Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (165)
  • Open Access

    ARTICLE

    Special Vehicle Target Detection and Tracking Based on Virtual Simulation Environment and YOLOv5-Block+DeepSort Algorithm

    Mingyuan Zhai1,2, Hanquan Zhang1, Le Wang1, Dong Xiao1,*, Zhengmin Gu3, Zhenni Li1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3241-3260, 2024, DOI:10.32604/cmc.2024.056241 - 18 November 2024

    Abstract In the process of dense vehicles traveling fast, there will be mutual occlusion between vehicles, which will lead to the problem of deterioration of the tracking effect of different vehicles, so this paper proposes a research method of virtual simulation video vehicle target tracking based on you only look once (YOLO)v5s and deep simple online and realtime tracking (DeepSort). Given that the DeepSort algorithm is currently the most effective tracking method, this paper merges the YOLOv5 algorithm with the DeepSort algorithm. Then it adds the efficient channel attention networks (ECA-Net) focusing mechanism at the back… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Architecture for Superior IoT Threat Detection through Real IoT Environments

    Bassam Mohammad Elzaghmouri1, Yosef Hasan Fayez Jbara2, Said Elaiwat3, Nisreen Innab4,*, Ahmed Abdelgader Fadol Osman5, Mohammed Awad Mohammed Ataelfadiel5, Farah H. Zawaideh6, Mouiad Fadeil Alawneh7, Asef Al-Khateeb8, Marwan Abu-Zanona8

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2299-2316, 2024, DOI:10.32604/cmc.2024.054836 - 18 November 2024

    Abstract As the Internet of Things (IoT) continues to expand, incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats, necessitating robust defense mechanisms. This paper presents an innovative hybrid deep learning architecture that excels at detecting IoT threats in real-world settings. Our proposed model combines Convolutional Neural Networks (CNN), Bidirectional Long Short-Term Memory (BLSTM), Gated Recurrent Units (GRU), and Attention mechanisms into a cohesive framework. This integrated structure aims to enhance the detection and classification of complex cyber threats while accommodating the operational constraints of diverse IoT systems.… More >

  • Open Access

    ARTICLE

    Efficient User Identity Linkage Based on Aligned Multimodal Features and Temporal Correlation

    Jiaqi Gao1, Kangfeng Zheng1,*, Xiujuan Wang2, Chunhua Wu1, Bin Wu2

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 251-270, 2024, DOI:10.32604/cmc.2024.055560 - 15 October 2024

    Abstract User identity linkage (UIL) refers to identifying user accounts belonging to the same identity across different social media platforms. Most of the current research is based on text analysis, which fails to fully explore the rich image resources generated by users, and the existing attempts touch on the multimodal domain, but still face the challenge of semantic differences between text and images. Given this, we investigate the UIL task across different social media platforms based on multimodal user-generated contents (UGCs). We innovatively introduce the efficient user identity linkage via aligned multi-modal features and temporal correlation… More >

  • Open Access

    ARTICLE

    APSO-CNN-SE: An Adaptive Convolutional Neural Network Approach for IoT Intrusion Detection

    Yunfei Ban, Damin Zhang*, Qing He, Qianwen Shen

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 567-601, 2024, DOI:10.32604/cmc.2024.055007 - 15 October 2024

    Abstract The surge in connected devices and massive data aggregation has expanded the scale of the Internet of Things (IoT) networks. The proliferation of unknown attacks and related risks, such as zero-day attacks and Distributed Denial of Service (DDoS) attacks triggered by botnets, have resulted in information leakage and property damage. Therefore, developing an efficient and realistic intrusion detection system (IDS) is critical for ensuring IoT network security. In recent years, traditional machine learning techniques have struggled to learn the complex associations between multidimensional features in network traffic, and the excellent performance of deep learning techniques,… More >

  • Open Access

    ARTICLE

    Self-Attention Spatio-Temporal Deep Collaborative Network for Robust FDIA Detection in Smart Grids

    Tong Zu, Fengyong Li*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1395-1417, 2024, DOI:10.32604/cmes.2024.055442 - 27 September 2024

    Abstract False data injection attack (FDIA) can affect the state estimation of the power grid by tampering with the measured value of the power grid data, and then destroying the stable operation of the smart grid. Existing work usually trains a detection model by fusing the data-driven features from diverse power data streams. Data-driven features, however, cannot effectively capture the differences between noisy data and attack samples. As a result, slight noise disturbances in the power grid may cause a large number of false detections for FDIA attacks. To address this problem, this paper designs a… More >

