Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (51)
  • Open Access

    ARTICLE

    A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture

    Yi-Bo Cao1,*, Xiu-Bo Chen1, Yun-Feng He2, Lu-Xi Liu2, Yin-Mei Che2, Xiao Wang2, Ke Xiao3, Gang Xu3, Si-Yi Chen1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2813-2827, 2024, DOI:10.32604/cmc.2024.046816

    Abstract Due to the rapid advancements in network technology, blockchain is being employed for distributed data storage. In the Internet of Things (IoT) scenario, different participants manage multiple blockchains located in different trust domains, which has resulted in the extensive development of cross-domain authentication techniques. However, the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography, posing a significant security threat. In response to the aforementioned challenges, our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset… More >

  • Open Access

    ARTICLE

    Enhancing Identity Protection in Metaverse-Based Psychological Counseling System

    Jun Lee1, Hanna Lee2, Seong Chan Lee2, Hyun Kwon3,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 617-632, 2024, DOI:10.32604/cmc.2023.045768

    Abstract Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regarding client identity. However, these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions, such as facial cues, to the counselor. This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling. The proposed system incorporates a voice modulation function that instantly modifies/masks the client’s voice to safeguard their identity. Additionally, it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s… More >

  • Open Access

    REVIEW

    Soundscapes in Arab Cities: A Systematic Review and Research Agenda

    Tallal Abdel Karim Bouzir1,*, Djihed Berkouk2,3, Theodore S. Eisenman4, Dietrich Schwela5, Nader Azab2, Mohammed M. Gomma2,6, Samiha Boucherit7

    Sound & Vibration, Vol.58, pp. 1-24, 2024, DOI:10.32604/sv.2024.046723

    Abstract In the context of Arab cities, this study explores the intricate interplay between cultural, historical, and environmental elements that shape their unique soundscapes. The paper aims to shed light on this underrepresented field of study by employing a three-fold research approach: systematic review, a comprehensive literature review, and the formulation of a future research agenda. The first part of the investigation focuses on research productivity in the Arab world regarding soundscape studies. An analysis of publication trends reveals that soundscape research in Arab cities is still an emerging area of interest. Critical gaps in the existing body of literature are… More >

  • Open Access

    ARTICLE

    Relationship between Interaction Anxiousness, Academic Resilience, Cultural Intelligence and Ego-Identity among Chinese Vocational Pathway University Students: A Conditional Process Analysis Model

    Wenxin Chen1,#, Jie Wu1,2,#, Long Li3,*, Shiyong Wu4,*

    International Journal of Mental Health Promotion, Vol.25, No.8, pp. 949-959, 2023, DOI:10.32604/ijmhp.2023.030072

    Abstract Background: University students’ ego-identity, an essential component of their psychological development and mental health, has widely attracted the attention of policymakers, schools, and parents. Method: A total of 298 Chinese vocational pathway undergraduates were recruited, and a conditional process analysis model was adopted to explore the interaction mechanism of ego-identity. Results: The results suggest that the ego-identity of Chinese vocational pathway undergraduates is significantly affected by interaction anxiousness, academic resilience, and cultural intelligence. (1) Interaction anxiousness significantly and positively predicts ego-identity. (2) Academic resilience positively and partially mediates the effect of interaction anxiousness on ego-identity. (3) Cultural intelligence significantly and… More >

  • Open Access

    ARTICLE

    Novel Framework for Generating Criminals Images Based on Textual Data Using Identity GANs

    Mohamed Fathallah1,*, Mohamed Sakr2, Sherif Eletriby2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 383-396, 2023, DOI:10.32604/cmc.2023.039824

    Abstract Text-to-image generation is a vital task in different fields, such as combating crime and terrorism and quickly arresting lawbreakers. For several years, due to a lack of deep learning and machine learning resources, police officials required artists to draw the face of a criminal. Traditional methods of identifying criminals are inefficient and time-consuming. This paper presented a new proposed hybrid model for converting the text into the nearest images, then ranking the produced images according to the available data. The framework contains two main steps: generation of the image using an Identity Generative Adversarial Network (IGAN) and ranking of the… More >

