Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    Design and Application of a New Distributed Dynamic Spatio-Temporal Privacy Preserving Mechanisms

    Jiacheng Xiong1, Xingshu Chen1,2,3,*, Xiao Lan2,3, Liangguo Chen1,2

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2273-2303, 2025, DOI:10.32604/cmc.2025.063984 - 03 July 2025

    Abstract In the era of big data, the growing number of real-time data streams often contains a lot of sensitive privacy information. Releasing or sharing this data directly without processing will lead to serious privacy information leakage. This poses a great challenge to conventional privacy protection mechanisms (CPPM). The existing data partitioning methods ignore the number of data replications and information exchanges, resulting in complex distance calculations and inefficient indexing for high-dimensional data. Therefore, CPPM often fails to meet the stringent requirements of efficiency and reliability, especially in dynamic spatiotemporal environments. Addressing this concern, we proposed… More >

  • Open Access

    ARTICLE

    Optimizing System Latency for Blockchain-Encrypted Edge Computing in Internet of Vehicles

    Cui Zhang1, Maoxin Ji2, Qiong Wu2,*, Pingyi Fan3, Qiang Fan4

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3519-3536, 2025, DOI:10.32604/cmc.2025.061292 - 16 April 2025

    Abstract As Internet of Vehicles (IoV) technology continues to advance, edge computing has become an important tool for assisting vehicles in handling complex tasks. However, the process of offloading tasks to edge servers may expose vehicles to malicious external attacks, resulting in information loss or even tampering, thereby creating serious security vulnerabilities. Blockchain technology can maintain a shared ledger among servers. In the Raft consensus mechanism, as long as more than half of the nodes remain operational, the system will not collapse, effectively maintaining the system’s robustness and security. To protect vehicle information, we propose a… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving Graph Neural Network Framework with Attention Mechanism for Computational Offloading in the Internet of Vehicles

    Aishwarya Rajasekar*, Vetriselvi Vetrian

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 225-254, 2025, DOI:10.32604/cmes.2025.062642 - 11 April 2025

    Abstract The integration of technologies like artificial intelligence, 6G, and vehicular ad-hoc networks holds great potential to meet the communication demands of the Internet of Vehicles and drive the advancement of vehicle applications. However, these advancements also generate a surge in data processing requirements, necessitating the offloading of vehicular tasks to edge servers due to the limited computational capacity of vehicles. Despite recent advancements, the robustness and scalability of the existing approaches with respect to the number of vehicles and edge servers and their resources, as well as privacy, remain a concern. In this paper, a lightweight… More >

  • Open Access

    ARTICLE

    MG-SLAM: RGB-D SLAM Based on Semantic Segmentation for Dynamic Environment in the Internet of Vehicles

    Fengju Zhang1, Kai Zhu2,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2353-2372, 2025, DOI:10.32604/cmc.2024.058944 - 17 February 2025

    Abstract The Internet of Vehicles (IoV) has become an important direction in the field of intelligent transportation, in which vehicle positioning is a crucial part. SLAM (Simultaneous Localization and Mapping) technology plays a crucial role in vehicle localization and navigation. Traditional Simultaneous Localization and Mapping (SLAM) systems are designed for use in static environments, and they can result in poor performance in terms of accuracy and robustness when used in dynamic environments where objects are in constant movement. To address this issue, a new real-time visual SLAM system called MG-SLAM has been developed. Based on ORB-SLAM2,… More >

  • Open Access

    ARTICLE

    A Support Vector Machine (SVM) Model for Privacy Recommending Data Processing Model (PRDPM) in Internet of Vehicles

    Ali Alqarni*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 389-406, 2025, DOI:10.32604/cmc.2024.059238 - 03 January 2025

    Abstract Open networks and heterogeneous services in the Internet of Vehicles (IoV) can lead to security and privacy challenges. One key requirement for such systems is the preservation of user privacy, ensuring a seamless experience in driving, navigation, and communication. These privacy needs are influenced by various factors, such as data collected at different intervals, trip durations, and user interactions. To address this, the paper proposes a Support Vector Machine (SVM) model designed to process large amounts of aggregated data and recommend privacy-preserving measures. The model analyzes data based on user demands and interactions with service More >

  • Open Access

    ARTICLE

    Design and Develop Function for Research Based Application of Intelligent Internet-of-Vehicles Model Based on Fog Computing

    Abduladheem Fadhil Khudhur*, Ayça Kurnaz Türkben, Sefer Kurnaz

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3805-3824, 2024, DOI:10.32604/cmc.2024.056941 - 19 December 2024

