Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (43)
  • Open Access

    ARTICLE

    Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network

    Deema Alsekait1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2395-2436, 2024, DOI:10.32604/cmc.2024.055469 - 18 November 2024

    Abstract The widespread adoption of Internet of Things (IoT) devices has resulted in notable progress in different fields, improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks. Further, the study suggests using an advanced approach that utilizes machine learning, specifically the Wide Residual Network (WRN), to identify hidden malware in IoT systems. The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices, using the MalMemAnalysis dataset. Moreover, thorough experimentation provides evidence for the effectiveness of the WRN-based strategy, resulting in… More >

  • Open Access

    ARTICLE

    Mural Anomaly Region Detection Algorithm Based on Hyperspectral Multiscale Residual Attention Network

    Bolin Guo1,2, Shi Qiu1,*, Pengchang Zhang1, Xingjia Tang3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1809-1833, 2024, DOI:10.32604/cmc.2024.056706 - 15 October 2024

    Abstract Mural paintings hold significant historical information and possess substantial artistic and cultural value. However, murals are inevitably damaged by natural environmental factors such as wind and sunlight, as well as by human activities. For this reason, the study of damaged areas is crucial for mural restoration. These damaged regions differ significantly from undamaged areas and can be considered abnormal targets. Traditional manual visual processing lacks strong characterization capabilities and is prone to omissions and false detections. Hyperspectral imaging can reflect the material properties more effectively than visual characterization methods. Thus, this study employs hyperspectral imaging… More >

  • Open Access

    ARTICLE

    Graph Attention Residual Network Based Routing and Fault-Tolerant Scheduling Mechanism for Data Flow in Power Communication Network

    Zhihong Lin1, Zeng Zeng2, Yituan Yu2, Yinlin Ren1, Xuesong Qiu1,*, Jinqian Chen1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1641-1665, 2024, DOI:10.32604/cmc.2024.055802 - 15 October 2024

    Abstract For permanent faults (PF) in the power communication network (PCN), such as link interruptions, the time-sensitive networking (TSN) relied on by PCN, typically employs spatial redundancy fault-tolerance methods to keep service stability and reliability, which often limits TSN scheduling performance in fault-free ideal states. So this paper proposes a graph attention residual network-based routing and fault-tolerant scheduling mechanism (GRFS) for data flow in PCN, which specifically includes a communication system architecture for integrated terminals based on a cyclic queuing and forwarding (CQF) model and fault recovery method, which reduces the impact of faults by simplified… More >

  • Open Access

    ARTICLE

    Cost-Sensitive Dual-Stream Residual Networks for Imbalanced Classification

    Congcong Ma1,2, Jiaqi Mi1, Wanlin Gao1,2, Sha Tao1,2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4243-4261, 2024, DOI:10.32604/cmc.2024.054506 - 12 September 2024

    Abstract Imbalanced data classification is the task of classifying datasets where there is a significant disparity in the number of samples between different classes. This task is prevalent in practical scenarios such as industrial fault diagnosis, network intrusion detection, cancer detection, etc. In imbalanced classification tasks, the focus is typically on achieving high recognition accuracy for the minority class. However, due to the challenges presented by imbalanced multi-class datasets, such as the scarcity of samples in minority classes and complex inter-class relationships with overlapping boundaries, existing methods often do not perform well in multi-class imbalanced data… More >

  • Open Access

    ARTICLE

    Ensemble Approach Combining Deep Residual Networks and BiGRU with Attention Mechanism for Classification of Heart Arrhythmias

    Batyrkhan Omarov1,2,*, Meirzhan Baikuvekov1, Daniyar Sultan1, Nurzhan Mukazhanov3, Madina Suleimenova2, Maigul Zhekambayeva3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 341-359, 2024, DOI:10.32604/cmc.2024.052437 - 18 July 2024

    Abstract This research introduces an innovative ensemble approach, combining Deep Residual Networks (ResNets) and Bidirectional Gated Recurrent Units (BiGRU), augmented with an Attention Mechanism, for the classification of heart arrhythmias. The escalating prevalence of cardiovascular diseases necessitates advanced diagnostic tools to enhance accuracy and efficiency. The model leverages the deep hierarchical feature extraction capabilities of ResNets, which are adept at identifying intricate patterns within electrocardiogram (ECG) data, while BiGRU layers capture the temporal dynamics essential for understanding the sequential nature of ECG signals. The integration of an Attention Mechanism refines the model’s focus on critical segments… More >

