Computers Materials&Continua
- A Survey on the Role of Complex Networks in IoT and Brain Communication
- Blockchain Security Threats and Collaborative Defense:A Literature Review
- A New Strategy for Dynamic Channel Allocation in CR-WMN Based on RCA
- Deep Learning Models Based on Weakly Supervised Learning and Clustering Visualization for Disease Diagnosis
- Improved Shark Smell Optimization Algorithm for Human Action Recognition
- An Air Defense Weapon Target Assignment Method Based on Multi-Objective Artificial Bee Colony Algorithm
- A Credit Card Fraud Detection Model Based on Multi-Feature Fusion and Generative Adversarial Network
- 3-D Gait Identification Utilizing Latent Canonical Covariates Consisting of Gait Features
- Honeypot Game Theory against DoS Attack in UAV Cyber
- Reliability Analysis of Correlated Competitive and Dependent Components Considering Random Isolation Times
- CNN Based Features Extraction and Selection Using EPO Optimizer for Cotton Leaf Diseases Classification
- A Multilevel Hierarchical Parallel Algorithm for Large-Scale Finite Element Modal Analysis
- AI-Driven FBMC-OQAM Signal Recognition via Transform Channel Convolution Strategy
- Ensemble of Population-Based Metaheuristic Algorithms
- 3D Kronecker Convolutional Feature Pyramid for Brain Tumor Semantic Segmentation in MR Imaging
- A New Partial Task Offloading Method in a Cooperation Mode under Multi-Constraints for Multi-UE
- Traffic Scene Captioning with Multi-Stage Feature Enhancement
- Image Steganalysis Based on Deep Content Features Clustering
- Efficient Remote Identification for Drone Swarms
- A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular Networks
- Exploiting Data Science for Measuring the Performance of Technology Stocks
- A Transmission and Transformation Fault Detection Algorithm Based on Improved YOLOv5
- FedTC:A Personalized Federated Learning Method with Two Classifiers
- Deep-Net:Fine-Tuned Deep Neural Network Multi-Features Fusion for Brain Tumor Recognition
- Multi-Objective Image Optimization of Product Appearance Based on Improved NSGA-II
- New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features
- Traffic Flow Prediction with Heterogenous Data Using a Hybrid CNN-LSTM Model
- CF-BFT:A Dual-Mode Byzantine Fault-Tolerant Protocol Based on Node Authentication
- Push-Based Content Dissemination and Machine Learning-Oriented Illusion Attack Detection in Vehicular Named Data Networking
- VeriFace:Defending against Adversarial Attacks in Face Verification Systems
- Explainable Classification Model for Android Malware Analysis Using API and Permission-Based Features
- Stochastic Models to Mitigate Sparse Sensor Attacks in Continuous-Time Non-Linear Cyber-Physical Systems
- Siamese Dense Pixel-Level Fusion Network for Real-Time UAV Tracking
- An Improved Jump Spider Optimization for Network Traffic Identification Feature Selection
- Self-Awakened Particle Swarm Optimization BN Structure Learning Algorithm Based on Search Space Constraint
- HybridHR-Net:Action Recognition in Video Sequences Using Optimal Deep Learning Fusion Assisted Framework
- A Spider Monkey Optimization Algorithm Combining Opposition-Based Learning and Orthogonal Experimental Design
- Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination
- Improving Sentiment Analysis in Election-Based Conversations on Twitter with ElecBERT Language Model
- Decentralized Heterogeneous Federal Distillation Learning Based on Blockchain
- Full Scale-Aware Balanced High-Resolution Network for Multi-Person Pose Estimation
- DT-Net:Joint Dual-Input Transformer and CNN for Retinal Vessel Segmentation
- A Comprehensive Analysis of Datasets for Automotive Intrusion Detection Systems
- An Effective Runge-Kutta Optimizer Based on Adaptive Population Size and Search Step Size
- Malicious Traffic Compression and Classification Technique for Secure Internet of Things
- Hybrid Malware Variant Detection Model with Extreme Gradient Boosting and Artificial Neural Network Classifiers
- An Intelligent Algorithm for Solving Weapon-Target Assignment Problem:DDPG-DNPE Algorithm
- Text Augmentation-Based Model for Emotion Recognition Using Transformers
- Text Extraction with Optimal Bi-LSTM
- Time Highlighted Multi-Interest Network for Sequential Recommendation
- Multi-Agent Deep Reinforcement Learning for Efficient Computation Offloading in Mobile Edge Computing
- Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model
- Two-Stage Edge-Side Fault Diagnosis Method Based on Double Knowledge Distillation
- Binary Oriented Feature Selection for Valid Product Derivation in Software Product Line
- PAN-DeSpeck:A Lightweight Pyramid and Attention-Based Network for SAR Image Despeckling
- Topic-Aware Abstractive Summarization Based on Heterogeneous Graph Attention Networks for Chinese Complaint Reports
- Intelligent Traffic Surveillance through Multi-Label Semantic Segmentation and Filter-Based Tracking
- A Double-Branch Xception Architecture for Acute Hemorrhage Detection and Subtype Classification
- Convolutional LSTM Network for Heart Disease Diagnosis on Electrocardiograms
- Deep Learning with a Novel Concoction Loss Function for Identification of Ophthalmic Disease
- A Data Consistency Insurance Method for Smart Contract
- Clinical Knowledge-Based Hybrid Swin Transformer for Brain Tumor Segmentation
- Multi-Layer Deep Sparse Representation for Biological Slice Image Inpainting
- Speech Recognition via CTC-CNN Model
- An Intelligent Secure Adversarial Examples Detection Scheme in Heterogeneous Complex Environments
- A Secure and Efficient Information Authentication Scheme for E-Healthcare System
- Research on Multi-Blockchain Electronic Archives Sharing Model
- Detection of Different Stages of Alzheimer’s Disease Using CNN Classifier
- A Smart Obfuscation Approach to Protect Software in Cloud
- A Hybrid Deep Learning Approach to Classify the Plant Leaf Species