Open Access
REVIEW
Sghaier Guizani1,*, Tehseen Mazhar2,3,*, Habib Hamam4,5,6,7
1 College of Engineering, Alfaisal University, Riyadh, 11533, Saudi Arabia
2 School of Computer Science, National College of Business Administration and Economics, Lahore, 54000, Pakistan
3 Department of Computer Science and Information Technology, School Education Department, Government of Punjab, Layyah, 31200, Pakistan
4 Faculty of Engineering, Uni de Moncton, Moncton, NB E1A3E9, Canada
5 School of Electrical Engineering, University of Johannesburg, Johannesburg, 2006, South Africa
6 International Institute of Techno. & Management (IITG), Avenue des Grandes Ecoles, Libreville, 1989, Gabon
7 Bridges for Academic Excellence—Spectrum, Tunis, Center-ville, 1001, Tunisia
* Corresponding Author: Sghaier Guizani. Email: ; Tehseen Mazhar. Email:
(This article belongs to the Special Issue: Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.073883
Received 27 September 2025; Accepted 18 November 2025; Published online 09 December 2025
View
Download
Like
Privacy Data Management Mechanism Based on Blockchain and Federated Learning
Mingsen Mo, Shan Ji, Xiaowan Wang,...GrCol-PPFL: User-Based Group Collaborative Federated Learning Privacy Protection Framework
Jieren Cheng, Zhenhao Liu, Yiming...Federation Boosting Tree for Originator Rights Protection
Yinggang Sun, Hongguo Zhang, Chao...Research on Federated Learning Data Sharing Scheme Based on Differential Privacy
Lihong GuoAccelerating Falcon Post-Quantum Digital Signature Algorithm on Graphic Processing Units
Seog Chung Seo, Sang Woo An, Dooho...