Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Active Protection Scheme of DNN Intellectual Property Rights Based on Feature Layer Selection and Hyperchaotic Mapping

    Xintao Duan1,2,*, Yinhang Wu1, Zhao Wang1, Chuan Qin3

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4887-4906, 2025, DOI:10.32604/cmc.2025.064620 - 30 July 2025

    Abstract Deep neural network (DNN) models have achieved remarkable performance across diverse tasks, leading to widespread commercial adoption. However, training high-accuracy models demands extensive data, substantial computational resources, and significant time investment, making them valuable assets vulnerable to unauthorized exploitation. To address this issue, this paper proposes an intellectual property (IP) protection framework for DNN models based on feature layer selection and hyper-chaotic mapping. Firstly, a sensitivity-based importance evaluation algorithm is used to identify the key feature layers for encryption, effectively protecting the core components of the model. Next, the L1 regularization criterion is applied to More >

  • Open Access

    ARTICLE

    Secure Image Communication Using Galois Field, Hyper 3D Logistic Map, and B92 Quantum Protocol

    De Rosal Ignatius Moses Setiadi1,2, Nova Rijati2,*, Ahmad Rofiqul Muslikh3, Bonifacius Vicky Indriyono4, Aceng Sambas5,6

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4435-4463, 2024, DOI:10.32604/cmc.2024.058478 - 19 December 2024

    Abstract In this paper, we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext encryption. Specifically, we leverage the B92 Quantum Key Distribution (QKD) protocol to secure the distribution of encryption keys, which are further processed through Galois Field (GF(28)) operations for increased security. The encrypted plaintext is secured using a newly developed Hyper 3D Logistic Map (H3LM), a chaotic system that generates complex and unpredictable sequences, thereby ensuring strong confusion and diffusion in the encryption process. This hybrid approach More >

  • Open Access

    ARTICLE

    Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm

    Mohammed S. Alshehri1, Sultan Almakdi1,*, Mimonah Al Qathrady2, Jawad Ahmad3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2401-2414, 2023, DOI:10.32604/csse.2023.036152 - 09 February 2023

    Abstract Chaos-based cryptosystems are considered a secure mode of communication due to their reliability. Chaotic maps are associated with the other domains to construct robust encryption algorithms. There exist numerous encryption schemes in the literature based on chaotic maps. This work aims to propose an attack on a recently proposed hyper-chaotic map-based cryptosystem. The core notion of the original algorithm was based on permutation and diffusion. A bit-level permutation approach was used to do the permutation row-and column-wise. The diffusion was executed in the forward and backward directions. The statistical strength of the cryptosystem has been… More >

Displaying 1-10 on page 1 of 3. Per Page