Open Access
ARTICLE
Xingyun Hu1,2, Siqi Lu1,2,*, Liujia Cai1,2, Ye Feng1,2, Shuhao Gu1,2, Tao Hu1, Yongjuan Wang1,2,*
1 Information Engineering University, Zhengzhou, China
2 Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China
* Corresponding Author: Siqi Lu. Email: ; Yongjuan Wang. Email:
(This article belongs to the Special Issue: Cyberspace Mapping and Anti-Mapping Techniques)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2026.079484
Received 22 January 2026; Accepted 23 February 2026; Published online 19 March 2026
View
Download
Like
An Integrated and Comprehensive Fuzzy Multi-Criteria Model for Electronic Wallet Selection
Phuoc Van NguyenDistortion Evaluation of EMP Sensors Using Associated-Hermite Functions
Rupo Ma, Siping GaoEnergy-Efficient Scheduling Based on Task Migration Policy Using DPM for Homogeneous MPSoCs
Hamayun Khan, Irfan Ud din, Arshad...Genetic Crossover Operators for the Capacitated Vehicle Routing Problem
Zakir Hussain Ahmed, Naif Al-Otaibi,...A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT
Yu Fan, Jingbing Li, Uzair Aslam...