Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (343)
  • Open Access

    ARTICLE

    FedGLP-ADP: Federated Learning with Gradient-Based Layer-Wise Personalization and Adaptive Differential Privacy

    Di Xiao*, Wenting Jiang, Min Li

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.079808 - 09 April 2026

    Abstract The rapid advancement of the Internet of Things (IoT) has transformed edge devices from simple data collectors into intelligent units capable of local processing and collaborative learning. However, the vast amounts of sensitive data generated by these devices face severe constraints from “data silos” and risks of privacy breaches. Federated learning (FL), as a distributed collaborative paradigm that avoids sharing raw data, holds great promise in the IoT domain. Nevertheless, it remains vulnerable to gradient leakage threats. While traditional differential privacy (DP) techniques mitigate privacy risks, they often come at the cost of significantly reduced… More >

  • Open Access

    ARTICLE

    Federated Learning for Malicious Domain Detection via Privacy-Preserving DNS Traffic Analysis

    Samar Abbas Mangi1,*, Samina Rajper1, Noor Ahmed Shaikh1, Shehzad Ashraf Chaudhry2,3

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077337 - 09 April 2026

    Abstract Malicious domain detection (MDD) from DNS telemetry enables early threat hunting but is constrained by privacy and data-sharing barriers across organizations. We present a deployable federated learning (FL) pipeline that trains a compact deep neural network (DNN; 64-32-16 with ReLU and dropout 0.3) locally at each client and exchanges only masked model updates. Privacy is enforced via secure aggregation (the server observes only an aggregate of masked updates) and optional server-side differential privacy (DP) via clipping and Gaussian noise. Our feature schema combines DNS-specific lexical cues (character n-grams, entropy, TLD indicators) with lightweight behavioral signals More >

  • Open Access

    ARTICLE

    Secure and Differentially Private Edge-Cloud Federated Learning Framework for Privacy-Preserving Maritime AIS Intelligence

    Abuzar Khan1, Abid Iqbal2,*, Ghassan Husnain1,*, Fahad Masood1, Mohammed Al-Naeem3, Sajid Iqbal4

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077222 - 09 April 2026

    Abstract Cloud computing now supports large-scale maritime analytics, yet offloading rich Automatic Identification System (AIS) data to the cloud exposes sensitive operational patterns and complicates compliance with cross-border privacy regulations. This work addresses the gap between growing demand for AI-driven vessel intelligence and the limited availability of practical, privacy-preserving cloud solutions. We introduce a privacy-by-design edge-cloud framework in which ports and vessels serve as federated clients, training vessel-type classifiers on local AIS trajectories while transmitting only clipped, Gaussian-perturbed updates to a zero-trust cloud coordinator employing secure and robust aggregation. Using a public AIS corpus with realistic… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Parallel Non-Negative Matrix Factorization with Edge Computing

    Wenxuan Yu1, Wenjing Gao1, Jiuru Wang2, Rong Hao1,*, Jia Yu1,*

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076731 - 09 April 2026

    Abstract Non-negative Matrix Factorization (NMF) is a computationally intensive matrix operation that resource-constrained clients struggle to complete locally. Privacy-preserving outsourcing allows clients to offload heavy computing tasks to powerful servers, effectively solving the problem of local computing difficulties. However, the existing privacy-preserving NMF outsourcing schemes only allow one server to perform outsourcing computation, resulting in low efficiency on the server side. In order to improve the efficiency of outsourcing computation, we propose a privacy-preserving parallel NMF outsourcing scheme with multiple edge servers. We adopt the matrix blocking technique to divide the computation task into multiple subtasks, More >

  • Open Access

    ARTICLE

    PrivLLM-Guard: A Differentially-Private Large Language Model for Real-Time Confidential Medical Text Generation and Summarization

    Ans D. Alghamdi*

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.075985 - 09 April 2026

    Abstract How can AI assist doctors in generating clinical reports without compromising patient privacy? This question motivates our development of PrivLLM-Guard, a novel framework for differentially private large language models (LLMs) tailored to real-time confidential medical text generation and summarization. While LLMs have shown promise in automating clinical documentation, the sensitivity of healthcare data demands rigorous privacy protections. PrivLLM-Guard addresses this need by combining advanced—differential privacy techniques with adaptive noise calibration, ensuring robust privacy guarantees without sacrificing utility. The framework integrates bidirectional transformer encoders with autoregressive decoders, further enhanced by privacy-aware attention and gradient perturbation mechanisms. Extensive More >

