Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (641)
  • Open Access

    ARTICLE

    Multilevel Military Image Encryption Based on Tri-Independent Keying Approach

    Shereen S. Jumaa1, Mohsin H. Challoob2, Amjad J. Humaidi2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074752 - 10 February 2026

    Abstract Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access. This paper proposes a new Tri-independent keying method for encrypting military images. The proposed encryption method is based on multilevel security stages of pixel-level scrambling, bit-level manipulation, and block-level shuffling operations. For having a vast key space, the input password is hashed by the Secure Hash Algorithm 256-bit (SHA-256) for generating independently deterministic keys used in the multilevel stages. A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive… More >

  • Open Access

    ARTICLE

    Toward Secure and Auditable Data Sharing: A Cross-Chain CP-ABE Framework

    Ye Tian1,*, Zhuokun Fan1, Yifeng Zhang2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073935 - 10 February 2026

    Abstract Amid the increasing demand for data sharing, the need for flexible, secure, and auditable access control mechanisms has garnered significant attention in the academic community. However, blockchain-based ciphertext-policy attribute-based encryption (CP-ABE) schemes still face cumbersome ciphertext re-encryption and insufficient oversight when handling dynamic attribute changes and cross-chain collaboration. To address these issues, we propose a dynamic permission attribute-encryption scheme for multi-chain collaboration. This scheme incorporates a multi-authority architecture for distributed attribute management and integrates an attribute revocation and granting mechanism that eliminates the need for ciphertext re-encryption, effectively reducing both computational and communication overhead. It More >

  • Open Access

    REVIEW

    Quantum Secure Multiparty Computation: Bridging Privacy, Security, and Scalability in the Post-Quantum Era

    Sghaier Guizani1,*, Tehseen Mazhar2,3,*, Habib Hamam4,5,6,7

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073883 - 10 February 2026

    Abstract The advent of quantum computing poses a significant challenge to traditional cryptographic protocols, particularly those used in Secure Multiparty Computation (MPC), a fundamental cryptographic primitive for privacy-preserving computation. Classical MPC relies on cryptographic techniques such as homomorphic encryption, secret sharing, and oblivious transfer, which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries. This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI, IEEE Explore, Springer, and Elsevier, examining the applications, types, and security issues with the solution of… More >

  • Open Access

    ARTICLE

    ISTIRDA: An Efficient Data Availability Sampling Scheme for Lightweight Nodes in Blockchain

    Jiaxi Wang1, Wenbo Sun2, Ziyuan Zhou1, Shihua Wu1, Jiang Xu1, Shan Ji3,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073237 - 10 February 2026

    Abstract Lightweight nodes are crucial for blockchain scalability, but verifying the availability of complete block data puts significant strain on bandwidth and latency. Existing data availability sampling (DAS) schemes either require trusted setups or suffer from high communication overhead and low verification efficiency. This paper presents ISTIRDA, a DAS scheme that lets light clients certify availability by sampling small random codeword symbols. Built on ISTIR, an improved Reed–Solomon interactive oracle proof of proximity, ISTIRDA combines adaptive folding with dynamic code rate adjustment to preserve soundness while lowering communication. This paper formalizes opening consistency and prove security… More >

  • Open Access

    ARTICLE

    FDEFusion: End-to-End Infrared and Visible Image Fusion Method Based on Frequency Decomposition and Enhancement

    Ming Chen1,*, Guoqiang Ma2, Ping Qi1, Fucheng Wang1, Lin Shen3, Xiaoya Pi1

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072623 - 10 February 2026

    Abstract In the image fusion field, fusing infrared images (IRIs) and visible images (VIs) excelled is a key area. The differences between IRIs and VIs make it challenging to fuse both types into a high-quality image. Accordingly, efficiently combining the advantages of both images while overcoming their shortcomings is necessary. To handle this challenge, we developed an end-to-end IRI and VI fusion method based on frequency decomposition and enhancement. By applying concepts from frequency domain analysis, we used the layering mechanism to better capture the salient thermal targets from the IRIs and the rich textural information… More >

  • Open Access

    ARTICLE

    AdvYOLO: An Improved Cross-Conv-Block Feature Fusion-Based YOLO Network for Transferable Adversarial Attacks on ORSIs Object Detection

    Leyu Dai1,2,3, Jindong Wang1,2,3, Ming Zhou1,2,3, Song Guo1,2,3, Hengwei Zhang1,2,3,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072449 - 10 February 2026

    Abstract In recent years, with the rapid advancement of artificial intelligence, object detection algorithms have made significant strides in accuracy and computational efficiency. Notably, research and applications of Anchor-Free models have opened new avenues for real-time target detection in optical remote sensing images (ORSIs). However, in the realm of adversarial attacks, developing adversarial techniques tailored to Anchor-Free models remains challenging. Adversarial examples generated based on Anchor-Based models often exhibit poor transferability to these new model architectures. Furthermore, the growing diversity of Anchor-Free models poses additional hurdles to achieving robust transferability of adversarial attacks. This study presents… More >

