Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (244)
  • Open Access

    ARTICLE

    A Secure and Effective Energy-Aware Fixed-Point Quantization Scheme for Asynchronous Federated Learning

    Zerui Zhen1, Zihao Wu2, Lei Feng1,*, Wenjing Li1, Feng Qi1, Shixuan Guo1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2939-2955, 2023, DOI:10.32604/cmc.2023.036505

    Abstract Asynchronous federated learning (AsynFL) can effectively mitigate the impact of heterogeneity of edge nodes on joint training while satisfying participant user privacy protection and data security. However, the frequent exchange of massive data can lead to excess communication overhead between edge and central nodes regardless of whether the federated learning (FL) algorithm uses synchronous or asynchronous aggregation. Therefore, there is an urgent need for a method that can simultaneously take into account device heterogeneity and edge node energy consumption reduction. This paper proposes a novel Fixed-point Asynchronous Federated Learning (FixedAsynFL) algorithm, which could mitigate the resource consumption caused by frequent… More >

  • Open Access

    ARTICLE

    Blockchain-Enabled Secure and Privacy-Preserving Data Aggregation for Fog-Based ITS

    Siguang Chen1,2,*, Li Yang1,2, Yanhang Shi1,2, Qian Wang1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3781-3796, 2023, DOI:10.32604/cmc.2023.036437

    Abstract As an essential component of intelligent transportation systems (ITS), electric vehicles (EVs) can store massive amounts of electric power in their batteries and send power back to a charging station (CS) at peak hours to balance the power supply and generate profits. However, when the system collects the corresponding power data, several severe security and privacy issues are encountered. The identity and private injection data may be maliciously intercepted by network attackers and be tampered with to damage the services of ITS and smart grids. Existing approaches requiring high computational overhead render them unsuitable for the resource-constrained Internet of Things… More >

  • Open Access

    ARTICLE

    Asymmetric Consortium Blockchain and Homomorphically Polynomial-Based PIR for Secured Smart Parking Systems

    T. Haritha, A. Anitha*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3923-3939, 2023, DOI:10.32604/cmc.2023.036278

    Abstract In crowded cities, searching for the availability of parking lots is a herculean task as it results in the wastage of drivers’ time, increases air pollution, and traffic congestion. Smart parking systems facilitate the drivers to determine the information about the parking lot in real time and book them depending on the requirement. But the existing smart parking systems necessitate the drivers to reveal their sensitive information that includes their mobile number, personal identity, and desired destination. This disclosure of sensitive information makes the existing centralized smart parking systems more vulnerable to service providers’ security breaches, single points of failure,… More >

  • Open Access

    ARTICLE

    A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing

    Muhammad Usman Sana1,*, Zhanli Li1, Tayybah Kiren2, Hannan Bin Liaqat3, Shahid Naseem3, Atif Saeed4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2741-2757, 2023, DOI:10.32604/cmc.2023.036093

    Abstract Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encryption and decryption algorithms are being deployed. In cloud computation, data processing, storage, and transmission can be done through laptops and mobile devices. Data Storing in cloud facilities is expanding each day and data is the most significant asset of clients. The important concern with the transmission of information to the cloud is security because there is no perceivability of the client’s data. They have to be… More >

  • Open Access

    ARTICLE

    Concept Drift Analysis and Malware Attack Detection System Using Secure Adaptive Windowing

    Emad Alsuwat1,*, Suhare Solaiman1, Hatim Alsuwat2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3743-3759, 2023, DOI:10.32604/cmc.2023.035126

    Abstract Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning (ML) models. Due to attackers’ (and/or benign equivalents’) dynamic behavior changes, testing data distribution frequently diverges from original training data over time, resulting in substantial model failures. Due to their dispersed and dynamic nature, distributed denial-of-service attacks pose a danger to cybersecurity, resulting in attacks with serious consequences for users and businesses. This paper proposes a novel design for concept drift analysis and detection of malware attacks like Distributed Denial of Service (DDOS) in the network.… More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Transmission Scheme Based on Physical Mechanism

    Ping Zhang1, Haoran Zhu1, Wenjun Li2, Osama Alfarraj3, Amr Tolba3, Gwang-jun Kim4,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3589-3605, 2023, DOI:10.32604/cmc.2023.032097

    Abstract Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply, which are not suitable for traditional security technology. The security technology based on the physical mechanism has attracted extensive attention. How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism. In this paper, superlattice technology is introduced to the security field of Internet of things, and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed. In order to ensure the… More >

  • Open Access

    REVIEW

    A Review about Wireless Sensor Networks and the Internet of Things

    Amarjit Singh*

    Journal on Internet of Things, Vol.4, No.2, pp. 69-73, 2022, DOI:10.32604/jiot.2022.026170

    Abstract Wireless sensor networks (WSNs) are created and affect our daily lives. You can find applications in various fields such as health, accident, life, manufacturing, production management, network management and many other fields. WSN now connects to the Internet of Things, connects the sensor to the Internet, and then uses it for collaboration and collaboration. However, when WSN is part of the internet we need to be able to study and analyze related terms. In this article, we’re going to look at different ways to get WSN online and identify the challenges that address in future as well. More >

  • Open Access

    ARTICLE

    Metaheuristics with Vector Quantization Enabled Codebook Compression Model for Secure Industrial Embedded Environment

    Adepu Shravan Kumar, S. Srinivasan*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3607-3620, 2023, DOI:10.32604/iasc.2023.036647

    Abstract At the present time, the Industrial Internet of Things (IIoT) has swiftly evolved and emerged, and picture data that is collected by terminal devices or IoT nodes are tied to the user's private data. The use of image sensors as an automation tool for the IIoT is increasingly becoming more common. Due to the fact that this organisation transfers an enormous number of photographs at any one time, one of the most significant issues that it has is reducing the total quantity of data that is sent and, as a result, the available bandwidth, without compromising the image quality. Image… More >

  • Open Access

    ARTICLE

    Secured Framework for Assessment of Chronic Kidney Disease in Diabetic Patients

    Sultan Mesfer Aldossary*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3387-3404, 2023, DOI:10.32604/iasc.2023.035249

    Abstract With the emergence of cloud technologies, the services of healthcare systems have grown. Simultaneously, machine learning systems have become important tools for developing matured and decision-making computer applications. Both cloud computing and machine learning technologies have contributed significantly to the success of healthcare services. However, in some areas, these technologies are needed to provide and decide the next course of action for patients suffering from diabetic kidney disease (DKD) while ensuring privacy preservation of the medical data. To address the cloud data privacy problem, we proposed a DKD prediction module in a framework using cloud computing services and a data… More >

  • Open Access

    ARTICLE

    Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1079-1092, 2023, DOI:10.32604/csse.2023.033961

    Abstract The cloud allows clients to store and share data. Depending on the user’s needs, it is imperative to design an effective access control plan to share the information only with approved users. The user loses control of their data when the data is outsourced to the cloud. Therefore, access control mechanisms will become a significant challenging problem. The Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an essential solution in which the user can control data access. CP-ABE encrypts the data under a limited access policy after the user sets some access policies. The user can decrypt the data if they satisfy the… More >

Displaying 41-50 on page 5 of 244. Per Page