Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (343)
  • Open Access

    ARTICLE

    In-Mig: Geographically Dispersed Agentic LLMs for Privacy-Preserving Artificial Intelligence

    Mohammad Nauman*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.077259 - 12 March 2026

    Abstract Large Language Models (LLMs) are increasingly utilized for semantic understanding and reasoning, yet their use in sensitive settings is limited by privacy concerns. This paper presents In-Mig, a mobile-agent architecture that integrates LLM reasoning within agents that can migrate across organizational venues. Unlike centralized approaches, In-Mig performs reasoning in situ, ensuring that raw data remains within institutional boundaries while allowing for cross-venue synthesis. The architecture features a policy-scoped memory model, utility-driven route planning, and cryptographic trust enforcement. A prototype using JADE for mobility and quantized Mistral-7B demonstrates practical feasibility. Evaluation across various scenarios shows that In-Mig achieves More >

  • Open Access

    REVIEW

    A Review on Penetration Testing for Privacy of Deep Learning Models

    Salma Akther1, Wencheng Yang1,*, Song Wang2, Shicheng Wei1, Ji Zhang1, Xu Yang3, Yanrong Lu4, Yan Li1

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.076358 - 12 March 2026

    Abstract As deep learning (DL) models are increasingly deployed in sensitive domains (e.g., healthcare), concerns over privacy and security have intensified. Conventional penetration testing frameworks, such as OWASP and NIST, are effective for traditional networks and applications but lack the capabilities to address DL-specific threats, such as model inversion, membership inference, and adversarial attacks. This review provides a comprehensive analysis of penetration testing for the privacy of DL models, examining the shortfalls of existing frameworks, tools, and testing methodologies. Through systematic evaluation of existing literature and empirical analysis, we identify three major contributions: (i) a critical… More >

  • Open Access

    ARTICLE

    EdgeST-Fusion: A Cross-Modal Federated Learning and Graph Transformer Framework for Multimodal Spatiotemporal Data Analytics in Smart City Consumer Electronics

    Mohammed M. Alenazi*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.075966 - 12 March 2026

    Abstract Multimodal spatiotemporal data from smart city consumer electronics present critical challenges including cross-modal temporal misalignment, unreliable data quality, limited joint modeling of spatial and temporal dependencies, and weak resilience to adversarial updates. To address these limitations, EdgeST-Fusion is introduced as a cross-modal federated graph transformer framework for context-aware smart city analytics. The architecture integrates cross-modal embedding networks for modality alignment, graph transformer encoders for spatial dependency modeling, temporal self-attention for dynamic pattern learning, and adaptive anomaly detection to ensure data quality and security during aggregation. A privacy-preserving federated learning protocol with differential privacy guarantees enables… More >

  • Open Access

    ARTICLE

    Quantum-Resistant Secure Aggregation for Healthcare Federated Learning

    Chia-Hui Liu1, Zhen-Yu Wu2,*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.075495 - 12 March 2026

    Abstract Federated Learning (FL) enables collaborative medical model training without sharing sensitive patient data. However, existing FL systems face increasing security risks from post quantum adversaries and often incur non-negligible computational and communication overhead when encryption is applied. At the same time, training high performance AI models requires large volumes of high quality data, while medical data such as patient information, clinical records, and diagnostic reports are highly sensitive and subject to strict privacy regulations, including HIPAA and GDPR. Traditional centralized machine learning approaches therefore pose significant challenges for cross institutional collaboration in healthcare. To address… More >

  • Open Access

    ARTICLE

    A Distributed Dual-Network Meta-Adaptive Framework for Scalable and Privacy-Aware Multi-Agent Coordination

    Atef Gharbi1, Mohamed Ayari2, Nasser Albalawi3, Ahmad Alshammari3, Nadhir Ben Halima4,*, Zeineb Klai3

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.075474 - 12 March 2026

    Abstract This paper presents Dual Adaptive Neural Topology (Dual ANT), a distributed dual-network meta-adaptive framework that enhances ant-colony-based multi-agent coordination with online introspection, adaptive parameter control, and privacy-preserving interactions. This approach improves standard Ant Colony Optimization (ACO) with two lightweight neural components: a forward network that estimates swarm efficiency in real time and an inverse network that converts these descriptors into parameter adaptations. To preserve the privacy of individual trajectories in shared pheromone maps, we introduce a locally differentially private pheromone update mechanism that adds calibrated noise to each agent’s pheromone deposit while preserving the efficacy More >

