Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (28)
  • Open Access

    ARTICLE

    HGNN-ETC: Higher-Order Graph Neural Network Based on Chronological Relationships for Encrypted Traffic Classification

    Rongwei Yu, Xiya Guo*, Peihao Zhang, Kaijuan Zhang

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2643-2664, 2024, DOI:10.32604/cmc.2024.056165 - 18 November 2024

    Abstract Encrypted traffic plays a crucial role in safeguarding network security and user privacy. However, encrypting malicious traffic can lead to numerous security issues, making the effective classification of encrypted traffic essential. Existing methods for detecting encrypted traffic face two significant challenges. First, relying solely on the original byte information for classification fails to leverage the rich temporal relationships within network traffic. Second, machine learning and convolutional neural network methods lack sufficient network expression capabilities, hindering the full exploration of traffic’s potential characteristics. To address these limitations, this study introduces a traffic classification method that utilizes… More >

  • Open Access

    ARTICLE

    Enhanced Topic-Aware Summarization Using Statistical Graph Neural Networks

    Ayesha Khaliq1, Salman Afsar Awan1, Fahad Ahmad2,*, Muhammad Azam Zia1, Muhammad Zafar Iqbal3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3221-3242, 2024, DOI:10.32604/cmc.2024.053488 - 15 August 2024

    Abstract The rapid expansion of online content and big data has precipitated an urgent need for efficient summarization techniques to swiftly comprehend vast textual documents without compromising their original integrity. Current approaches in Extractive Text Summarization (ETS) leverage the modeling of inter-sentence relationships, a task of paramount importance in producing coherent summaries. This study introduces an innovative model that integrates Graph Attention Networks (GATs) with Transformer-based Bidirectional Encoder Representations from Transformers (BERT) and Latent Dirichlet Allocation (LDA), further enhanced by Term Frequency-Inverse Document Frequency (TF-IDF) values, to improve sentence selection by capturing comprehensive topical information. Our… More >

  • Open Access

    ARTICLE

    Adaptive Graph Convolutional Adjacency Matrix Network for Video Summarization

    Jing Zhang*, Guangli Wu, Shanshan Song

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1947-1965, 2024, DOI:10.32604/cmc.2024.051781 - 15 August 2024

    Abstract Video summarization aims to select key frames or key shots to create summaries for fast retrieval, compression, and efficient browsing of videos. Graph neural networks efficiently capture information about graph nodes and their neighbors, but ignore the dynamic dependencies between nodes. To address this challenge, we propose an innovative Adaptive Graph Convolutional Adjacency Matrix Network (TAMGCN), leveraging the attention mechanism to dynamically adjust dependencies between graph nodes. Specifically, we first segment shots and extract features of each frame, then compute the representative features of each shot. Subsequently, we utilize the attention mechanism to dynamically adjust More >

  • Open Access

    ARTICLE

    Multi-Scale Location Attention Model for Spatio-Temporal Prediction of Disease Incidence

    Youshen Jiang1, Tongqing Zhou1, Zhilin Wang2, Zhiping Cai1,*, Qiang Ni3

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 585-597, 2024, DOI:10.32604/iasc.2023.030221 - 11 July 2024

    Abstract Due to the increasingly severe challenges brought by various epidemic diseases, people urgently need intelligent outbreak trend prediction. Predicting disease onset is very important to assist decision-making. Most of the existing work fails to make full use of the temporal and spatial characteristics of epidemics, and also relies on multivariate data for prediction. In this paper, we propose a Multi-Scale Location Attention Graph Neural Networks (MSLAGNN) based on a large number of Centers for Disease Control and Prevention (CDC) patient electronic medical records research sequence source data sets. In order to understand the geography and… More >

  • Open Access

    ARTICLE

    Smart Contract Vulnerability Detection Method Based on Feature Graph and Multiple Attention Mechanisms

    Zhenxiang He*, Zhenyu Zhao, Ke Chen, Yanlin Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3023-3045, 2024, DOI:10.32604/cmc.2024.050281 - 15 May 2024

    Abstract The fast-paced development of blockchain technology is evident. Yet, the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem. Conventional smart contract vulnerability detection primarily relies on static analysis tools, which are less efficient and accurate. Although deep learning methods have improved detection efficiency, they are unable to fully utilize the static relationships within contracts. Therefore, we have adopted the advantages of the above two methods, combining feature extraction mode of tools with deep learning techniques. Firstly, we have constructed corresponding feature extraction mode for… More >

