Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21)
  • Open Access

    ARTICLE

    FedCW: Client Selection with Adaptive Weight in Heterogeneous Federated Learning

    Haotian Wu1, Jiaming Pei2, Jinhai Li3,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.069873 - 10 November 2025

    Abstract With the increasing complexity of vehicular networks and the proliferation of connected vehicles, Federated Learning (FL) has emerged as a critical framework for decentralized model training while preserving data privacy. However, efficient client selection and adaptive weight allocation in heterogeneous and non-IID environments remain challenging. To address these issues, we propose Federated Learning with Client Selection and Adaptive Weighting (FedCW), a novel algorithm that leverages adaptive client selection and dynamic weight allocation for optimizing model convergence in real-time vehicular networks. FedCW selects clients based on their Euclidean distance from the global model and dynamically adjusts More >

  • Open Access

    ARTICLE

    Robust Control and Stabilization of Autonomous Vehicular Systems under Deception Attacks and Switching Signed Networks

    Muflih Alhazmi1, Waqar Ul Hassan2, Saba Shaheen3, Mohammed M. A. Almazah4, Azmat Ullah Khan Niazi3,*, Nafisa A. Albasheir5, Ameni Gargouri6, Naveed Iqbal7

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 1903-1940, 2025, DOI:10.32604/cmes.2025.072973 - 26 November 2025

    Abstract This paper proposes a model-based control framework for vehicle platooning systems with second-order nonlinear dynamics operating over switching signed networks, time-varying delays, and deception attacks. The study includes two configurations: a leaderless structure using Finite-Time Non-Singular Terminal Bipartite Consensus (FNTBC) and Fixed-Time Bipartite Consensus (FXTBC), and a leader—follower structure ensuring structural balance and robustness against deceptive signals. In the leaderless model, a bipartite controller based on impulsive control theory, gauge transformation, and Markovian switching Lyapunov functions ensures mean-square stability and coordination under deception attacks and communication delays. The FNTBC achieves finite-time convergence depending on initial More >

  • Open Access

    ARTICLE

    An Efficient Content Caching Strategy for Fog-Enabled Road Side Units in Vehicular Networks

    Faareh Ahmed1, Babar Mansoor2, Muhammad Awais Javed3, Abdul Khader Jilani Saudagar4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3783-3804, 2025, DOI:10.32604/cmes.2025.069430 - 30 September 2025

    Abstract Vehicular networks enable seamless connectivity for exchanging emergency and infotainment content. However, retrieving infotainment data from remote servers often introduces high delays, degrading the Quality of Service (QoS). To overcome this, caching frequently requested content at fog-enabled Road Side Units (RSUs) reduces communication latency. Yet, the limited caching capacity of RSUs makes it impractical to store all contents with varying sizes and popularity. This research proposes an efficient content caching algorithm that adapts to dynamic vehicular demands on highways to maximize request satisfaction. The scheme is evaluated against Intelligent Content Caching (ICC) and Random Caching More >

  • Open Access

    ARTICLE

    A Secure Blockchain-Based Vehicular Collision Avoidance Protocol: Detecting and Preventing Blackhole Attacks

    Mosab Manaseer1, Maram Bani Younes2,*

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1699-1721, 2024, DOI:10.32604/csse.2024.055128 - 22 November 2024

    Abstract This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems, especially collision avoidance protocols. It focuses on achieving the availability of network communication among traveling vehicles. Finally, it aims to find a secure solution to prevent blackhole attacks on vehicular network communications. The proposed solution relies on authenticating vehicles by joining a blockchain network. This technology provides identification information and receives cryptography keys. Moreover, the ad hoc on-demand distance vector (AODV) protocol is used for route discovery and ensuring reliable node communication. The system activates an adaptive mode for monitoring More >

  • Open Access

    ARTICLE

    Physical Layer Security of 6G Vehicular Networks with UAV Systems: First Order Secrecy Metrics, Optimization, and Bounds

    Sagar Kavaiya1, Hiren Mewada2,*, Sagarkumar Patel3, Dharmendra Chauhan3, Faris A. Almalki4, Hana Mohammed Mujlid4

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3685-3711, 2024, DOI:10.32604/cmc.2024.053587 - 12 September 2024

    Abstract The mobility and connective capabilities of unmanned aerial vehicles (UAVs) are becoming more and more important in defense, commercial, and research domains. However, their open communication makes UAVs susceptible to undesirable passive attacks such as eavesdropping or jamming. Recently, the inefficiency of traditional cryptography-based techniques has led to the addition of Physical Layer Security (PLS). This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments, proposing a solution to complement the conventional cryptography approach. Initially, we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems, namely hybrid… More >