  • Open Access

    ARTICLE

    FSA-Net: A Cost-efficient Face Swapping Attention Network with Occlusion-Aware Normalization

    Zhipeng Bin1, Huihuang Zhao1,2,*, Xiaoman Liang1,2, Wenli Chen1

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 971-983, 2023, DOI:10.32604/iasc.2023.037270

    Abstract The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two images. In this study, the Face Swapping Attention Network (FSA-Net) is proposed to generate photorealistic face swapping. The existing face-swapping methods ignore the blending attributes or mismatch the facial keypoint (cheek, mouth, eye, nose, etc.), which causes artifacts and makes the generated face silhouette non-realistic. To address this problem, a novel reinforced multi-aware attention module, referred to as RMAA, is proposed for handling facial fusion and expression occlusion flaws. The framework includes two stages. In the first stage, a novel attribute encoder is proposed… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving System Design for Digital Presence Protection

    Eric Yocam1, Ahmad Alomari2, Amjad Gawanmeh3,*, Wathiq Mansoor3

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3091-3110, 2023, DOI:10.32604/cmc.2023.032826

    Abstract A person’s privacy has become a growing concern, given the nature of an expansive reliance on real-time video activities with video capture, stream, and storage. This paper presents an innovative system design based on a privacy-preserving model. The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameter-based access control protection mechanism for digital privacy preservation. The enhanced capability combines multiple access control parameters: facial expression, resource, environment, location, and time. The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.… More >

  • Open Access

    ARTICLE

    Relationship between Moral Elevation and Prosocial Behavior among College Students: The Mediating Role of Perceived Social Support and Moderating Role of Moral Identity

    Shuanghu Fang*, Mingjie Huang

    International Journal of Mental Health Promotion, Vol.25, No.3, pp. 343-356, 2023, DOI:10.32604/ijmhp.2023.027442

    Abstract Objectives: The present study examined the relationship between college student’s moral elevation and prosocial behavior. As well as the mediating role of perceived social support and the moderating role of moral identity. Methods: A sample of 489 college students was recruited for the study. They were asked to complete a series of questionnaires, including Moral Elevation Scale (MES), Perceived Social Support Scale (PSSS), Moral Identity Scale (MIS) and Prosocial Tendency Measure (PTM). As part of the data analysis, we used correlation analysis and the method of constructing latent variable structural equation model to explore the mechanism of action among variables.… More >

  • Open Access

    REVIEW

    Research on Career Identity in China: A Literature Review

    Huaruo Chen1,2, Ya Wen3,*, Fei Liu4,5, Yihong Zhao6, Zhiyao Xie7, Xuehui Zhang4

    International Journal of Mental Health Promotion, Vol.25, No.2, pp. 153-172, 2023, DOI:10.32604/ijmhp.2022.025546

    Abstract Career identity is one of the important topics to study the psychological problems of employees, especially after the outbreak of CoV-19. Being a populous country in the world, China has a large number of employees from all walks of life, and its research on career identity has attracted more and more attention. Thus, this study aims to sort out the history, characteristics, and trends of the research on career identity in China through a literature review, which can help more scholars pay attention to China’s career identity research. In this study, Citespace is used to statistically analyze the selected literature… More > Graphic Abstract

    Research on Career Identity in China: A Literature Review

  • Open Access

    ARTICLE

    Phishing Scam Detection on Ethereum via Mining Trading Information

    Yanyu Chen1, Zhangjie Fu1,2,*

    Journal of Cyber Security, Vol.4, No.3, pp. 189-200, 2022, DOI:10.32604/jcs.2022.038401

    Abstract As a typical representative of web 2.0, Ethereum has significantly boosted the development of blockchain finance. However, due to the anonymity and financial attributes of Ethereum, the number of phishing scams is increasing rapidly and causing massive losses, which poses a serious threat to blockchain financial security. Phishing scam address identification enables to detect phishing scam addresses and alerts users to reduce losses. However, there are three primary challenges in phishing scam address recognition task: 1) the lack of publicly available large datasets of phishing scam address transactions; 2) the use of multi-order transaction information requires a large number of… More >

Displaying 1-10 on page 1 of 51. Per Page