Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and SGX

    Jun Li1, 2, Jieren Cheng2, *, Naixue Xiong3, Lougao Zhan4, Yuan Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 723-741, 2020, DOI:10.32604/cmc.2020.011272

    Abstract Security and privacy issues have become a rapidly growing problem with the fast development of big data in public health. However, big data faces many ongoing serious challenges in the process of collection, storage, and use. Among them, data security and privacy problems have attracted extensive interest. In an effort to overcome this challenge, this article aims to present a distributed privacy preservation approach based on smart contracts and Intel Software Guard Extensions (SGX). First of all, we define SGX as a trusted edge computing node, design data access module, data protection module, and data integrity check module, to achieve… More >

  • Open Access

    ARTICLE

    Ultrasound Speckle Reduction Based on Histogram Curve Matching and Region Growing

    Jinrong Hu1, Zhiqin Lei1, Xiaoying Li2, *, Yongqun He3, Jiliu Zhou1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 705-722, 2020, DOI:10.32604/cmc.2020.09878

    Abstract The quality of ultrasound scanning images is usually damaged by speckle noise. This paper proposes a method based on local statistics extracted from a histogram to reduce ultrasound speckle through a region growing algorithm. Unlike single statistical moment-based speckle reduction algorithms, this method adaptively smooths the speckle regions while preserving the margin and tissue structure to achieve high detectability. The criterion of a speckle region is defined by the similarity value obtained by matching the histogram of the current processing window and the reference window derived from the speckle region in advance. Then, according to the similarity value and tissue… More >

  • Open Access

    ARTICLE

    Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT

    Jinxin Zuo1, 3, Yueming Lu1, 3, *, Hui Gao2, 3, Ruohan Cao2, 3, Ziyv Guo2, 3, Jim Feng4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 683-704, 2020, DOI:10.32604/cmc.2020.010793

    Abstract The development of the Internet of Things (IoT) calls for a comprehensive information security evaluation framework to quantitatively measure the safety score and risk (S&R) value of the network urgently. In this paper, we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback. The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection. Firstly, we establish an overall evaluation indicator system that includes four primary indicators of threat information, asset, vulnerability, and management, respectively. It also includes eleven… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Fei Li1, *, Jiayan Zhang1, Edward Szczerbicki2, Jiaqi Song1, Ruxiang Li 1, Renhong Diao1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 653-681, 2020, DOI:10.32604/cmc.2020.011264

    Abstract The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to verify the accuracy and efficiency… More >

  • Open Access

    ARTICLE

    Identifying Game Processes Based on Private Working Sets

    Jinfeng Li1, Li Feng1, *, Longqing Zhang2, Hongning Dai1, Lei Yang1, Liwei Tian1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 639-651, 2020, DOI:10.32604/cmc.2020.010309

    Abstract Fueled by the booming online games, there is an increasing demand for monitoring online games in various settings. One of the application scenarios is the monitor of computer games in school computer labs, for which an intelligent game recognition method is required. In this paper, a method to identify game processes in accordance with private working sets (i.e., the amount of memory occupied by a process but cannot be shared among other processes) is introduced. Results of the W test showed that the memory sizes occupied by the legitimate processes (e.g., the processes of common native windows applications) and game… More >

  • Open Access

    ARTICLE

    Semi-GSGCN: Social Robot Detection Research with Graph Neural Network

    Xiujuan Wang1, Qianqian Zheng1, *, Kangfeng Zheng2, Yi Sui1, Jiayue Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 617-638, 2020, DOI:10.32604/cmc.2020.011165

    Abstract Malicious social robots are the disseminators of malicious information on social networks, which seriously affect information security and network environments. Efficient and reliable classification of social robots is crucial for detecting information manipulation in social networks. Supervised classification based on manual feature extraction has been widely used in social robot detection. However, these methods not only involve the privacy of users but also ignore hidden feature information, especially the graph feature, and the label utilization rate of semi-supervised algorithms is low. Aiming at the problems of shallow feature extraction and low label utilization rate in existing social network robot detection… More >

  • Open Access

    ARTICLE

    A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen

    Lejun Zhang1, 2, Zhijie Zhang1, Weizheng Wang3, Rasheed Waqas1, Chunhui Zhao1, 4, Seokhoon Kim5, Huiling Chen6, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 597-616, 2020, DOI:10.32604/cmc.2020.011554

    Abstract As an extension of the traditional encryption technology, information hiding has been increasingly used in the fields of communication and network media, and the covert communication technology has gradually developed. The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance, which can effectively alleviate the disadvantages and problems of traditional covert communication. However, its combination with covert communication thus far has been mostly at the theoretical level. The BLOCCE method, as an early result of the combination of blockchain and covert communication technology, has the problems of low information embedding efficiency, the use… More >

  • Open Access

    ARTICLE

    Automatic Terrain Debris Recognition Network Based on 3D Remote Sensing Data

    Xu Han1, #, Huijun Yang1, 4, *, Qiufeng Shen1, #, Jiangtao Yang2, Huihui Liang1, Cancan Bao1, Shuang Cang3

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 579-596, 2020, DOI:10.32604/cmc.2020.011262

    Abstract Although predecessors have made great contributions to the semantic segmentation of 3D indoor scenes, there still exist some challenges in the debris recognition of terrain data. Compared with hundreds of thousands of indoor point clouds, the amount of terrain point cloud is up to millions. Apart from that, terrain point cloud data obtained from remote sensing is measured in meters, but the indoor scene is measured in centimeters. In this case, the terrain debris obtained from remote sensing mapping only have dozens of points, which means that sufficient training information cannot be obtained only through the convolution of points. In… More >

  • Open Access

    ARTICLE

    Ore Image Segmentation Method Based on U-Net and Watershed

    Hui Li1, Chengwei Pan2, 3, Ziyi Chen1, Aziguli Wulamu2, 3, *, Alan Yang4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 563-578, 2020, DOI:10.32604/cmc.2020.09806

    Abstract Ore image segmentation is a key step in an ore grain size analysis based on image processing. The traditional segmentation methods do not deal with ore textures and shadows in ore images well Those methods often suffer from under-segmentation and over-segmentation. In this article, in order to solve the problem, an ore image segmentation method based on U-Net is proposed. We adjust the structure of U-Net to speed up the processing, and we modify the loss function to enhance the generalization of the model. After the collection of the ore image, we design the annotation standard and train the network… More >

  • Open Access

    ARTICLE

    Accurate Multi-Scale Feature Fusion CNN for Time Series Classification in Smart Factory

    Xiaorui Shao1, Chang Soo Kim1, *, Dae Geun Kim2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 543-561, 2020, DOI:10.32604/cmc.2020.011108

    Abstract Time series classification (TSC) has attracted various attention in the community of machine learning and data mining and has many successful applications such as fault detection and product identification in the process of building a smart factory. However, it is still challenging for the efficiency and accuracy of classification due to complexity, multi-dimension of time series. This paper presents a new approach for time series classification based on convolutional neural networks (CNN). The proposed method contains three parts: short-time gap feature extraction, multi-scale local feature learning, and global feature learning. In the process of short-time gap feature extraction, large kernel… More >

Displaying 3941-3950 on page 395 of 5350. Per Page