Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (27)
  • Open Access

    ARTICLE

    A Mix Location Privacy Preservation Method Based on Differential Privacy with Clustering

    Fang Liu*, Xianghui Meng, Jiachen Li, Sibo Guo

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-21, 2026, DOI:10.32604/cmc.2025.069243 - 09 December 2025

    Abstract With the popularization of smart devices, Location-Based Services (LBS) greatly facilitates users’ life, but at the same time brings the risk of users’ location privacy leakage. Existing location privacy protection methods are deficient, failing to reasonably allocate the privacy budget for non-outlier location points and ignoring the critical location information that may be contained in the outlier points, leading to decreased data availability and privacy exposure problems. To address these problems, this paper proposes a Mix Location Privacy Preservation Method Based on Differential Privacy with Clustering (MLDP). The method first utilizes the DBSCAN clustering algorithm… More >

  • Open Access

    ARTICLE

    NeuroCivitas: A Federated Deep Learning Model for Adaptive Urban Intelligence in 6G Cognitive Cities

    Nujud Aloshban*, Abeer A.K. Alharbi

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4795-4826, 2025, DOI:10.32604/cmc.2025.067523 - 23 October 2025

    Abstract The rise of 6G networks and the exponential growth of smart city infrastructures demand intelligent, real-time traffic forecasting solutions that preserve data privacy. This paper introduces NeuroCivitas, a federated deep learning framework that integrates Convolutional Neural Networks (CNNs) for spatial pattern recognition and Long Short-Term Memory (LSTM) networks for temporal sequence modeling. Designed to meet the adaptive intelligence requirements of cognitive cities, NeuroCivitas leverages Federated Averaging (FedAvg) to ensure privacy-preserving training while significantly reducing communication overhead—by 98.7% compared to centralized models. The model is evaluated using the Kaggle Traffic Prediction Dataset comprising 48,120 hourly records… More >

  • Open Access

    ARTICLE

    MMH-FE: A Multi-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption

    Hao Li1,#, Kuan Shao1,#, Xin Wang2, Mufeng Wang3, Zhenyong Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5387-5405, 2025, DOI:10.32604/cmc.2025.059718 - 06 March 2025

    Abstract Due to the development of cloud computing and machine learning, users can upload their data to the cloud for machine learning model training. However, dishonest clouds may infer user data, resulting in user data leakage. Previous schemes have achieved secure outsourced computing, but they suffer from low computational accuracy, difficult-to-handle heterogeneous distribution of data from multiple sources, and high computational cost, which result in extremely poor user experience and expensive cloud computing costs. To address the above problems, we propose a multi-precision, multi-sourced, and multi-key outsourcing neural network training scheme. Firstly, we design a multi-precision More >

  • Open Access

    ARTICLE

    Decentralized Federated Graph Learning via Surrogate Model

    Bolin Zhang, Ruichun Gu*, Haiying Liu

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2521-2535, 2025, DOI:10.32604/cmc.2024.060331 - 17 February 2025

    Abstract Federated Graph Learning (FGL) enables model training without requiring each client to share local graph data, effectively breaking data silos by aggregating the training parameters from each terminal while safeguarding data privacy. Traditional FGL relies on a centralized server for model aggregation; however, this central server presents challenges such as a single point of failure and high communication overhead. Additionally, efficiently training a robust personalized local model for each client remains a significant objective in federated graph learning. To address these issues, we propose a decentralized Federated Graph Learning framework with efficient communication, termed Decentralized… More >

  • Open Access

    ARTICLE

    AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation

    Congcong Wang1, Chen Wang2,3,*, Wenying Zheng4,*, Wei Gu5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 799-816, 2025, DOI:10.32604/cmc.2024.057975 - 03 January 2025

    Abstract As smart grid technology rapidly advances, the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection. Current research emphasizes data security and user privacy concerns within smart grids. However, existing methods struggle with efficiency and security when processing large-scale data. Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge. This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities. The approach optimizes data preprocessing, More >

  • Open Access

    ARTICLE

    Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network

    Deema Alsekait1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2395-2436, 2024, DOI:10.32604/cmc.2024.055469 - 18 November 2024

    Abstract The widespread adoption of Internet of Things (IoT) devices has resulted in notable progress in different fields, improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks. Further, the study suggests using an advanced approach that utilizes machine learning, specifically the Wide Residual Network (WRN), to identify hidden malware in IoT systems. The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices, using the MalMemAnalysis dataset. Moreover, thorough experimentation provides evidence for the effectiveness of the WRN-based strategy, resulting in… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Healthcare and Medical Data Collaboration Service System Based on Blockchain and Federated Learning

    Fang Hu1, Siyi Qiu2, Xiaolian Yang1, Chaolei Wu1, Miguel Baptista Nunes3, Hui Chen4,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2897-2915, 2024, DOI:10.32604/cmc.2024.052570 - 15 August 2024

    Abstract As the volume of healthcare and medical data increases from diverse sources, real-world scenarios involving data sharing and collaboration have certain challenges, including the risk of privacy leakage, difficulty in data fusion, low reliability of data storage, low effectiveness of data sharing, etc. To guarantee the service quality of data collaboration, this paper presents a privacy-preserving Healthcare and Medical Data Collaboration Service System combining Blockchain with Federated Learning, termed FL-HMChain. This system is composed of three layers: Data extraction and storage, data management, and data application. Focusing on healthcare and medical data, a healthcare and… More >

  • Open Access

    ARTICLE

    2P3FL: A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning

    Sandeep Dasari, Rajesh Kaluri*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 2035-2051, 2024, DOI:10.32604/cmes.2024.049152 - 20 May 2024

    Abstract The increasing data pool in finance sectors forces machine learning (ML) to step into new complications. Banking data has significant financial implications and is confidential. Combining users data from several organizations for various banking services may result in various intrusions and privacy leakages. As a result, this study employs federated learning (FL) using a flower paradigm to preserve each organization’s privacy while collaborating to build a robust shared global model. However, diverse data distributions in the collaborative training process might result in inadequate model learning and a lack of privacy. To address this issue, the… More > Graphic Abstract

    2P3FL: A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning

  • Open Access

    ARTICLE

    Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs

    Nagaraju Pacharla, K. Srinivasa Reddy*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3089-3110, 2024, DOI:10.32604/cmc.2024.048133 - 15 May 2024

    Abstract With the recent technological developments, massive vehicular ad hoc networks (VANETs) have been established, enabling numerous vehicles and their respective Road Side Unit (RSU) components to communicate with one another. The best way to enhance traffic flow for vehicles and traffic management departments is to share the data they receive. There needs to be more protection for the VANET systems. An effective and safe method of outsourcing is suggested, which reduces computation costs by achieving data security using a homomorphic mapping based on the conjugate operation of matrices. This research proposes a VANET-based data outsourcing… More >

  • Open Access

    ARTICLE

    A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information

    Hao Jiang1, Yuerong Liao1, Dongdong Zhao2, Wenjian Luo3, Xingyi Zhang1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1045-1075, 2024, DOI:10.32604/cmes.2024.048653 - 16 April 2024

    Abstract Due to the presence of a large amount of personal sensitive information in social networks, privacy preservation issues in social networks have attracted the attention of many scholars. Inspired by the self-nonself discrimination paradigm in the biological immune system, the negative representation of information indicates features such as simplicity and efficiency, which is very suitable for preserving social network privacy. Therefore, we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks, called AttNetNRI. Specifically, a negative survey-based method is developed to disturb the relationship between nodes in the… More >

Displaying 1-10 on page 1 of 27. Per Page