Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (361)
  • Open Access

    ARTICLE

    CycleGAN-RRW: Blind Reversible Image Watermarking via Cycle-Consistent Adversarial Feature Encoding for Secure Image Ownership Authentication

    Mohammed Shamar Yadkar1, Sefer Kurnaz1, Saadaldeen Rashid Ahmed2,3,*

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.079408 - 09 April 2026

    Abstract This advanced research describes CycleGAN-RRW, a new reversible watermarking system for secure image ownership authentication. It uses Cycle-Consistent Generative Adversarial Networks with adaptive feature encoding. In areas such as law, forensics, and telemedicine, digital images usually contain private info that may be changed or used without authorization. Existing watermarking methods may decrease image quality, may not be reversible, or need outside keys. To address these problems, our model embeds metadata into intermediate feature maps with Adaptive Instance Normalization (AdaIN), based on adversarial and perceptual loss. The dual-generator design permits two-way translation between original and watermarked… More >

  • Open Access

    ARTICLE

    A Secure Task Offloading Scheme for UAV-Assisted MEC with Dynamic User Clustering and Cooperative Jamming: A Method Combining K-Means and SAC (K-SAC)

    Jiajia Liu1,2, Shuchen Pang3, Peng Xie3, Haitao Zhou3, Chenxi Du3, Haoran Hu3, Bo Tang3, Jianhua Liu3, Fei Jia1, Huibing Zhang1,*

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077824 - 09 April 2026

    Abstract In the unmanned aerial vehicle (UAV) assisted edge computing system, the broadcast characteristics of the UAV signal, the high mobility of the UAV, and the limited airborne energy make the task offloading strategy face challenges such as increased risk of information disclosure, limited computing resources, and the trade-off between energy consumption and flight time. To address these issues, we propose a K-means in-depth reinforcement learning algorithm based on Soft Actor-Critic (SAC). The proposed method first leverages the K-means clustering algorithm to determine the optimal deployment of ground jammers based on the final distribution of mobile… More >

  • Open Access

    ARTICLE

    Federated Learning for Malicious Domain Detection via Privacy-Preserving DNS Traffic Analysis

    Samar Abbas Mangi1,*, Samina Rajper1, Noor Ahmed Shaikh1, Shehzad Ashraf Chaudhry2,3

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077337 - 09 April 2026

    Abstract Malicious domain detection (MDD) from DNS telemetry enables early threat hunting but is constrained by privacy and data-sharing barriers across organizations. We present a deployable federated learning (FL) pipeline that trains a compact deep neural network (DNN; 64-32-16 with ReLU and dropout 0.3) locally at each client and exchanges only masked model updates. Privacy is enforced via secure aggregation (the server observes only an aggregate of masked updates) and optional server-side differential privacy (DP) via clipping and Gaussian noise. Our feature schema combines DNS-specific lexical cues (character n-grams, entropy, TLD indicators) with lightweight behavioral signals More >

  • Open Access

    ARTICLE

    Secure and Differentially Private Edge-Cloud Federated Learning Framework for Privacy-Preserving Maritime AIS Intelligence

    Abuzar Khan1, Abid Iqbal2,*, Ghassan Husnain1,*, Fahad Masood1, Mohammed Al-Naeem3, Sajid Iqbal4

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077222 - 09 April 2026

    Abstract Cloud computing now supports large-scale maritime analytics, yet offloading rich Automatic Identification System (AIS) data to the cloud exposes sensitive operational patterns and complicates compliance with cross-border privacy regulations. This work addresses the gap between growing demand for AI-driven vessel intelligence and the limited availability of practical, privacy-preserving cloud solutions. We introduce a privacy-by-design edge-cloud framework in which ports and vessels serve as federated clients, training vessel-type classifiers on local AIS trajectories while transmitting only clipped, Gaussian-perturbed updates to a zero-trust cloud coordinator employing secure and robust aggregation. Using a public AIS corpus with realistic… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Parallel Non-Negative Matrix Factorization with Edge Computing

    Wenxuan Yu1, Wenjing Gao1, Jiuru Wang2, Rong Hao1,*, Jia Yu1,*

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076731 - 09 April 2026

    Abstract Non-negative Matrix Factorization (NMF) is a computationally intensive matrix operation that resource-constrained clients struggle to complete locally. Privacy-preserving outsourcing allows clients to offload heavy computing tasks to powerful servers, effectively solving the problem of local computing difficulties. However, the existing privacy-preserving NMF outsourcing schemes only allow one server to perform outsourcing computation, resulting in low efficiency on the server side. In order to improve the efficiency of outsourcing computation, we propose a privacy-preserving parallel NMF outsourcing scheme with multiple edge servers. We adopt the matrix blocking technique to divide the computation task into multiple subtasks, More >

