Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (68)
  • Open Access

    REVIEW

    GNN: Core Branches, Integration Strategies and Applications

    Wenfeng Zheng1, Guangyu Xu2, Siyu Lu3, Junmin Lyu4, Feng Bao5,*, Lirong Yin6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2025.075741 - 29 January 2026

    Abstract Graph Neural Networks (GNNs), as a deep learning framework specifically designed for graph-structured data, have achieved deep representation learning of graph data through message passing mechanisms and have become a core technology in the field of graph analysis. However, current reviews on GNN models are mainly focused on smaller domains, and there is a lack of systematic reviews on the classification and applications of GNN models. This review systematically synthesizes the three canonical branches of GNN, Graph Convolutional Network (GCN), Graph Attention Network (GAT), and Graph Sampling Aggregation Network (GraphSAGE), and analyzes their integration pathways More >

  • Open Access

    ARTICLE

    Spatio-Temporal Graph Neural Networks with Elastic-Band Transform for Solar Radiation Prediction

    Guebin Choi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2025.073985 - 29 January 2026

    Abstract This study proposes a novel forecasting framework that simultaneously captures the strong periodicity and irregular meteorological fluctuations inherent in solar radiation time series. Existing approaches typically define inter-regional correlations using either simple correlation coefficients or distance-based measures when applying spatio-temporal graph neural networks (STGNNs). However, such definitions are prone to generating spurious correlations due to the dominance of periodic structures. To address this limitation, we adopt the Elastic-Band Transform (EBT) to decompose solar radiation into periodic and amplitude-modulated components, which are then modeled independently with separate graph neural networks. The periodic component, characterized by strong More >

  • Open Access

    REVIEW

    Learning from Scarcity: A Review of Deep Learning Strategies for Cold-Start Energy Time-Series Forecasting

    Jihoon Moon*

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2025.071052 - 29 January 2026

    Abstract Predicting the behavior of renewable energy systems requires models capable of generating accurate forecasts from limited historical data, a challenge that becomes especially pronounced when commissioning new facilities where operational records are scarce. This review aims to synthesize recent progress in data-efficient deep learning approaches for addressing such “cold-start” forecasting problems. It primarily covers three interrelated domains—solar photovoltaic (PV), wind power, and electrical load forecasting—where data scarcity and operational variability are most critical, while also including representative studies on hydropower and carbon emission prediction to provide a broader systems perspective. To this end, we examined… More >

  • Open Access

    REVIEW

    A Systematic Review of Frameworks for the Detection and Prevention of Card-Not-Present (CNP) Fraud

    Kwabena Owusu-Mensah*, Edward Danso Ansong , Kofi Sarpong Adu-Manu, Winfred Yaokumah

    Journal of Cyber Security, Vol.8, pp. 33-92, 2026, DOI:10.32604/jcs.2026.074265 - 20 January 2026

    Abstract The rapid growth of digital payment systems and remote financial services has led to a significant increase in Card-Not-Present (CNP) fraud, which is now the primary source of card-related losses worldwide. Traditional rule-based fraud detection methods are becoming insufficient due to several challenges, including data imbalance, concept drift, privacy concerns, and limited interpretability. In response to these issues, a systematic review of twenty-four CNP fraud detection frameworks developed between 2014 and 2025 was conducted. This review aimed to identify the technologies, strategies, and design considerations necessary for adaptive solutions that align with evolving regulatory standards.… More >

  • Open Access

    ARTICLE

    TopoMSG: A Topology-Aware Multi-Scale Graph Network for Social Bot Detection

    Junhui Xu1, Qi Wang1,*, Chichen Lin2, Weijian Fan3

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.071661 - 12 January 2026

    Abstract Social bots are automated programs designed to spread rumors and misinformation, posing significant threats to online security. Existing research shows that the structure of a social network significantly affects the behavioral patterns of social bots: a higher number of connected components weakens their collaborative capabilities, thereby reducing their proportion within the overall network. However, current social bot detection methods still make limited use of topological features. Furthermore, both graph neural network (GNN)-based methods that rely on local features and those that leverage global features suffer from their own limitations, and existing studies lack an effective… More >

  • Open Access

    ARTICLE

    Research on Vehicle Joint Radar Communication Resource Optimization Method Based on GNN-DRL

