Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (149)
  • Open Access

    REVIEW

    Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A Comprehensive Review of Advanced Cybersecurity Framework

    Inam Ullah Khan1, Fida Muhammad Khan1,*, Zeeshan Ali Haider1, Fahad Alturise2,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4307-4344, 2025, DOI:10.32604/cmc.2025.070189 - 23 October 2025

    Abstract The rapid expansion of the Internet of Things (IoT) has introduced significant security challenges due to the scale, complexity, and heterogeneity of interconnected devices. The current traditional centralized security models are deemed irrelevant in dealing with these threats, especially in decentralized applications where the IoT devices may at times operate on minimal resources. The emergence of new technologies, including Artificial Intelligence (AI), blockchain, edge computing, and Zero-Trust-Architecture (ZTA), is offering potential solutions as it helps with additional threat detection, data integrity, and system resilience in real-time. AI offers sophisticated anomaly detection and prediction analytics, and… More >

  • Open Access

    REVIEW

    Federated Learning in Convergence ICT: A Systematic Review on Recent Advancements, Challenges, and Future Directions

    Imran Ahmed1,#, Misbah Ahmad2,3,#, Gwanggil Jeon4,5,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4237-4273, 2025, DOI:10.32604/cmc.2025.068319 - 23 October 2025

    Abstract The rapid convergence of Information and Communication Technologies (ICT), driven by advancements in 5G/6G networks, cloud computing, Artificial Intelligence (AI), and the Internet of Things (IoT), is reshaping modern digital ecosystems. As massive, distributed data streams are generated across edge devices and network layers, there is a growing need for intelligent, privacy-preserving AI solutions that can operate efficiently at the network edge. Federated Learning (FL) enables decentralized model training without transferring sensitive data, addressing key challenges around privacy, bandwidth, and latency. Despite its benefits in enhancing efficiency, real-time analytics, and regulatory compliance, FL adoption faces… More >

  • Open Access

    ARTICLE

    VHO Algorithm for Heterogeneous Networks of UAV-Hangar Cluster Based on GA Optimization and Edge Computing

    Siliang Chen1, Dongri Shan2,*, Yansheng Niu3

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5263-5286, 2025, DOI:10.32604/cmc.2025.067892 - 23 October 2025

    Abstract With the increasing deployment of Unmanned Aerial Vehicle-Hangar (UAV-H) clusters in dynamic environments such as disaster response and precision agriculture, existing networking schemes often struggle with adaptability to complex scenarios, while traditional Vertical Handoff (VHO) algorithms fail to fully address the unique challenges of UAV-H systems, including high-speed mobility and limited computational resources. To bridge this gap, this paper proposes a heterogeneous network architecture integrating 5th Generation Mobile Communication Technology (5G) cellular networks and self-organizing mesh networks for UAV-H clusters, accompanied by a novel VHO algorithm. The proposed algorithm leverages Multi-Attribute Decision-Making (MADM) theory combined… More >

  • Open Access

    ARTICLE

    Secure Malicious Node Detection in Decentralized Healthcare Networks Using Cloud and Edge Computing with Blockchain-Enabled Federated Learning

    Raj Sonani1, Reham Alhejaili2,*, Pushpalika Chatterjee3, Khalid Hamad Alnafisah4, Jehad Ali5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3169-3189, 2025, DOI:10.32604/cmes.2025.070225 - 30 September 2025

    Abstract Healthcare networks are transitioning from manual records to electronic health records, but this shift introduces vulnerabilities such as secure communication issues, privacy concerns, and the presence of malicious nodes. Existing machine and deep learning-based anomalies detection methods often rely on centralized training, leading to reduced accuracy and potential privacy breaches. Therefore, this study proposes a Blockchain-based-Federated Learning architecture for Malicious Node Detection (BFL-MND) model. It trains models locally within healthcare clusters, sharing only model updates instead of patient data, preserving privacy and improving accuracy. Cloud and edge computing enhance the model’s scalability, while blockchain ensures More >

  • Open Access

    ARTICLE

    An Online Optimization of Prediction-Enhanced Digital Twin Migration over Edge Computing with Adaptive Information Updating

    Xinyu Yu1, Lucheng Chen2,3, Xingzhi Feng2,4, Xiaoping Lu2,4,*, Yuye Yang1, You Shi5,*

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3231-3252, 2025, DOI:10.32604/cmc.2025.066975 - 23 September 2025

    Abstract This paper investigates mobility-aware online optimization for digital twin (DT)-assisted task execution in edge computing environments. In such systems, DTs, hosted on edge servers (ESs), require proactive migration to maintain proximity to their mobile physical twin (PT) counterparts. To minimize task response latency under a stringent energy consumption constraint, we jointly optimize three key components: the status data uploading frequency from the PT, the DT migration decisions, and the allocation of computational and communication resources. To address the asynchronous nature of these decisions, we propose a novel two-timescale mobility-aware online optimization (TMO) framework. The TMO… More >

