter optimization of positive sample screening, and the YOLO-S3DT model is proposed to improve the performance of More >

  • Open AccessOpen Access

    ARTICLE

    A Base Station Deployment Algorithm for Wireless Positioning Considering Dynamic Obstacles

    Aiguo Li1, Yunfei Jia2,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4573-4591, 2025, DOI:10.32604/cmc.2025.059184 - 06 March 2025
    (This article belongs to the Special Issue: From Nodes to Knowledge: Harnessing Wireless Sensor Networks)
    Abstract In the context of security systems, adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of personnel. Most studies focus on optimizing base station deployment under the assumption of static obstacles, aiming to maximize the perception coverage of wireless RF (Radio Frequency) signals and reduce positioning blind spots. However, in practical security systems, obstacles are subject to change, necessitating the consideration of base station deployment in dynamic environments. Nevertheless, research in this area still needs to be conducted. This paper proposes a Dynamic Indoor Environment Beacon Deployment Algorithm (DIE-BDA)… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Memory-Enhanced Autoencoder with Adversarial Training for Anomaly Detection in Virtual Power Plants

    Yuqiao Liu1, Chen Pan1, YeonJae Oh2,*, Chang Gyoon Lim1,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4593-4629, 2025, DOI:10.32604/cmc.2025.061196 - 06 March 2025
    Abstract Virtual Power Plants (VPPs) are integral to modern energy systems, providing stability and reliability in the face of the inherent complexities and fluctuations of solar power data. Traditional anomaly detection methodologies often need to adequately handle these fluctuations from solar radiation and ambient temperature variations. We introduce the Memory-Enhanced Autoencoder with Adversarial Training (MemAAE) model to overcome these limitations, designed explicitly for robust anomaly detection in VPP environments. The MemAAE model integrates three principal components: an LSTM-based autoencoder that effectively captures temporal dynamics to distinguish between normal and anomalous behaviors, an adversarial training module that… More >

  • Open AccessOpen Access

    ARTICLE

    A Weakly Supervised Semantic Segmentation Method Based on Improved Conformer

    Xueli Shen, Meng Wang*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4631-4647, 2025, DOI:10.32604/cmc.2025.059149 - 06 March 2025
    (This article belongs to the Special Issue: Novel Methods for Image Classification, Object Detection, and Segmentation)
    Abstract In the field of Weakly Supervised Semantic Segmentation (WSSS), methods based on image-level annotation face challenges in accurately capturing objects of varying sizes, lacking sensitivity to image details, and having high computational costs. To address these issues, we improve the dual-branch architecture of the Conformer as the fundamental network for generating class activation graphs, proposing a multi-scale efficient weakly-supervised semantic segmentation method based on the improved Conformer. In the Convolution Neural Network (CNN) branch, a cross-scale feature integration convolution module is designed, incorporating multi-receptive field convolution layers to enhance the model’s ability to capture long-range… More >

  • Open AccessOpen Access

    ARTICLE

    Federated Learning and Optimization for Few-Shot Image Classification

    Yi Zuo, Zhenping Chen*, Jing Feng, Yunhao Fan
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4649-4667, 2025, DOI:10.32604/cmc.2025.059472 - 06 March 2025
    Abstract Image classification is crucial for various applications, including digital construction, smart manufacturing, and medical imaging. Focusing on the inadequate model generalization and data privacy concerns in few-shot image classification, in this paper, we propose a federated learning approach that incorporates privacy-preserving techniques. First, we utilize contrastive learning to train on local few-shot image data and apply various data augmentation methods to expand the sample size, thereby enhancing the model’s generalization capabilities in few-shot contexts. Second, we introduce local differential privacy techniques and weight pruning methods to safeguard model parameters, perturbing the transmitted parameters to ensure More >

  • Open AccessOpen Access

    ARTICLE

    Local Content-Aware Enhancement for Low-Light Images with Non-Uniform Illumination

    Qi Mu*, Yuanjie Guo, Xiangfu Ge, Xinyue Wang, Zhanli Li
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4669-4690, 2025, DOI:10.32604/cmc.2025.058495 - 06 March 2025
    (This article belongs to the Special Issue: New Trends in Image Processing)
    Abstract In low-light image enhancement, prevailing Retinex-based methods often struggle with precise illumination estimation and brightness modulation. This can result in issues such as halo artifacts, blurred edges, and diminished details in bright regions, particularly under non-uniform illumination conditions. We propose an innovative approach that refines low-light images by leveraging an in-depth awareness of local content within the image. By introducing multi-scale effective guided filtering, our method surpasses the limitations of traditional isotropic filters, such as Gaussian filters, in handling non-uniform illumination. It dynamically adjusts regularization parameters in response to local image characteristics and significantly integrates… More >

