Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (54)
  • Open Access

    ARTICLE

    HEaaN-ID3: Fully Homomorphic Privacy-Preserving ID3-Decision Trees Using CKKS

    Dain Lee1,#, Hojune Shin1,#, Jihyeon Choi1, Younho Lee1,2,*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3673-3705, 2025, DOI:10.32604/cmc.2025.064161 - 03 July 2025

    Abstract In this study, we investigated privacy-preserving ID3 Decision Tree (PPID3) training and inference based on fully homomorphic encryption (FHE), which has not been actively explored due to the high computational cost associated with managing numerous child nodes in an ID3 tree. We propose HEaaN-ID3, a novel approach to realize PPID3 using the Cheon-Kim-Kim-Song (CKKS) scheme. HEaaN-ID3 is the first FHE-based ID3 framework that completes both training and inference without any intermediate decryption, which is especially valuable when decryption keys are inaccessible or a single-cloud security domain is assumed. To enhance computational efficiency, we adopt a… More >

  • Open Access

    ARTICLE

    The Blockchain Neural Network Superior to Deep Learning for Improving the Trust of Supply Chain

    Hsiao-Chun Han, Der-Chen Huang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3921-3941, 2025, DOI:10.32604/cmes.2025.065627 - 30 June 2025

    Abstract With the increasing importance of supply chain transparency, blockchain-based data has emerged as a valuable and verifiable source for analyzing procurement transaction risks. This study extends the mathematical model and proof of ‘the Overall Performance Characteristics of the Supply Chain’ to encompass multiple variables within blockchain data. Utilizing graph theory, the model is further developed into a single-layer neural network, which serves as the foundation for constructing two multi-layer deep learning neural network models, Feedforward Neural Network (abbreviated as FNN) and Deep Clustering Network (abbreviated as DCN). Furthermore, this study retrieves corporate data from the… More > Graphic Abstract

    The Blockchain Neural Network Superior to Deep Learning for Improving the Trust of Supply Chain

  • Open Access

    ARTICLE

    FuzzyStego: An Adaptive Steganographic Scheme Using Fuzzy Logic for Optimizing Embeddable Areas in Spatial Domain Images

    Mardhatillah Shevy Ananti1, Adifa Widyadhani Chanda D’Layla1, Ntivuguruzwa Jean De La Croix1,2, Tohari Ahmad1,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1031-1054, 2025, DOI:10.32604/cmc.2025.061246 - 09 June 2025

    Abstract In the evolving landscape of secure communication, steganography has become increasingly vital to secure the transmission of secret data through an insecure public network. Several steganographic algorithms have been proposed using digital images with a common objective of balancing a trade-off between the payload size and the quality of the stego image. In the existing steganographic works, a remarkable distortion of the stego image persists when the payload size is increased, making several existing works impractical to the current world of vast data. This paper introduces FuzzyStego, a novel approach designed to enhance the stego… More >

  • Open Access

    ARTICLE

    Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption

    Fatima Asiri*, Wajdan Al Malwi

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.2, pp. 2053-2077, 2025, DOI:10.32604/cmes.2025.064348 - 30 May 2025

    Abstract Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing. To address these concerns, this paper presents the mathematical and computer modeling of a novel two-dimensional (2D) chaotic system for secure key generation in quantum image encryption (QIE). The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence, named as Trigonometric-Rational-Saturation (TRS) map. Through rigorous mathematical analysis and computational simulations, the map is extensively evaluated for bifurcation behaviour, chaotic trajectories, and Lyapunov exponents. The security evaluation validates the map’s… More >

  • Open Access

    ARTICLE

    Practical Adversarial Attacks Imperceptible to Humans in Visual Recognition

    Donghyeok Park1, Sumin Yeon2, Hyeon Seo2, Seok-Jun Buu2, Suwon Lee2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2725-2737, 2025, DOI:10.32604/cmes.2025.061732 - 03 March 2025

    Abstract Recent research on adversarial attacks has primarily focused on white-box attack techniques, with limited exploration of black-box attack methods. Furthermore, in many black-box research scenarios, it is assumed that the output label and probability distribution can be observed without imposing any constraints on the number of attack attempts. Unfortunately, this disregard for the real-world practicality of attacks, particularly their potential for human detectability, has left a gap in the research landscape. Considering these limitations, our study focuses on using a similar color attack method, assuming access only to the output label, limiting the number of More >