  • Open Access

    ARTICLE

    Model Agnostic Meta-Learning (MAML)-Based Ensemble Model for Accurate Detection of Wheat Diseases Using Vision Transformer and Graph Neural Networks

    Yasir Maqsood1, Syed Muhammad Usman1,*, Musaed Alhussein2, Khursheed Aurangzeb2,*, Shehzad Khalid3, Muhammad Zubair4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2795-2811, 2024, DOI:10.32604/cmc.2024.049410 - 15 May 2024

    Abstract Wheat is a critical crop, extensively consumed worldwide, and its production enhancement is essential to meet escalating demand. The presence of diseases like stem rust, leaf rust, yellow rust, and tan spot significantly diminishes wheat yield, making the early and precise identification of these diseases vital for effective disease management. With advancements in deep learning algorithms, researchers have proposed many methods for the automated detection of disease pathogens; however, accurately detecting multiple disease pathogens simultaneously remains a challenge. This challenge arises due to the scarcity of RGB images for multiple diseases, class imbalance in existing… More >

  • Open Access

    ARTICLE

    Deep Learning Social Network Access Control Model Based on User Preferences

    Fangfang Shan1,2,*, Fuyang Li1, Zhenyu Wang1, Peiyu Ji1, Mengyi Wang1, Huifang Sun1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1029-1044, 2024, DOI:10.32604/cmes.2024.047665 - 16 April 2024

    Abstract A deep learning access control model based on user preferences is proposed to address the issue of personal privacy leakage in social networks. Firstly, social users and social data entities are extracted from the social network and used to construct homogeneous and heterogeneous graphs. Secondly, a graph neural network model is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network. Then, high-order neighbor nodes, hidden neighbor nodes, displayed neighbor nodes, and social data nodes are… More >

  • Open Access

    ARTICLE

    Social Robot Detection Method with Improved Graph Neural Networks

    Zhenhua Yu, Liangxue Bai, Ou Ye*, Xuya Cong

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1773-1795, 2024, DOI:10.32604/cmc.2023.047130 - 27 February 2024

    Abstract Social robot accounts controlled by artificial intelligence or humans are active in social networks, bringing negative impacts to network security and social life. Existing social robot detection methods based on graph neural networks suffer from the problem of many social network nodes and complex relationships, which makes it difficult to accurately describe the difference between the topological relations of nodes, resulting in low detection accuracy of social robots. This paper proposes a social robot detection method with the use of an improved neural network. First, social relationship subgraphs are constructed by leveraging the user’s social… More >

  • Open Access

    ARTICLE

    Weighted Forwarding in Graph Convolution Networks for Recommendation Information Systems

    Sang-min Lee, Namgi Kim*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1897-1914, 2024, DOI:10.32604/cmc.2023.046346 - 27 February 2024

    Abstract Recommendation Information Systems (RIS) are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet. Graph Convolution Network (GCN) algorithms have been employed to implement the RIS efficiently. However, the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process. To address this issue, we propose a Weighted Forwarding method using the GCN (WF-GCN) algorithm. The proposed method involves multiplying the embedding results with different weights for each hop layer during graph… More >

  • Open Access

    ARTICLE

    Detecting APT-Exploited Processes through Semantic Fusion and Interaction Prediction

    Bin Luo1,2,3, Liangguo Chen1,2,3, Shuhua Ruan1,2,3,*, Yonggang Luo2,3,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1731-1754, 2024, DOI:10.32604/cmc.2023.045739 - 27 February 2024

    Abstract Considering the stealthiness and persistence of Advanced Persistent Threats (APTs), system audit logs are leveraged in recent studies to construct system entity interaction provenance graphs to unveil threats in a host. Rule-based provenance graph APT detection approaches require elaborate rules and cannot detect unknown attacks, and existing learning-based approaches are limited by the lack of available APT attack samples or generally only perform graph-level anomaly detection, which requires lots of manual efforts to locate attack entities. This paper proposes an APT-exploited process detection approach called ThreatSniffer, which constructs the benign provenance graph from attack-free audit… More >

Displaying 1-10 on page 1 of 28. Per Page