Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,932)
  • Open Access

    ARTICLE

    EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack

    Yong Xie1, Fang Xu2, Xiang Li1, Songsong Zhang1, Xiaodan Zhang1,*, Muhammad Israr3

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 903-924, 2019, DOI:10.32604/cmc.2019.05309

    Abstract Wireless sensor networks (WSNs) are the major contributors to big data acquisition. The authenticity and integrity of the data are two most important basic requirements for various services based on big data. Data aggregation is a promising method to decrease operation cost for resource-constrained WSNs. However, the process of data acquisitions in WSNs are in open environments, data aggregation is vulnerable to more special security attacks with hiding feature and subjective fraudulence, such as coalition attack. Aimed to provide data authenticity and integrity protection for WSNs, an efficient and secure identity-based aggregate signature scheme (EIAS) is proposed in this paper.… More >

  • Open Access

    ARTICLE

    Defense Against Poisoning Attack via Evaluating Training Samples Using Multiple Spectral Clustering Aggregation Method

    Wentao Zhao1, Pan Li1,*, Chengzhang Zhu1,2, Dan Liu1, Xiao Liu1

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 817-832, 2019, DOI:10.32604/cmc.2019.05957

    Abstract The defense techniques for machine learning are critical yet challenging due to the number and type of attacks for widely applied machine learning algorithms are significantly increasing. Among these attacks, the poisoning attack, which disturbs machine learning algorithms by injecting poisoning samples, is an attack with the greatest threat. In this paper, we focus on analyzing the characteristics of positioning samples and propose a novel sample evaluation method to defend against the poisoning attack catering for the characteristics of poisoning samples. To capture the intrinsic data characteristics from heterogeneous aspects, we first evaluate training data by multiple criteria, each of… More >

  • Open Access

    ARTICLE

    A HEVC Video Steganalysis Algorithm Based on PU Partition Modes

    Zhonghao Li1, Laijin Meng1, Shutong Xu1, Zhaohong Li1,2,*, Yunqing Shi3, Yuanchang Liang1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 563-574, 2019, DOI:10.32604/cmc.2019.05565

    Abstract Steganalysis is a technique used for detecting the existence of secret information embedded into cover media such as images and videos. Currently, with the higher speed of the Internet, videos have become a kind of main methods for transferring information. The latest video coding standard High Efficiency Video Coding (HEVC) shows better coding performance compared with the H.264/AVC standard published in the previous time. Therefore, since the HEVC was published, HEVC videos have been widely used as carriers of hidden information.
    In this paper, a steganalysis algorithm is proposed to detect the latest HEVC video steganography method which is based… More >

  • Open Access

    ARTICLE

    Analysis and Improvement of Steganography Protocol Based on Bell States in Noise Environment

    Zhiguo Qu1,*, Shengyao Wu2, Wenjie Liu1, Xiaojun Wang3

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 607-624, 2019, DOI:10.32604/cmc.2019.02656

    Abstract In the field of quantum communication, quantum steganography is an important branch of quantum information hiding. In a realistic quantum communication system, quantum noises are unavoidable and will seriously impact the safety and reliability of the quantum steganographic system. Therefore, it is very important to analyze the influence of noise on the quantum steganography protocol and how to reduce the effect of noise. This paper takes the quantum steganography protocol proposed in 2010 as an example to analyze the effects of noises on information qubits and secret message qubits in the four primary quantum noise environments. The results show that… More >

  • Open Access

    ARTICLE

    Waveband Selection with Equivalent Prediction Performance for FTIR/ATR Spectroscopic Analysis of COD in Sugar Refinery Waste Water

    Jun Xie1, Dapeng Sun1, Jiaxiang Cai2, Fuhong Cai1,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 687-695, 2019, DOI:10.32604/cmc.2019.03658

    Abstract The level of chemical oxygen demand (COD) is an important index to evaluate whether sewage meets the discharge requirements, so corresponding tests should be carried out before discharge. Fourier transform infrared spectroscopy (FTIR) and attenuated total reflectance (ATR) can detect COD in sewage effectively, which has advantages over conventional chemical analysis methods. And the selection of characteristic bands was one of the key links in the application of FTIR/ATR spectroscopy. In this work, based on the moving window partial least-squares (MWPLS) regression to select a characteristic wavelength, a method of equivalent wavelength selection was proposed combining with paired t-test equivalent… More >