  • Open Access

    ARTICLE

    Securing Electronic Health Records with Cryptography and Lion Optimization

    Arkan Kh Shakr Sabonchi*

    Journal of Cyber Security, Vol.7, pp. 21-43, 2025, DOI:10.32604/jcs.2025.059645 - 18 February 2025

    Abstract With the internet and modern mobile technologies, health-related information is readily available, and thus, the security aspect of health information is at great risk. Confidentiality and protection of medical information regarding patients are of prime concern in the context of sharing such data with different healthcare providers. On one hand, Electronic Health Record Systems (EHRS) and online sites have proved to be hassle-free ways of exchanging medical information between health professionals. On the other hand, data security issues remain a concern. The proposed paper presents an improvement in the security mechanism of EHRS by utilizing… More >

  • Open Access

    ARTICLE

    HybridEdge: A Lightweight and Secure Hybrid Communication Protocol for the Edge-Enabled Internet of Things

    Amjad Khan1, Rahim Khan1,*, Fahad Alturise2,*, Tamim Alkhalifah3

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3161-3178, 2025, DOI:10.32604/cmc.2025.060372 - 17 February 2025

    Abstract The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These infrastructures are very effective in providing a fast response to the respective queries of the requesting modules, but their distributed nature has introduced other problems such as security and privacy. To address these problems, various security-assisted communication mechanisms have been developed to safeguard every active module, i.e., devices and edges, from every possible vulnerability in the IoT. However, these methodologies have neglected one of the… More >

  • Open Access

    ARTICLE

    Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks

    Khalil Ullah1,*, Song Jian1, Muhammad Naeem Ul Hassan1, Suliman Khan2, Mohammad Babar3,*, Arshad Ahmad4, Shafiq Ahmad5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1151-1169, 2025, DOI:10.32604/cmc.2024.057328 - 03 January 2025

    Abstract The emergence of next generation networks (NextG), including 5G and beyond, is reshaping the technological landscape of cellular and mobile networks. These networks are sufficiently scaled to interconnect billions of users and devices. Researchers in academia and industry are focusing on technological advancements to achieve high-speed transmission, cell planning, and latency reduction to facilitate emerging applications such as virtual reality, the metaverse, smart cities, smart health, and autonomous vehicles. NextG continuously improves its network functionality to support these applications. Multiple input multiple output (MIMO) technology offers spectral efficiency, dependability, and overall performance in conjunction with More >

  • Open Access

    ARTICLE

    Hybrid Metaheuristic Lion and Firefly Optimization Algorithm with Chaotic Map for Substitution S-Box Design

    Arkan Kh Shakr Sabonchi*

    Journal of Information Hiding and Privacy Protection, Vol.6, pp. 21-45, 2024, DOI:10.32604/jihpp.2024.058954 - 31 December 2024

    Abstract Substitution boxes (S-boxes) are key components of symmetrical cryptosystems, acting as nonlinear substitution functions that hide the relationship between the encrypted text and input key. This confusion mechanism is vital for cryptographic security because it prevents attackers from intercepting the secret key by analyzing the encrypted text. Therefore, the S-box design is essential for the robustness of cryptographic systems, especially for the data encryption standard (DES) and advanced encryption standard (AES). This study focuses on the application of the firefly algorithm (FA) and metaheuristic lion optimization algorithm (LOA), thereby proposing a hybrid approach called the… More >

  • Open Access

    ARTICLE

    Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS

    Kenian Wang1,2,*, Yuan Hong1,2, Chunxiao Li2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1123-1142, 2024, DOI:10.32604/cmc.2024.052088 - 18 July 2024

    Abstract With the exponential increase in information security risks, ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment. However, experts possess a limited understanding of fundamental security elements, such as assets, threats, and vulnerabilities, due to the confidentiality of airborne networks, resulting in cognitive uncertainty. Therefore, the Pythagorean fuzzy Analytic Hierarchy Process (AHP) Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks. First, Pythagorean fuzzy AHP is employed to construct an index system… More >

Displaying 1-10 on page 1 of 54. Per Page