  • Open Access

    ARTICLE

    FedEPC: An Efficient and Privacy-Enhancing Clustering Federated Learning Method for Sensing-Computing Fusion Scenarios

    Ning Tang1,2, Wang Luo1,2,*, Yiwei Wang1,2, Bao Feng1,2, Shuang Yang1,2, Jiangtao Xu3, Daohua Zhu3, Zhechen Huang3, Wei Liang3

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 4091-4113, 2025, DOI:10.32604/cmc.2025.066241 - 23 September 2025

    Abstract With the deep integration of edge computing, 5G and Artificial Intelligence of Things (AIoT) technologies, the large-scale deployment of intelligent terminal devices has given rise to data silos and privacy security challenges in sensing-computing fusion scenarios. Traditional federated learning (FL) algorithms face significant limitations in practical applications due to client drift, model bias, and resource constraints under non-independent and identically distributed (Non-IID) data, as well as the computational overhead and utility loss caused by privacy-preserving techniques. To address these issues, this paper proposes an Efficient and Privacy-enhancing Clustering Federated Learning method (FedEPC). This method introduces… More >

  • Open Access

    ARTICLE

    Privacy Preserving Federated Anomaly Detection in IoT Edge Computing Using Bayesian Game Reinforcement Learning

    Fatima Asiri1, Wajdan Al Malwi1, Fahad Masood2, Mohammed S. Alshehri3, Tamara Zhukabayeva4, Syed Aziz Shah5, Jawad Ahmad6,*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3943-3960, 2025, DOI:10.32604/cmc.2025.066498 - 03 July 2025

    Abstract Edge computing (EC) combined with the Internet of Things (IoT) provides a scalable and efficient solution for smart homes. The rapid proliferation of IoT devices poses real-time data processing and security challenges. EC has become a transformative paradigm for addressing these challenges, particularly in intrusion detection and anomaly mitigation. The widespread connectivity of IoT edge networks has exposed them to various security threats, necessitating robust strategies to detect malicious activities. This research presents a privacy-preserving federated anomaly detection framework combined with Bayesian game theory (BGT) and double deep Q-learning (DDQL). The proposed framework integrates BGT… More >

  • Open Access

    ARTICLE

    Improved PPO-Based Task Offloading Strategies for Smart Grids

    Qian Wang1, Ya Zhou1,2,*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3835-3856, 2025, DOI:10.32604/cmc.2025.065465 - 03 July 2025

    Abstract Edge computing has transformed smart grids by lowering latency, reducing network congestion, and enabling real-time decision-making. Nevertheless, devising an optimal task-offloading strategy remains challenging, as it must jointly minimise energy consumption and response time under fluctuating workloads and volatile network conditions. We cast the offloading problem as a Markov Decision Process (MDP) and solve it with Deep Reinforcement Learning (DRL). Specifically, we present a three-tier architecture—end devices, edge nodes, and a cloud server—and enhance Proximal Policy Optimization (PPO) to learn adaptive, energy-aware policies. A Convolutional Neural Network (CNN) extracts high-level features from system states, enabling More >

  • Open Access

    ARTICLE

    A Multi-Objective Joint Task Offloading Scheme for Vehicular Edge Computing

    Yiwei Zhang, Xin Cui*, Qinghui Zhao

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2355-2373, 2025, DOI:10.32604/cmc.2025.065430 - 03 July 2025

    Abstract The rapid advance of Connected-Automated Vehicles (CAVs) has led to the emergence of diverse delay-sensitive and energy-constrained vehicular applications. Given the high dynamics of vehicular networks, unmanned aerial vehicles-assisted mobile edge computing (UAV-MEC) has gained attention in providing computing resources to vehicles and optimizing system costs. We model the computing offloading problem as a multi-objective optimization challenge aimed at minimizing both task processing delay and energy consumption. We propose a three-stage hybrid offloading scheme called Dynamic Vehicle Clustering Game-based Multi-objective Whale Optimization Algorithm (DVCG-MWOA) to address this problem. A novel dynamic clustering algorithm is designed… More >

  • Open Access

    ARTICLE

    Efficient Task Allocation for Energy and Execution Time Trade-Off in Edge Computing Using Multi-Objective IPSO

    Jafar Aminu1,2,*, Rohaya Latip1,*, Zurina Mohd Hanafi1, Shafinah Kamarudin1, Danlami Gabi2

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2989-3011, 2025, DOI:10.32604/cmc.2025.062451 - 03 July 2025

    Abstract As mobile edge computing continues to develop, the demand for resource-intensive applications is steadily increasing, placing a significant strain on edge nodes. These nodes are normally subject to various constraints, for instance, limited processing capability, a few energy sources, and erratic availability being some of the common ones. Correspondingly, these problems require an effective task allocation algorithm to optimize the resources through continued high system performance and dependability in dynamic environments. This paper proposes an improved Particle Swarm Optimization technique, known as IPSO, for multi-objective optimization in edge computing to overcome these issues. To this… More >

Displaying 11-20 on page 2 of 149. Per Page