  • Open Access

    ARTICLE

    Hybrid Encryption Model for Secure Token Distribution Scheme

    Michael Juma Ayuma1,*, Shem Mbandu Angolo1,*, Philemon Nthenge Kasyoka2

    Journal on Internet of Things, Vol.8, pp. 31-65, 2026, DOI:10.32604/jiot.2026.074919 - 16 March 2026

    Abstract Encryption is essential for safeguarding sensitive data by transforming it into a secret code, which can only be decrypted by authorized parties. This ensures privacy and protects data from unauthorized access. While various encryption algorithms exist, relying on a single method may not provide sufficient security, particularly in the context of token transmission. Common threats such as brute force attacks, man-in-the-middle (MITM) attacks, token modification, and replay attacks are prevalent in adversarial attempts to breach the security of tokens during transmission. When these vulnerabilities are not addressed, they can compromise token integrity and the security… More >

  • Open Access

    ARTICLE

    Quantum-Resistant Secure Aggregation for Healthcare Federated Learning

    Chia-Hui Liu1, Zhen-Yu Wu2,*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.075495 - 12 March 2026

    Abstract Federated Learning (FL) enables collaborative medical model training without sharing sensitive patient data. However, existing FL systems face increasing security risks from post quantum adversaries and often incur non-negligible computational and communication overhead when encryption is applied. At the same time, training high performance AI models requires large volumes of high quality data, while medical data such as patient information, clinical records, and diagnostic reports are highly sensitive and subject to strict privacy regulations, including HIPAA and GDPR. Traditional centralized machine learning approaches therefore pose significant challenges for cross institutional collaboration in healthcare. To address… More >

  • Open Access

    ARTICLE

    Secure Rate Maximization for UAV-RIS-Aided IoT Network in Smart Grid

    Jian Wu*, Xiaowei Hao, Chao Han

    Energy Engineering, Vol.123, No.3, 2026, DOI:10.32604/ee.2025.071023 - 27 February 2026

    Abstract Owing to the development of communication technologies and control systems, the integration of numerous Internet of Things (IoT) nodes into the power grid has become increasingly prevalent. These nodes are deployed to gather operational data from various distributed energy sources and monitor real-time energy consumption, thereby transforming the traditional power grid into a smart grid (SG). However, the openness of wireless communication channels introduces vulnerabilities, as it allows potential eavesdroppers to intercept sensitive information. This poses threats to the secure and efficient operation of the IoT-driven smart grid. To address these challenges, we propose a… More >

  • Open Access

    ARTICLE

    TeachSecure-CTI: Adaptive Cybersecurity Curriculum Generation Using Threat Dynamics and AI

    Alaa Tolah*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074997 - 10 February 2026

    Abstract The rapidly evolving cybersecurity threat landscape exposes a critical flaw in traditional educational programs where static curricula cannot adapt swiftly to novel attack vectors. This creates a significant gap between theoretical knowledge and the practical defensive capabilities needed in the field. To address this, we propose TeachSecure-CTI, a novel framework for adaptive cybersecurity curriculum generation that integrates real-time Cyber Threat Intelligence (CTI) with AI-driven personalization. Our framework employs a layered architecture featuring a CTI ingestion and clustering module, natural language processing for semantic concept extraction, and a reinforcement learning agent for adaptive content sequencing. By… More >

  • Open Access

    ARTICLE

    Toward Secure and Auditable Data Sharing: A Cross-Chain CP-ABE Framework

    Ye Tian1,*, Zhuokun Fan1, Yifeng Zhang2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073935 - 10 February 2026

    Abstract Amid the increasing demand for data sharing, the need for flexible, secure, and auditable access control mechanisms has garnered significant attention in the academic community. However, blockchain-based ciphertext-policy attribute-based encryption (CP-ABE) schemes still face cumbersome ciphertext re-encryption and insufficient oversight when handling dynamic attribute changes and cross-chain collaboration. To address these issues, we propose a dynamic permission attribute-encryption scheme for multi-chain collaboration. This scheme incorporates a multi-authority architecture for distributed attribute management and integrates an attribute revocation and granting mechanism that eliminates the need for ciphertext re-encryption, effectively reducing both computational and communication overhead. It More >

Displaying 1-10 on page 1 of 361. Per Page