Open Access
ARTICLE
Huihui Zhu1, Fei Tang2,*, Chunhua Jin3, Ping Wang1
1 School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China
2 School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China
3 Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an, 233003, China
* Corresponding Author: Fei Tang. Email:
(This article belongs to the Special Issue: Privacy-Enhancing Technologies for Secure Data Cooperation and Circulation)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.073550
Received 20 September 2025; Accepted 10 November 2025; Published online 05 December 2025
View
Download
Like
GRU-based Buzzer Ensemble for Abnormal Detection in Industrial Control Systems
Hyo-Seok Kim, Chang-Gyoon Lim,...Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis
Borja Bordel, Ramón Alcarria,...Deep Learning-Based Program-Wide Binary Code Similarity for Smart Contracts
Yuan Zhuang, Baobao Wang, Jianguo...Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security
V. Sridhar, K.V. Ranga Rao, Saddam...Privacy Data Management Mechanism Based on Blockchain and Federated Learning
Mingsen Mo, Shan Ji, Xiaowan Wang,...