Home / Journals / JCS / Vol.4, No.2, 2022
  • Open Access

    ARTICLE

    CenterPicker: An Automated Cryo-EM Single-Particle Picking Method Based on Center Point Detection

    Jianquan Ouyang1,*, Jinling Wang1, Yaowu Wang1, Tianming Liu2
    Journal of Cyber Security, Vol.4, No.2, pp. 65-77, 2022, DOI:10.32604/jcs.2022.028065
    Abstract Cryo-electron microscopy (cryo-EM) has become one of the mainstream techniques for determining the structures of proteins and macromolecular complexes, with prospects for development and significance. Researchers must select hundreds of thousands of particles from micrographs to acquire the database for single-particle cryo-EM reconstruction. However, existing particle picking methods cannot ensure that the particles are in the center of the bounding box because the signal-to-noise ratio (SNR) of micrographs is extremely low, thereby directly affecting the efficiency and accuracy of 3D reconstruction. We propose an automated particle-picking method (CenterPicker) based on particle center point detection to automatically select a large number… More >

  • Open Access

    ARTICLE

    Web Tracking Domain and Possible Privacy Defending Tools: A Literature Review

    Maryam Abdulaziz Saad Bubukayr1,*, Mounir Frikha2
    Journal of Cyber Security, Vol.4, No.2, pp. 79-94, 2022, DOI:10.32604/jcs.2022.029020
    Abstract Personal data are strongly linked to web browsing history. By visiting a certain website, a user can share her favorite items, location, employment status, financial information, preferences, gender, medical status, news, etc. Therefore, web tracking is considered as one of the most significant internet privacy threats that can have a serious impact on end-users. Usually, it is used by most websites to track visitors through the internet in order to enhance their services and improve search customization. Moreover, selling users’ data to the advertising companies without their permission. Although there are more research efforts focused on third-party tracking to protect… More >

  • Open Access

    ARTICLE

    Application and Challenge of Blockchain Technology in Medical Field

    Kaifeng Zhang1, Zhao Qiu1,*, Gengquan Xie1, Jiale Lin1, Tingting Zhang1, Yingsheng Lian1, Tao Chen1, Yunlong He2, Yu Yang2
    Journal of Cyber Security, Vol.4, No.2, pp. 95-107, 2022, DOI:10.32604/jcs.2022.029451
    Abstract Due to its unique security, blockchain technology is widely used in the financial field. Under the background of the rapid development of information technology and the rapid improvement of medical level, it is also a general trend to integrate blockchain technology into the medical field. According to the characteristics of blockchain and the research contents of many scholars on the application of blockchain in the medical field, this paper analyzes and summarizes the problems existing in the current development of blockchain, puts forward corresponding solutions, and looks forward to the further application of blockchain technology in the medical field. More >

  • Open Access

    ARTICLE

    Analysis of Security Aspects in LoRaWAN

    Ahmed AL-Hthlool1,*, Mounir Frikha2
    Journal of Cyber Security, Vol.4, No.2, pp. 109-118, 2022, DOI:10.32604/jcs.2022.030498
    Abstract Nowadays, emerging trends in the field of technology related to big data, cognitive computing, and the Internet of Things (IoT) have become closely related to people’s lives. One of the hottest areas these days is transforming traditional cities into smart cities, using the concept of IoT depending on several types of modern technologies to develop and manage cities in order to improve and facilitate the quality of life. The Internet of Things networks consist of a huge number of interconnected devices and sensors that process and transmit data. Such Activities require efficient energy to be performed at the highest quality… More >

  • Open Access

    ARTICLE

    Deep Learning Based Image Forgery Detection Methods

    Liang Xiu-jian1,2,*, Sun He2
    Journal of Cyber Security, Vol.4, No.2, pp. 119-133, 2022, DOI:10.32604/jcs.2022.032915
    Abstract Increasingly advanced image processing technology has made digital image editing easier and easier. With image processing software at one’s fingertips, one can easily alter the content of an image, and the altered image is so realistic that it is illegible to the naked eye. These tampered images have posed a serious threat to personal privacy, social order, and national security. Therefore, detecting and locating tampered areas in images has important practical significance, and has become an important research topic in the field of multimedia information security. In recent years, deep learning technology has been widely used in image tampering localization,… More >

Share Link

WeChat scan