Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    A New Malicious Code Classification Method for the Security of Financial Software

    Xiaonan Li1,2, Qiang Wang1, Conglai Fan2,3, Wei Zhan1, Mingliang Zhang4,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 773-792, 2024, DOI:10.32604/csse.2024.039849 - 20 May 2024

    Abstract The field of finance heavily relies on cybersecurity to safeguard its systems and clients from harmful software. The identification of malevolent code within financial software is vital for protecting both the financial system and individual clients. Nevertheless, present detection models encounter limitations in their ability to identify malevolent code and its variations, all while encompassing a multitude of parameters. To overcome these obstacles, we introduce a lean model for classifying families of malevolent code, formulated on Ghost-DenseNet-SE. This model integrates the Ghost module, DenseNet, and the squeeze-and-excitation (SE) channel domain attention mechanism. It substitutes the… More >

  • Open Access

    ARTICLE

    Lightweight Malicious Code Classification Method Based on Improved SqueezeNet

    Li Li*, Youran Kong, Qing Zhang

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 551-567, 2024, DOI:10.32604/cmc.2023.045512 - 30 January 2024

    Abstract With the growth of the Internet, more and more business is being done online, for example, online offices, online education and so on. While this makes people’s lives more convenient, it also increases the risk of the network being attacked by malicious code. Therefore, it is important to identify malicious codes on computer systems efficiently. However, most of the existing malicious code detection methods have two problems: (1) The ability of the model to extract features is weak, resulting in poor model performance. (2) The large scale of model data leads to difficulties deploying on… More >

  • Open Access

    REVIEW

    Open-Source Codes of Topology Optimization: A Summary for Beginners to Start Their Research

    Yingjun Wang1,*, Xinqing Li1, Kai Long2, Peng Wei3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 1-34, 2023, DOI:10.32604/cmes.2023.027603 - 23 April 2023

    Abstract Topology optimization (TO), a numerical technique to find the optimal material layout with a given design domain, has attracted interest from researchers in the field of structural optimization in recent years. For beginners, opensource codes are undoubtedly the best alternative to learning TO, which can elaborate the implementation of a method in detail and easily engage more people to employ and extend the method. In this paper, we present a summary of various open-source codes and related literature on TO methods, including solid isotropic material with penalization (SIMP), evolutionary method, level set method (LSM), moving More > Graphic Abstract

    Open-Source Codes of Topology Optimization: A Summary for Beginners to Start Their Research

Displaying 1-10 on page 1 of 3. Per Page