Open Access
ARTICLE
Tanveer Ahmad1,*, Tahani Alsubait2, Amina Salhi3, Amani Ibraheem4, Muhammad Asim Saleem5
1 Department of Computer Science and Engineering, University of Cyprus, Nicosia, Cyprus
2 Department of Computer Science and Artificial Intelligence, Umm Al-Qura University, Makkah, Saudi Arabia
3 Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia
4 College of Computer Science, King Khalid University, Abha, Saudi Arabia
5 Center of Excellence in Artificial Intelligence, Machine Learning and Smart Grid Technology, Department of Electrical Engineering, Faculty of Engineering, Chulalongkorn University, Bangkok, Thailand
* Corresponding Author: Tanveer Ahmad. Email:
(This article belongs to the Special Issue: Emerging Technologies in Information Security: Modeling, Algorithms, and Applications)
Computer Modeling in Engineering & Sciences https://doi.org/10.32604/cmes.2026.080285
Received 06 February 2026; Accepted 15 April 2026; Published online 18 May 2026
View
Download
Like
A Differential Privacy Federated Learning Scheme Based on Adaptive Gaussian Noise
Sanxiu Jiao, Lecai Cai, Xinjie...Distributed Stochastic Optimization with Compression for Non-Strongly Convex Objectives
Xuanjie Li, Yuedong XuC-CORE: Clustering by Code Representation to Prioritize Test Cases in Compiler Testing
Wei Zhou, Xincong Jiang, Chuan...2P3FL: A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning
Sandeep Dasari, Rajesh Kaluri