  • Open Access

    ARTICLE

    Adaptive Resource Allocation Algorithm for 5G Vehicular Cloud Communication

    Huanhuan Li1,2,*, Hongchang Wei2, Zheliang Chen2, Yue Xu3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2199-2219, 2024, DOI:10.32604/cmc.2024.052155 - 15 August 2024

    Abstract The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges, such as low user utilization, unbalanced resource allocation, and extended adaptive allocation time. We propose an adaptive allocation algorithm for mobile cloud communication resources in 5G vehicular networks to address these issues. This study analyzes the components of the 5G vehicular network architecture to determine the performance of different components. It is ascertained that the communication modes in 5G vehicular networks for mobile cloud communication include in-band and out-of-band modes. Furthermore, this study analyzes the single-hop and multi-hop modes in… More >

  • Open Access

    ARTICLE

    Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks

    Youseef Alotaibi1, B. Rajasekar2, R. Jayalakshmi3, Surendran Rajendran4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4243-4262, 2024, DOI:10.32604/cmc.2024.047608 - 26 March 2024

    Abstract Rapid development in Information Technology (IT) has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle (V2V) transmission. Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data. The communication occurs directly between V2V and Base Station (BS) units such as the Road Side Unit (RSU), named as a Vehicle to Infrastructure (V2I). However, the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time. Therefore, the scheme of an effectual routing protocol for reliable and stable communications… More >

  • Open Access

    ARTICLE

    Developing Transparent IDS for VANETs Using LIME and SHAP: An Empirical Study

    Fayaz Hassan1,*, Jianguo Yu1, Zafi Sherhan Syed2, Arif Hussain Magsi3, Nadeem Ahmed4

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3185-3208, 2023, DOI:10.32604/cmc.2023.044650 - 26 December 2023

    Abstract Vehicular Ad-hoc Networks (VANETs) are mobile ad-hoc networks that use vehicles as nodes to create a wireless network. Whereas VANETs offer many advantages over traditional transportation networks, ensuring security in VANETs remains a significant challenge due to the potential for malicious attacks. This study addresses the critical issue of security in VANETs by introducing an intelligent Intrusion Detection System (IDS) that merges Machine Learning (ML)–based attack detection with Explainable AI (XAI) explanations. This study ML pipeline involves utilizing correlation-based feature selection followed by a Random Forest (RF) classifier that achieves a classification accuracy of 100%… More >

  • Open Access

    ARTICLE

    A Trusted Edge Resource Allocation Framework for Internet of Vehicles

    Yuxuan Zhong1, Siya Xu1, Boxian Liao1, Jizhao Lu2, Huiping Meng2, Zhili Wang1, Xingyu Chen1,*, Qinghan Li3

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2629-2644, 2023, DOI:10.32604/cmc.2023.035526 - 29 November 2023

    Abstract With the continuous progress of information technique, assisted driving technology has become an effective technique to avoid traffic accidents. Due to the complex road conditions and the threat of vehicle information being attacked and tampered with, it is difficult to ensure information security. This paper uses blockchain to ensure the safety of driving information and introduces mobile edge computing technology to monitor vehicle information and road condition information in real time, calculate the appropriate speed, and plan a reasonable driving route for the driver. To solve these problems, this paper proposes a trusted edge resource… More >

  • Open Access

    ARTICLE

    A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking

    Arif Hussain Magsi1,*, Ali Ghulam2, Saifullah Memon1, Khalid Javeed3, Musaed Alhussein4, Imad Rida5

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1445-1465, 2023, DOI:10.32604/cmc.2023.040290 - 29 November 2023

    Abstract Named Data Networking (NDN) is gaining a significant attention in Vehicular Ad-hoc Networks (VANET) due to its in-network content caching, name-based routing, and mobility-supporting characteristics. Nevertheless, existing NDN faces three significant challenges, including security, privacy, and routing. In particular, security attacks, such as Content Poisoning Attacks (CPA), can jeopardize legitimate vehicles with malicious content. For instance, attacker host vehicles can serve consumers with invalid information, which has dire consequences, including road accidents. In such a situation, trust in the content-providing vehicles brings a new challenge. On the other hand, ensuring privacy and preventing unauthorized access… More >

Displaying 1-10 on page 1 of 21. Per Page