Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (524)
  • Open Access

    ARTICLE

    CAMSNet: Few-Shot Semantic Segmentation via Class Activation Map and Self-Cross Attention Block

    Jingjing Yan1, Xuyang Zhuang2,*, Xuezhuan Zhao1,2, Xiaoyan Shao1,*, Jiaqi Han1

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5363-5386, 2025, DOI:10.32604/cmc.2025.059709 - 06 March 2025

    Abstract The key to the success of few-shot semantic segmentation (FSS) depends on the efficient use of limited annotated support set to accurately segment novel classes in the query set. Due to the few samples in the support set, FSS faces challenges such as intra-class differences, background (BG) mismatches between query and support sets, and ambiguous segmentation between the foreground (FG) and BG in the query set. To address these issues, The paper propose a multi-module network called CAMSNet, which includes four modules: the General Information Module (GIM), the Class Activation Map Aggregation (CAMA) module, the… More >

  • Open Access

    ARTICLE

    Blockchain-Based Trust Model for Inter-Domain Routing

    Qiong Yang1, Li Ma1,2,*, Sami Ullah3, Shanshan Tu1, Hisham Alasmary4, Muhammad Waqas5,6

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4821-4839, 2025, DOI:10.32604/cmc.2025.059497 - 06 March 2025

    Abstract Border Gateway Protocol (BGP), as the standard inter-domain routing protocol, is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems (AS). BGP nodes, communicating in a distributed dynamic environment, face several security challenges, with trust being one of the most important issues in inter-domain routing. Existing research, which performs trust evaluation when exchanging routing information to suppress malicious routing behavior, cannot meet the scalability requirements of BGP nodes. In this paper, we propose a blockchain-based trust model for inter-domain routing. Our model achieves scalability by allowing the master node of… More >

  • Open Access

    ARTICLE

    Rolling Bearing Fault Diagnosis Based on MTF Encoding and CBAM-LCNN Mechanism

    Wei Liu1, Sen Liu2,3,*, Yinchao He2, Jiaojiao Wang1, Yu Gu1

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4863-4880, 2025, DOI:10.32604/cmc.2025.059295 - 06 March 2025

    Abstract To address the issues of slow diagnostic speed, low accuracy, and poor generalization performance in traditional rolling bearing fault diagnosis methods, we propose a rolling bearing fault diagnosis method based on Markov Transition Field (MTF) image encoding combined with a lightweight convolutional neural network that integrates a Convolutional Block Attention Module (CBAM-LCNN). Specifically, we first use the Markov Transition Field to convert the original one-dimensional vibration signals of rolling bearings into two-dimensional images. Then, we construct a lightweight convolutional neural network incorporating the convolutional attention module (CBAM-LCNN). Finally, the two-dimensional images obtained from MTF mapping… More >

  • Open Access

    ARTICLE

    A Blockchain Cross-Chain Transaction Protection Scheme Based on FHE

    Hongliang Tian, Zuoqing Li*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3983-4002, 2025, DOI:10.32604/cmc.2025.059103 - 06 March 2025

    Abstract Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes. To address these issues, a blockchain cross-chain transaction protection scheme based on Fully Homomorphic Encryption (FHE) is proposed. In the proposed scheme, the functional relationship is established by Box-Muller, Discrete Gaussian Distribution Function (DGDF) and Uniform Random Distribution Function (URDF) are used to improve the security and efficiency of key generation. Subsequently, the data preprocessing function is introduced to perform cleaning, deduplication, and normalization operations on the transaction data of multi-key signature, and it is classified into… More >

  • Open Access

    REVIEW

    A Review of the Numerical Methods for Diblock Copolymer Melts

    Youngjin Hwang, Seungyoon Kang, Junseok Kim*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1811-1838, 2025, DOI:10.32604/cmc.2025.061071 - 17 February 2025

    Abstract This review paper provides a comprehensive introduction to various numerical methods for the phase-field model used to simulate the phase separation dynamics of diblock copolymer melts. Diblock copolymer systems form complex structures at the nanometer scale and play a significant role in various applications. The phase-field model, in particular, is essential for describing the formation and evolution of these structures and is widely used as a tool to effectively predict the movement of phase boundaries and the distribution of phases over time. In this paper, we discuss the principles and implementations of various numerical methodologies More >

  • Open Access

    ARTICLE

    LSBSP: A Lightweight Sharding Method of Blockchain Based on State Pruning for Efficient Data Sharing in IoMT

    Guoqiong Liao1,3, Yinxiang Lei1,2,*, Yufang Xie1, Neal N. Xiong4

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3309-3335, 2025, DOI:10.32604/cmc.2024.060077 - 17 February 2025

    Abstract As the Internet of Medical Things (IoMT) continues to expand, smart health-monitoring devices generate vast amounts of valuable data while simultaneously raising critical security and privacy challenges. Blockchain technology presents a promising avenue to address these concerns due to its inherent decentralization and security features. However, scalability remains a persistent hurdle, particularly for IoMT applications that involve large-scale networks and resource-constrained devices. This paper introduces a novel lightweight sharding method tailored to the unique demands of IoMT data sharing. Our approach enhances state bootstrapping efficiency and reduces operational overhead by utilizing a dual-chain structure comprising… More >

  • Open Access

    ARTICLE

    A Trusted Distributed Oracle Scheme Based on Share Recovery Threshold Signature

    Shihao Wang1, Xuehui Du1,*, Xiangyu Wu1, Qiantao Yang1,2, Wenjuan Wang1, Yu Cao1, Aodi Liu1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3355-3379, 2025, DOI:10.32604/cmc.2024.059722 - 17 February 2025

    Abstract With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put… More >

  • Open Access

    ARTICLE

    An Efficient Anti-Quantum Blind Signature with Forward Security for Blockchain-Enabled Internet of Medical Things

    Gang Xu1,2,6, Xinyu Fan1, Xiu-Bo Chen2, Xin Liu4, Zongpeng Li5, Yanhui Mao6,7, Kejia Zhang3,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2293-2309, 2025, DOI:10.32604/cmc.2024.057882 - 17 February 2025

    Abstract Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure,… More >

  • Open Access

    ARTICLE

    Combined Architecture of Destination Sequence Distance Vector (DSDV) Routing with Software Defined Networking (SDN) and Blockchain in Cyber-Physical Systems

    Jawad Ahmad Ansari1, Mohamad Khairi Ishak2,*, Khalid Ammar2

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2311-2330, 2025, DOI:10.32604/cmc.2025.057848 - 17 February 2025

    Abstract Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and… More >

  • Open Access

    ARTICLE

    Detecting Ethereum Ponzi Scheme Based on Hybrid Sampling for Smart Contract

    Yuanjun Qu, Xiameng Si*, Haiyan Kang, Hanlin Zhou

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3111-3130, 2025, DOI:10.32604/cmc.2024.057368 - 17 February 2025

    Abstract With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, its anonymity has provided new ways for Ponzi schemes to commit fraud, posing significant risks to investors. Current research still has some limitations, for example, Ponzi schemes are difficult to detect in the early stages of smart contract deployment, and data imbalance is not considered. In addition, there is room for improving the detection accuracy. To address the above issues, this paper proposes LT-SPSD… More >

Displaying 1-10 on page 1 of 524. Per Page