  • Open Access

    ARTICLE

    Gradient Feature-Based Collaborative Filtering in Verification Federated Learning with Privacy-Preserving

    Chen Yu, Jingjing Tan, Wenwu Zhao, Ke Gu*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.075457 - 12 March 2026

    Abstract Although federated learning (FL) improves privacy-preserving by updating parameters without collecting original user data, their shared gradients still leak sensitive user information. Existing differential privacy and encryption techniques typically focus on whether the aggregated gradient is correctly processed and verified only, rather than whether each user is honestly trained locally. To address these above issues, we propose a gradient feature-based collaborative filtering scheme in verification federated learning, where the authenticity of user training is verified using the collaborative filtering (CF) method based on gradient features. Compared with single user gradient detection (such as similarity detection More >

  • Open Access

    ARTICLE

    Adaptive Windowing with Label-Aware Attention for Robust Multi-Tab Website Fingerprinting

    Chunqian Guo*, Gang Chen

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2025.072184 - 12 March 2026

    Abstract Despite the ability of the anonymous communication system The Onion Router (Tor) to obscure the content of communications, prior studies have shown that passive adversaries can still infer the websites visited by users through website fingerprinting (WF) attacks. Conventional WF methodologies demonstrate optimal performance in scenarios involving single-tab browsing. Conventional WF methods achieve optimal performance primarily in scenarios involving single-tab browsing. However, in real-world network environments, users often engage in multi-tab browsing, which generates overlapping traffic patterns from different websites. This overlap has been shown to significantly degrade the performance of classifiers that rely on… More >

  • Open Access

    ARTICLE

    Information Diffusion Models and Fuzzing Algorithms for a Privacy-Aware Data Transmission Scheduling in 6G Heterogeneous ad hoc Networks

    Borja Bordel Sánchez*, Ramón Alcarria, Tomás Robles

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.2, 2026, DOI:10.32604/cmes.2025.072603 - 26 February 2026

    Abstract In this paper, we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks. This system enables end nodes to select the optimum time and scheme to transmit private data safely. In 6G dynamic heterogeneous infrastructures, unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy. Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service (QoS). As the transport network is built of ad hoc nodes, there is no guarantee about their trustworthiness or behavior, and transversal functionalities are delegated to the extreme nodes. However, More >

  • Open Access

    ARTICLE

    Big Data-Driven Federated Learning Model for Scalable and Privacy-Preserving Cyber Threat Detection in IoT-Enabled Healthcare Systems

    Noura Mohammed Alaskar1, Muzammil Hussain2, Saif Jasim Almheiri1, Atta-ur-Rahman3, Adnan Khan4,5,6, Khan M. Adnan7,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074041 - 10 February 2026

    Abstract The increasing number of interconnected devices and the incorporation of smart technology into contemporary healthcare systems have significantly raised the attack surface of cyber threats. The early detection of threats is both necessary and complex, yet these interconnected healthcare settings generate enormous amounts of heterogeneous data. Traditional Intrusion Detection Systems (IDS), which are generally centralized and machine learning-based, often fail to address the rapidly changing nature of cyberattacks and are challenged by ethical concerns related to patient data privacy. Moreover, traditional AI-driven IDS usually face challenges in handling large-scale, heterogeneous healthcare data while ensuring data… More >

  • Open Access

    REVIEW

    Quantum Secure Multiparty Computation: Bridging Privacy, Security, and Scalability in the Post-Quantum Era

    Sghaier Guizani1,*, Tehseen Mazhar2,3,*, Habib Hamam4,5,6,7

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073883 - 10 February 2026

    Abstract The advent of quantum computing poses a significant challenge to traditional cryptographic protocols, particularly those used in Secure Multiparty Computation (MPC), a fundamental cryptographic primitive for privacy-preserving computation. Classical MPC relies on cryptographic techniques such as homomorphic encryption, secret sharing, and oblivious transfer, which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries. This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI, IEEE Explore, Springer, and Elsevier, examining the applications, types, and security issues with the solution of… More >

Displaying 11-20 on page 2 of 343. Per Page