  • Open AccessOpen Access

    ARTICLE

    Robust Image Forgery Localization Using Hybrid CNN-Transformer Synergy Based Framework

    Sachin Sharma1,2,*, Brajesh Kumar Singh3, Hitendra Garg2
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4691-4708, 2025, DOI:10.32604/cmc.2025.061252 - 06 March 2025
    Abstract Image tampering detection and localization have emerged as a critical domain in combating the pervasive issue of image manipulation due to the advancement of the large-scale availability of sophisticated image editing tools. The manual forgery localization is often reliant on forensic expertise. In recent times, machine learning (ML) and deep learning (DL) have shown promising results in automating image forgery localization. However, the ML-based method relies on hand-crafted features. Conversely, the DL method automatically extracts shallow spatial features to enhance the accuracy. However, DL-based methods lack the global co-relation of the features due to this… More >

  • Open AccessOpen Access

    ARTICLE

    Improved Cyclic System Based Optimization Algorithm (ICSBO)

    Yanjiao Wang, Zewei Nan*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4709-4740, 2025, DOI:10.32604/cmc.2025.058894 - 06 March 2025
    (This article belongs to the Special Issue: Metaheuristic-Driven Optimization Algorithms: Methods and Applications)
    Abstract Cyclic-system-based optimization (CSBO) is an innovative metaheuristic algorithm (MHA) that draws inspiration from the workings of the human blood circulatory system. However, CSBO still faces challenges in solving complex optimization problems, including limited convergence speed and a propensity to get trapped in local optima. To improve the performance of CSBO further, this paper proposes improved cyclic-system-based optimization (ICSBO). First, in venous blood circulation, an adaptive parameter that changes with evolution is introduced to improve the balance between convergence and diversity in this stage and enhance the exploration of search space. Second, the simplex method strategy… More >

  • Open AccessOpen Access

    ARTICLE

    From Detection to Explanation: Integrating Temporal and Spatial Features for Rumor Detection and Explaining Results Using LLMs

    Nanjiang Zhong*, Xinchen Jiang, Yuan Yao
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4741-4757, 2025, DOI:10.32604/cmc.2025.059536 - 06 March 2025
    (This article belongs to the Special Issue: The Latest Deep Learning Architectures for Artificial Intelligence Applications)
    Abstract The proliferation of rumors on social media has caused serious harm to society. Although previous research has attempted to use deep learning methods for rumor detection, they did not simultaneously consider the two key features of temporal and spatial domains. More importantly, these methods struggle to automatically generate convincing explanations for the detection results, which is crucial for preventing the further spread of rumors. To address these limitations, this paper proposes a novel method that integrates both temporal and spatial features while leveraging Large Language Models (LLMs) to automatically generate explanations for the detection results.… More >

  • Open AccessOpen Access

    ARTICLE

    Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier

    Yawar Abbas1, Aisha Ahmed Alarfaj2, Ebtisam Abdullah Alabdulqader3, Asaad Algarni4, Ahmad Jalal1,5, Hui Liu6,*
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4759-4776, 2025, DOI:10.32604/cmc.2025.059224 - 06 March 2025
    (This article belongs to the Special Issue: New Trends in Image Processing)
    Abstract Human Activity Recognition (HAR) in drone-captured videos has become popular because of the interest in various fields such as video surveillance, sports analysis, and human-robot interaction. However, recognizing actions from such videos poses the following challenges: variations of human motion, the complexity of backdrops, motion blurs, occlusions, and restricted camera angles. This research presents a human activity recognition system to address these challenges by working with drones’ red-green-blue (RGB) videos. The first step in the proposed system involves partitioning videos into frames and then using bilateral filtering to improve the quality of object foregrounds while… More >

  • Open AccessOpen Access

    ARTICLE

    Differential Privacy Federated Learning Based on Adaptive Adjustment

    Yanjin Cheng1,2, Wenmin Li1,2,*, Sujuan Qin1,2, Tengfei Tu1,2
    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4777-4795, 2025, DOI:10.32604/cmc.2025.060380 - 06 March 2025
    Abstract Federated learning effectively alleviates privacy and security issues raised by the development of artificial intelligence through a distributed training architecture. Existing research has shown that attackers can compromise user privacy and security by stealing model parameters. Therefore, differential privacy is applied in federated learning to further address malicious issues. However, the addition of noise and the update clipping mechanism in differential privacy jointly limit the further development of federated learning in privacy protection and performance optimization. Therefore, we propose an adaptive adjusted differential privacy federated learning method. First, a dynamic adaptive privacy budget allocation strategy… More >

Per Page:

Share Link