  • Open Access

    ARTICLE

    Numerical Prediction of Dynamically Propagating and Branching Cracks Using Moving Finite Element Method

    S. Tchouikov1, T. Nishioka1, T. Fujimoto1

    CMC-Computers, Materials & Continua, Vol.1, No.2, pp. 191-204, 2004, DOI:10.3970/cmc.2004.001.191

    Abstract Phenomena of dynamic crack branching are investigated numerically from a macroscopic point of view. Repetitive branching phenomena, interaction of cracks after bifurcation and their stability, bifurcation into two and three branches were the objectives of this research. For the analysis of dynamic crack branching, recently we developed moving finite element method based on Delaunay automatic triangulation [Nishioka, Furutuka, Tchouikov and Fujimoto (2002)]. In this study this method was extended to be applicable for complicated crack branching phenomena, such as bifurcation of the propagating crack into more than two branches, multiple crack bifurcation and so on. The switching method of the… More >

  • Open Access

    ARTICLE

    A Meshless Local Petrov-Galerkin (MLPG) Approach for 3-Dimensional Elasto-dynamics

    Z. D. Han1, S. N. Atluri2

    CMC-Computers, Materials & Continua, Vol.1, No.2, pp. 129-140, 2004, DOI:10.3970/cmc.2004.001.129

    Abstract A Meshless Local Petrov-Galerkin (MLPG) method has been developed for solving 3D elasto-dynamic problems. It is derived from the local weak form of the equilibrium equations by using the general MLPG concept. By incorporating the moving least squares (MLS) approximations for trial and test functions, the local weak form is discretized, and is integrated over the local sub-domain for the transient structural analysis. The present numerical technique imposes a correction to the accelerations, to enforce the kinematic boundary conditions in the MLS approximation, while using an explicit time-integration algorithm. Numerical examples for solving the transient response of the elastic structures… More >

  • Open Access

    ARTICLE

    Color Image Steganalysis Based on Residuals of Channel Differences

    Yuhan Kang1, Fenlin Liu1, Chunfang Yang1,*, Xiangyang Luo1, Tingting Zhang2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 315-329, 2019, DOI:10.32604/cmc.2019.05242

    Abstract This study proposes a color image steganalysis algorithm that extracts high-dimensional rich model features from the residuals of channel differences. First, the advantages of features extracted from channel differences are analyzed, and it shown that features extracted in this manner should be able to detect color stego images more effectively. A steganalysis feature extraction method based on channel differences is then proposed, and used to improve two types of typical color image steganalysis features. The improved features are combined with existing color image steganalysis features, and the ensemble classifiers are trained to detect color stego images. The experimental results indicate… More >

  • Open Access

    ARTICLE

    Anti-JPEG Compression Steganography Based on the High Tense Region Locating Method

    Yang Wu1, Weiping Shang2,*, Jiahao Chen3

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 199-214, 2019, DOI:10.32604/cmc.2019.05194

    Abstract Robust data hiding techniques attempt to construct covert communication in a lossy public channel. Nowadays, the existing robust JPEG steganographic algorithms cannot overcome the side-information missing situation. Thus, this paper proposes a new robust JPEG steganographic algorithm based on the high tense region location method which needs no side-information of lossy channel. First, a tense region locating method is proposed based on the Harris-Laplacian feature point. Then, robust cover object generating processes are described. Last, the advanced embedding cost function is proposed. A series of experiments are conducted on various JPEG image sets and the results show that the proposed… More >

  • Open Access

    ARTICLE

    The Influence of Third Order Elastic Constants on Axisymmetric Wave Propagation Velocity in the Two-Layered Pre-Stressed Hollow Cylinder

    S.D. Akbarov1,2

    CMC-Computers, Materials & Continua, Vol.32, No.1, pp. 29-60, 2012, DOI:10.3970/cmc.2012.032.029

    Abstract By the use of the Murnaghan potential the influence of third order elastic constants on axisymmetric longitudinal wave propagation velocity in a pre-stressed two-layered circular hollow cylinder is investigated. This investigation is carried out within the scope of the piecewise homogeneous body model by utilizing the first version of the small initial deformation theory of the Three-dimensional Linearized Theory of Elastic Waves in Initially Stressed Bodies. Numerical results are obtained and analyzed for the cases where the material of the outer hollow cylinder material is aluminum, but the material of the inner cylinder is steel (Case 1) and tungsten (Case… More >

Displaying 2461-2470 on page 247 of 2932. Per Page