    Abstract The fast growth in Internet-of-Vehicles (IoV) applications is rendering energy efficiency management of vehicular networks a highly important challenge. Most of the existing models are failing to handle the demand for energy conservation in large-scale heterogeneous environments. Based on Large Energy-Aware Fog (LEAF) computing, this paper proposes a new model to overcome energy-inefficient vehicular networks by simulating large-scale network scenarios. The main inspiration for this work is the ever-growing demand for energy efficiency in IoV-most particularly with the volume of generated data and connected devices. The proposed LEAF model enables researchers to perform simulations of… More >

  • Open Access

    ARTICLE

    Computation Offloading in Edge Computing for Internet of Vehicles via Game Theory

    Jianhua Liu*, Jincheng Wei, Rongxin Luo, Guilin Yuan, Jiajia Liu, Xiaoguang Tu

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1337-1361, 2024, DOI:10.32604/cmc.2024.056286 - 15 October 2024

    Abstract With the rapid advancement of Internet of Vehicles (IoV) technology, the demands for real-time navigation, advanced driver-assistance systems (ADAS), vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, and multimedia entertainment systems have made in-vehicle applications increasingly computing-intensive and delay-sensitive. These applications require significant computing resources, which can overwhelm the limited computing capabilities of vehicle terminals despite advancements in computing hardware due to the complexity of tasks, energy consumption, and cost constraints. To address this issue in IoV-based edge computing, particularly in scenarios where available computing resources in vehicles are scarce, a multi-master and multi-slave double-layer game model More >

  • Open Access

    ARTICLE

    Blockchain-Enabled Federated Learning with Differential Privacy for Internet of Vehicles

    Chi Cui1,2, Haiping Du2, Zhijuan Jia1,*, Yuchu He1, Lipeng Wang1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1581-1593, 2024, DOI:10.32604/cmc.2024.055557 - 15 October 2024

    Abstract The rapid evolution of artificial intelligence (AI) technologies has significantly propelled the advancement of the Internet of Vehicles (IoV). With AI support, represented by machine learning technology, vehicles gain the capability to make intelligent decisions. As a distributed learning paradigm, federated learning (FL) has emerged as a preferred solution in IoV. Compared to traditional centralized machine learning, FL reduces communication overhead and improves privacy protection. Despite these benefits, FL still faces some security and privacy concerns, such as poisoning attacks and inference attacks, prompting exploration into blockchain integration to enhance its security posture. This paper… More >

  • Open Access

    ARTICLE

    Blockchain-Based Message Authentication Scheme for Internet of Vehicles in an Edge Computing Environment

    Qiping Zou1, Zhong Ruan2,*, Huaning Song1

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1301-1328, 2024, DOI:10.32604/csse.2024.051796 - 13 September 2024

    Abstract As an important application of intelligent transportation system, Internet of Vehicles (IoV) provides great convenience for users. Users can obtain real-time traffic conditions through the IoV’s services, plan users' travel routes, and improve travel efficiency. However, in the IoV system, there are always malicious vehicle nodes publishing false information. Therefore, it is essential to ensure the legitimacy of the source. In addition, during the peak period of vehicle travel, the vehicle releases a large number of messages, and IoV authentication efficiency is prone to performance bottlenecks. Most existing authentication schemes have the problem of low… More >

  • Open Access

    REVIEW

    Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review

    Wufei Wu1, Javad Hassannataj Joloudari2,3,4, Senthil Kumar Jagatheesaperumal5, Kandala N. V. P. S. Rajesh6, Silvia Gaftandzhieva7,*, Sadiq Hussain8, Rahimullah Rabih9, Najibullah Haqjoo10, Mobeen Nazar11, Hamed Vahdat-Nejad9, Rositsa Doneva12

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2785-2813, 2024, DOI:10.32604/cmc.2024.053037 - 15 August 2024

    Abstract The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles (IoV) technology. The functional advantages of IoV include online communication services, accident prevention, cost reduction, and enhanced traffic regularity. Despite these benefits, IoV technology is susceptible to cyber-attacks, which can exploit vulnerabilities in the vehicle network, leading to perturbations, disturbances, non-recognition of traffic signs, accidents, and vehicle immobilization. This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning (DTL) models for Intrusion Detection Systems in the Internet of Vehicles (IDS-IoV) based on anomaly… More >

Displaying 1-10 on page 1 of 45. Per Page