  • Open Access

    ARTICLE

    Abnormal Traffic Detection for Internet of Things Based on an Improved Residual Network

    Tingting Su1, Jia Wang1,*, Wei Hu2,*, Gaoqiang Dong1, Jeon Gwanggil3

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4433-4448, 2024, DOI:10.32604/cmc.2024.051535 - 20 June 2024

    Abstract Along with the progression of Internet of Things (IoT) technology, network terminals are becoming continuously more intelligent. IoT has been widely applied in various scenarios, including urban infrastructure, transportation, industry, personal life, and other socio-economic fields. The introduction of deep learning has brought new security challenges, like an increment in abnormal traffic, which threatens network security. Insufficient feature extraction leads to less accurate classification results. In abnormal traffic detection, the data of network traffic is high-dimensional and complex. This data not only increases the computational burden of model training but also makes information extraction more… More >

  • Open Access

    ARTICLE

    Workout Action Recognition in Video Streams Using an Attention Driven Residual DC-GRU Network

    Arnab Dey1,*, Samit Biswas1, Dac-Nhuong Le2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3067-3087, 2024, DOI:10.32604/cmc.2024.049512 - 15 May 2024

    Abstract Regular exercise is a crucial aspect of daily life, as it enables individuals to stay physically active, lowers the likelihood of developing illnesses, and enhances life expectancy. The recognition of workout actions in video streams holds significant importance in computer vision research, as it aims to enhance exercise adherence, enable instant recognition, advance fitness tracking technologies, and optimize fitness routines. However, existing action datasets often lack diversity and specificity for workout actions, hindering the development of accurate recognition models. To address this gap, the Workout Action Video dataset (WAVd) has been introduced as a significant… More >

  • Open Access

    ARTICLE

    A Normalizing Flow-Based Bidirectional Mapping Residual Network for Unsupervised Defect Detection

    Lanyao Zhang1, Shichao Kan2, Yigang Cen3, Xiaoling Chen1, Linna Zhang1,*, Yansen Huang4,5

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1631-1648, 2024, DOI:10.32604/cmc.2024.046924 - 27 February 2024

    Abstract Unsupervised methods based on density representation have shown their abilities in anomaly detection, but detection performance still needs to be improved. Specifically, approaches using normalizing flows can accurately evaluate sample distributions, mapping normal features to the normal distribution and anomalous features outside it. Consequently, this paper proposes a Normalizing Flow-based Bidirectional Mapping Residual Network (NF-BMR). It utilizes pre-trained Convolutional Neural Networks (CNN) and normalizing flows to construct discriminative source and target domain feature spaces. Additionally, to better learn feature information in both domain spaces, we propose the Bidirectional Mapping Residual Network (BMR), which maps sample… More > Graphic Abstract

    A Normalizing Flow-Based Bidirectional Mapping Residual Network for Unsupervised Defect Detection

  • Open Access

    ARTICLE

    Printed Circuit Board (PCB) Surface Micro Defect Detection Model Based on Residual Network with Novel Attention Mechanism

    Xinyu Hu, Defeng Kong*, Xiyang Liu, Junwei Zhang, Daode Zhang

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 915-933, 2024, DOI:10.32604/cmc.2023.046376 - 30 January 2024

    Abstract Printed Circuit Board (PCB) surface tiny defect detection is a difficult task in the integrated circuit industry, especially since the detection of tiny defects on PCB boards with large-size complex circuits has become one of the bottlenecks. To improve the performance of PCB surface tiny defects detection, a PCB tiny defects detection model based on an improved attention residual network (YOLOX-AttResNet) is proposed. First, the unsupervised clustering performance of the K-means algorithm is exploited to optimize the channel weights for subsequent operations by feeding the feature mapping into the SENet (Squeeze and Excitation Network) attention… More >

  • Open Access

    ARTICLE

    A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN

    Haizhen Wang1,2,*, Jinying Yan1,*, Na Jia1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 569-588, 2024, DOI:10.32604/cmc.2023.046055 - 30 January 2024

    Abstract Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured content. The extraction of encrypted traffic attributes and their subsequent identification presents a formidable challenge. The existing models have predominantly relied on direct extraction of encrypted traffic data from imbalanced datasets, with the dataset’s imbalance significantly affecting the model’s performance. In the present study, a new model, referred to as UD-VLD (Unbalanced Dataset-VAE-LSTM-DRN), was proposed to address above problem. The proposed model is an encrypted traffic identification model for handling unbalanced datasets. The encoder of the… More >

Displaying 1-10 on page 1 of 43. Per Page