  • Open Access

    ARTICLE

    EdgeTrustX: A Privacy-Aware Federated Transformer Framework for Scalable and Explainable IoT Threat Detection

    Saleh Alharbi*

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.073584 - 09 April 2026

    Abstract Real-time threat detection in Internet of Things (IoT) networks requires scalable, privacy-preserving, and interpretable models capable of operating under strict latency constraints. This paper presents EdgeTrustX, a privacy-aware federated transformer framework that addresses these challenges by combining transformer-based representation learning with federated optimisation, differential privacy, and homomorphic encryption. The framework enables collaborative model training across heterogeneous IoT devices without exposing sensitive local data while maintaining computational feasibility for edge deployment. A multi-head attention mechanism integrated with a secure aggregation protocol supports adaptive feature weighting and privacy-protected parameter exchange. To enhance transparency, an explainability module that… More >

  • Open Access

    EDITORIAL

    Introduction to the Special Issue on Cutting-Edge Security and Privacy Solutions for Next-Generation Intelligent Mobile Internet Technologies and Applications

    Ilsun You1,*, Gaurav Choudhary2, Gökhan Kul3, Francesco Falmieri4

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.3, 2026, DOI:10.32604/cmes.2026.080244 - 30 March 2026

    Abstract This article has no abstract. More >

  • Open Access

    REVIEW

    Federated Deep Learning in Intelligent Urban Ecosystems: A Systematic Review of Advancements and Applications in Smart Cities, Homes, Buildings, and Healthcare Systems

    Muhammad Adnan Tariq1, Sunawar Khan2, Tehseen Mazhar2,3, Tariq Shahzad4, Sahar Arooj5, Khmaies Ouahada6, Muhammad Adnan Khan7,*, Habib Hamam8,9,10,11

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.3, 2026, DOI:10.32604/cmes.2026.078672 - 30 March 2026

    Abstract The contemporary smart cities, smart homes, smart buildings, and smart health care systems are the results of the explosive growth of Internet of Things (IoT) devices and deep learning. Yet the centralized training paradigms have fundamental issues in data privacy, regulatory compliance, and ownership silo alongside the scaled limitations of the real-life application. The concept of Federated Deep Learning (FDL) is a privacy-by-design method that will enable the distributed training of machine learning models among distributed clients without sharing raw data and is suitable in heterogeneous urban settings. It is an overview of the privacy-preserving… More >

  • Open Access

    ARTICLE

    Privacy-Aware Anomaly Detection in Encrypted Network Traffic via Adaptive Homomorphic Encryption

    Yu-Ran Jeon1, Seung-Ha Jee1, Su-Kyoung Kim1, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.3, 2026, DOI:10.32604/cmes.2026.077784 - 30 March 2026

    Abstract As cyberattacks become increasingly sophisticated and intelligent, demand for machine-learning-based anomaly detection systems is growing. However, conventional systems generally assume a trusted server environment, where traffic data is collected and analyzed in plaintext. This assumption introduces inherent privacy risks, as privacy-sensitive information may be exposed if the server is compromised or misused. To address this limitation, privacy-preserving anomaly detection approaches have been actively studied, enabling anomaly detection to be performed directly on encrypted traffic without revealing privacy-sensitive data. While these approaches offer strong confidentiality guarantees, they suffer from significant drawbacks, including substantial computational overhead, high… More >

  • Open Access

    REVIEW

    Security and Privacy Challenges, Solutions, and Performance Evaluation in AIoT-Enabled Smart Societies

    Shahab Ali Khan1, Tehseen Mazhar2,3,*, Syed Faisal Abbas Shah4, Wasim Ahmad1, Sunawar Khan2, Afsha BiBi5, Usama Shah1, Habib Hamam6,7,8,9

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.3, 2026, DOI:10.32604/cmes.2026.075882 - 30 March 2026

    Abstract The convergence of Artificial Intelligence (AI) and the Internet of Things (IoT) has enabled Artificial Intelligence of Things (AIoT) systems that support intelligent and responsive smart societies, but it also introduces major security and privacy concerns across domains such as healthcare, transportation, and smart cities. This Systemic Literature Review (SLR) addresses three research questions: identifying major threats and challenges in AIoT ecosystems, reviewing state-of-the-art security and privacy techniques, and evaluating their effectiveness. An SLR covering the period from 2020 to 2025 was conducted using major academic digital libraries, including IEEE Xplore, ACM Digital Library, ScienceDirect, More >

Displaying 1-10 on page 1 of 343. Per Page