Open Access
REVIEW
Shaojie Min1, Yaxiao Luo1, Kebing Liu1, Qingyuan Gong2, Yang Chen1,*
1 Shanghai Key Lab of Intelligent Information Processing, College of Computer Science and Artificial Intelligence, Fudan University, Shanghai, 200433, China
2 Research Institute of Intelligent Complex Systems, Fudan University, Shanghai, 200433, China
* Corresponding Author: Yang Chen. Email:
(This article belongs to the Special Issue: Cyberspace Mapping and Anti-Mapping Techniques)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.073175
Received 12 September 2025; Accepted 29 October 2025; Published online 01 December 2025
View
Download
Like
Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment
D. Prabakaran, Shyamala RamachandranDeep Learning Empowered Cybersecurity Spam Bot Detection for Online Social Networks
Mesfer Al Duhayyim, Haya Mesfer...Deep Image Restoration Model: A Defense Method Against Adversarial Attacks
Kazim Ali, Adnan N. Qureshi, Ahmad...Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection
Xiaorui Zhang, Xun Sun, Xingming...Windows 10's Browser Forensic Analysis for Tracing P2P Networks’ Anonymous Attacks
Saima Kauser, Tauqeer Safdar Malik,...