    Zeyu Chen1, Jian Sun2,*, Zhengda Huan1, Ziyi Zhang1

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-17, 2026, DOI:10.32604/cmc.2025.071182 - 09 December 2025

    Abstract To address the issues of poor adaptability in resource allocation and low multi-agent cooperation efficiency in Joint Radar and Communication (JRC) systems under dynamic environments, an intelligent optimization framework integrating Deep Reinforcement Learning (DRL) and Graph Neural Network (GNN) is proposed. This framework models resource allocation as a Partially Observable Markov Game (POMG), designs a weighted reward function to balance radar and communication efficiencies, adopts the Multi-Agent Proximal Policy Optimization (MAPPO) framework, and integrates Graph Convolutional Networks (GCN) and Graph Sample and Aggregate (GraphSAGE) to optimize information interaction. Simulations show that, compared with traditional methods More >

  • Open Access

    ARTICLE

    Log-Based Anomaly Detection of System Logs Using Graph Neural Network

    Eman Alsalmi, Abeer Alhuzali*, Areej Alhothali

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-20, 2026, DOI:10.32604/cmc.2025.071012 - 09 December 2025

    Abstract Log anomaly detection is essential for maintaining the reliability and security of large-scale networked systems. Most traditional techniques rely on log parsing in the reprocessing stage and utilize handcrafted features that limit their adaptability across various systems. In this study, we propose a hybrid model, BertGCN, that integrates BERT-based contextual embedding with Graph Convolutional Networks (GCNs) to identify anomalies in raw system logs, thereby eliminating the need for log parsing. The BERT module captures semantic representations of log messages, while the GCN models the structural relationships among log entries through a text-based graph. This combination More >

  • Open Access

    ARTICLE

    Smart Contract Vulnerability Detection Based on Symbolic Execution and Graph Neural Networks

    Haoxin Sun1, Xiao Yu1,*, Jiale Li1, Yitong Xu1, Jie Yu1, Huanhuan Li1, Yuanzhang Li2, Yu-An Tan2

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-15, 2026, DOI:10.32604/cmc.2025.070930 - 09 December 2025

    Abstract Since the advent of smart contracts, security vulnerabilities have remained a persistent challenge, compromsing both the reliability of contract execution and the overall stability of the virtual currency market. Consequently, the academic community has devoted increasing attention to these security risks. However, conventional approaches to vulnerability detection frequently exhibit limited accuracy. To address this limitation, the present study introduces a novel vulnerability detection framework called GNNSE that integrates symbolic execution with graph neural networks (GNNs). The proposed method first constructs semantic graphs to comprehensively capture the control flow and data flow dependencies within smart contracts. More >

  • Open Access

    ARTICLE

    Graph Attention Networks for Skin Lesion Classification with CNN-Driven Node Features

    Ghadah Naif Alwakid1, Samabia Tehsin2,*, Mamoona Humayun3,*, Asad Farooq2, Ibrahim Alrashdi1, Amjad Alsirhani1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.069162 - 10 November 2025

    Abstract Skin diseases affect millions worldwide. Early detection is key to preventing disfigurement, lifelong disability, or death. Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and severe class imbalance, and occasional imaging artifacts can create ambiguity for state-of-the-art convolutional neural networks (CNNs). We frame skin lesion recognition as graph-based reasoning and, to ensure fair evaluation and avoid data leakage, adopt a strict lesion-level partitioning strategy. Each image is first over-segmented using SLIC (Simple Linear Iterative Clustering) to produce perceptually homogeneous superpixels. These superpixels form the nodes of a region-adjacency graph whose edges encode… More >

  • Open Access

    ARTICLE

    Graph-Based Intrusion Detection with Explainable Edge Classification Learning

    Jaeho Shin1, Jaekwang Kim2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-26, 2026, DOI:10.32604/cmc.2025.068767 - 10 November 2025

    Abstract Network attacks have become a critical issue in the internet security domain. Artificial intelligence technology-based detection methodologies have attracted attention; however, recent studies have struggled to adapt to changing attack patterns and complex network environments. In addition, it is difficult to explain the detection results logically using artificial intelligence. We propose a method for classifying network attacks using graph models to explain the detection results. First, we reconstruct the network packet data into a graphical structure. We then use a graph model to predict network attacks using edge classification. To explain the prediction results, we… More >

Displaying 1-10 on page 1 of 68. Per Page