  • Open Access

    ARTICLE

    Enhancing Unsupervised Domain Adaptation for Person Re-Identification with the Minimal Transfer Cost Framework

    Sheng Xu1, Shixiong Xiang2, Feiyu Meng1, Qiang Wu1,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4197-4218, 2024, DOI:10.32604/cmc.2024.055157 - 12 September 2024

    Abstract In Unsupervised Domain Adaptation (UDA) for person re-identification (re-ID), the primary challenge is reducing the distribution discrepancy between the source and target domains. This can be achieved by implicitly or explicitly constructing an appropriate intermediate domain to enhance recognition capability on the target domain. Implicit construction is difficult due to the absence of intermediate state supervision, making smooth knowledge transfer from the source to the target domain a challenge. To explicitly construct the most suitable intermediate domain for the model to gradually adapt to the feature distribution changes from the source to the target domain,… More >

  • Open Access

    ARTICLE

    HWD-YOLO: A New Vision-Based Helmet Wearing Detection Method

    Licheng Sun1, Heping Li2,3, Liang Wang1,4,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4543-4560, 2024, DOI:10.32604/cmc.2024.055115 - 12 September 2024

    Abstract It is crucial to ensure workers wear safety helmets when working at a workplace with a high risk of safety accidents, such as construction sites and mine tunnels. Although existing methods can achieve helmet detection in images, their accuracy and speed still need improvements since complex, cluttered, and large-scale scenes of real workplaces cause server occlusion, illumination change, scale variation, and perspective distortion. So, a new safety helmet-wearing detection method based on deep learning is proposed. Firstly, a new multi-scale contextual aggregation module is proposed to aggregate multi-scale feature information globally and highlight the details… More >

  • Open Access

    ARTICLE

    Rail-PillarNet: A 3D Detection Network for Railway Foreign Object Based on LiDAR

    Fan Li1,2, Shuyao Zhang3, Jie Yang1,2,*, Zhicheng Feng1,2, Zhichao Chen1,2

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3819-3833, 2024, DOI:10.32604/cmc.2024.054525 - 12 September 2024

    Abstract Aiming at the limitations of the existing railway foreign object detection methods based on two-dimensional (2D) images, such as short detection distance, strong influence of environment and lack of distance information, we propose Rail-PillarNet, a three-dimensional (3D) LIDAR (Light Detection and Ranging) railway foreign object detection method based on the improvement of PointPillars. Firstly, the parallel attention pillar encoder (PAPE) is designed to fully extract the features of the pillars and alleviate the problem of local fine-grained information loss in PointPillars pillars encoder. Secondly, a fine backbone network is designed to improve the feature extraction… More >

  • Open Access

    ARTICLE

    Ghost-YOLO v8: An Attention-Guided Enhanced Small Target Detection Algorithm for Floating Litter on Water Surfaces

    Zhongmin Huangfu, Shuqing Li*, Luoheng Yan

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3713-3731, 2024, DOI:10.32604/cmc.2024.054188 - 12 September 2024

    Abstract Addressing the challenges in detecting surface floating litter in artificial lakes, including complex environments, uneven illumination, and susceptibility to noise and weather, this paper proposes an efficient and lightweight Ghost-YOLO (You Only Look Once) v8 algorithm. The algorithm integrates advanced attention mechanisms and a small-target detection head to significantly enhance detection performance and efficiency. Firstly, an SE (Squeeze-and-Excitation) mechanism is incorporated into the backbone network to fortify the extraction of resilient features and precise target localization. This mechanism models feature channel dependencies, enabling adaptive adjustment of channel importance, thereby improving recognition of floating litter targets.… More >

  • Open Access

    ARTICLE

    Robust and Discriminative Feature Learning via Mutual Information Maximization for Object Detection in Aerial Images

    Xu Sun, Yinhui Yu*, Qing Cheng

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4149-4171, 2024, DOI:10.32604/cmc.2024.052725 - 12 September 2024

    Abstract Object detection in unmanned aerial vehicle (UAV) aerial images has become increasingly important in military and civil applications. General object detection models are not robust enough against interclass similarity and intraclass variability of small objects, and UAV-specific nuisances such as uncontrolled weather conditions. Unlike previous approaches focusing on high-level semantic information, we report the importance of underlying features to improve detection accuracy and robustness from the information-theoretic perspective. Specifically, we propose a robust and discriminative feature learning approach through mutual information maximization (RD-MIM), which can be integrated into numerous object detection methods for aerial images.… More >

Displaying 1-10 on page 1 of 165. Per Page