  • Open Access

    ARTICLE

    A Multi-Block Material Balance Framework for Connectivity Evaluation and Optimization of Water-Drive Gas Reservoirs

    Fankun Meng1,2,3, Yuyang Liu1,2,*, Xiaohua Liu4, Chenlong Duan1,2, Yuhui Zhou1,2,3

    FDMP-Fluid Dynamics & Materials Processing, Vol.22, No.1, 2026, DOI:10.32604/fdmp.2026.075865 - 06 February 2026

    Abstract Carbonate gas reservoirs are often characterized by strong heterogeneity, complex inter-well connectivity, extensive edge or bottom water, and unbalanced production, challenges that are also common in many heterogeneous gas reservoirs with intricate storage and flow behavior. To address these issues within a unified, data-driven framework, this study develops a multi-block material balance model that accounts for inter-block flow and aquifer influx, and is applicable to a wide range of reservoir types. The model incorporates inter-well and well-group conductive connectivity together with pseudo–steady-state aquifer support. The governing equations are solved using a Newton–Raphson scheme, while particle More > Graphic Abstract

    A Multi-Block Material Balance Framework for Connectivity Evaluation and Optimization of Water-Drive Gas Reservoirs

  • Open Access

    ARTICLE

    Flowback Behavior of Deep Coalbed Methane Horizontal Wells

    Wei Sun1,2, Yanqing Feng1,2,*, Yuan Wang1,2, Zengping Zhao1,2, Qian Wang2, Xiangyun Li3, Dong Feng4

    FDMP-Fluid Dynamics & Materials Processing, Vol.22, No.1, 2026, DOI:10.32604/fdmp.2026.075630 - 06 February 2026

    Abstract Significant differences exist between deep and medium-shallow coalbed methane (CBM) reservoirs. The unclear understanding of flowback and production behavior severely constrains the development of deep CBM resources. To address this challenge, guided by the gas-liquid two-phase flow theory in ultra-low permeability reservoirs, and integrating theoretical analysis, numerical simulation, and insights from production practices, this study classifies the flowback and production stages of deep CBM well considering the Daning-Jixian Block, Eastern Ordos Basin as a representative case. We summarize the flowback characteristics for each stage and establish a standard flowback production type curve, aiming to guide… More > Graphic Abstract

    Flowback Behavior of Deep Coalbed Methane Horizontal Wells

  • Open Access

    REVIEW

    A Systematic Review of Frameworks for the Detection and Prevention of Card-Not-Present (CNP) Fraud

    Kwabena Owusu-Mensah*, Edward Danso Ansong , Kofi Sarpong Adu-Manu, Winfred Yaokumah

    Journal of Cyber Security, Vol.8, pp. 33-92, 2026, DOI:10.32604/jcs.2026.074265 - 20 January 2026

    Abstract The rapid growth of digital payment systems and remote financial services has led to a significant increase in Card-Not-Present (CNP) fraud, which is now the primary source of card-related losses worldwide. Traditional rule-based fraud detection methods are becoming insufficient due to several challenges, including data imbalance, concept drift, privacy concerns, and limited interpretability. In response to these issues, a systematic review of twenty-four CNP fraud detection frameworks developed between 2014 and 2025 was conducted. This review aimed to identify the technologies, strategies, and design considerations necessary for adaptive solutions that align with evolving regulatory standards.… More >

  • Open Access

    ARTICLE

    Gut Associated Metabolites Enhance PD-L1 Blockade Efficacy in Prostate Cancer

    Ke Liu1,2,3,#, Xia Xue1,2,3,#, Haiming Qin4,5,#, Jiaying Zhu6,#, Meng Jin1,6, Die Dai6, Youcai Tang1, Ihtisham Bukhari1, Hangfan Liu1, Chunjing Qiu1, Feifei Ren1, Pengyuan Zheng1,2,3, Yang Mi1,2,3,*, Weihua Chen6,7,*

    Oncology Research, Vol.34, No.2, 2026, DOI:10.32604/or.2025.072661 - 19 January 2026

    Abstract Background: The gut microbiome has emerged as a critical modulator of cancer immunotherapy response. However, the mechanisms by which gut-associated metabolites influence checkpoint blockade efficacy in prostate cancer (PC) remain not fully explored. The study aimed to explore how gut metabolites regulate death-ligand 1 (PD-L1) blockade via exosomes and boost immune checkpoint inhibitors (ICIs) in PC. Methods: We recruited 70 PC patients to set up into five subgroups. The integrated multi-omics analysis was performed. In parallel, we validated the function of gut microbiome-associated metabolites on PD-L1 production and immunotherapy treatment efficacy in PC cell lines… More >

Displaying 1-10 on page 1 of 641. Per Page