Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack

    Xiaoling Yu1, Chungen Xu1, *, Lei Xu1, Yuntao Wang2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1107-1125, 2020, DOI:10.32604/cmc.2020.09680

    Abstract To save the local storage, users store the data on the cloud server who offers convenient internet services. To guarantee the data privacy, users encrypt the data before uploading them into the cloud server. Since encryption can reduce the data availability, public-key encryption with keyword search (PEKS) is developed to achieve the retrieval of the encrypted data without decrypting them. However, most PEKS schemes cannot resist quantum computing attack, because the corresponding hardness assumptions are some number theory problems that can be solved efficiently under quantum computers. Besides, the traditional PEKS schemes have an inherent security issue that they cannot… More >

  • Open Access

    ARTICLE

    A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain

    Hangjun Zhou1, *, Guang Sun1, 2, Sha Fu1, Xiaoping Fan1, Wangdong Jiang1, Shuting Hu1, Lingjiao Li1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1091-1105, 2020, DOI:10.32604/cmc.2020.09834

    Abstract Supply Chain Finance (SCF) is important for improving the effectiveness of supply chain capital operations and reducing the overall management cost of a supply chain. In recent years, with the deep integration of supply chain and Internet, Big Data, Artificial Intelligence, Internet of Things, Blockchain, etc., the efficiency of supply chain financial services can be greatly promoted through building more customized risk pricing models and conducting more rigorous investment decision-making processes. However, with the rapid development of new technologies, the SCF data has been massively increased and new financial fraud behaviors or patterns are becoming more covertly scattered among normal… More >

  • Open Access

    ARTICLE

    Research on Detection Method of Interest Flooding Attack on Content Centric Network

    Yabin Xu1, 2, 3, *, Ting Xu3, Xiaowei Xu4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1075-1089, 2020, DOI:10.32604/cmc.2020.09849

    Abstract To improve the attack detection capability of content centric network (CCN), we propose a detection method of interest flooding attack (IFA) making use of the feature of self-similarity of traffic and the information entropy of content name of interest packet. On the one hand, taking advantage of the characteristics of self-similarity is very sensitive to traffic changes, calculating the Hurst index of the traffic, to identify initial IFA attacks. On the other hand, according to the randomness of user requests, calculating the information entropy of content name of the interest packets, to detect the severity of the IFA attack, is.… More >

  • Open Access

    ARTICLE

    Anomaly IoT Node Detection Based on Local Outlier Factor and Time Series

    Fang Wang1, *, Zhe Wei1, Xu Zuo2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1063-1073, 2020, DOI:10.32604/cmc.2020.09774

    Abstract The heterogeneous nodes in the Internet of Things (IoT) are relatively weak in the computing power and storage capacity. Therefore, traditional algorithms of network security are not suitable for the IoT. Once these nodes alternate between normal behavior and anomaly behavior, it is difficult to identify and isolate them by the network system in a short time, thus the data transmission accuracy and the integrity of the network function will be affected negatively. Based on the characteristics of IoT, a lightweight local outlier factor detection method is used for node detection. In order to further determine whether the nodes are… More >

  • Open Access

    ARTICLE

    An Immunization Scheme for Ransomware

    Jingping Song1, Qingyu Meng1, Chenke Luo2, Nitin Naik3, Jian Xu1, *

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1051-1061, 2020, DOI:10.32604/cmc.2020.010592

    Abstract In recent years, as the popularity of anonymous currencies such as Bitcoin has made the tracking of ransomware attackers more difficult, the amount of ransomware attacks against personal computers and enterprise production servers is increasing rapidly. The ransomware has a wide range of influence and spreads all over the world. It is affecting many industries including internet, education, medical care, traditional industry, etc. This paper uses the idea of virus immunity to design an immunization solution for ransomware viruses to solve the problems of traditional ransomware defense methods (such as anti-virus software, firewalls, etc.), which cannot meet the requirements of… More >

  • Open Access

    ARTICLE

    Air Quality Prediction Based on Kohonen Clustering and ReliefF Feature Selection

    Bolun Chen1, 2, Guochang Zhu1, *, Min Ji1, Yongtao Yu1, Jianyang Zhao1, Wei Liu3

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1039-1049, 2020, DOI:10.32604/cmc.2020.010583

    Abstract Air quality prediction is an important part of environmental governance. The accuracy of the air quality prediction also affects the planning of people’s outdoor activities. How to mine effective information from historical data of air pollution and reduce unimportant factors to predict the law of pollution change is of great significance for pollution prevention, pollution control and pollution early warning. In this paper, we take into account that there are different trends in air pollutants and that different climatic factors have different effects on air pollutants. Firstly, the data of air pollutants in different cities are collected by a sliding… More >

  • Open Access

    ARTICLE

    Privacy Protection Algorithm for the Internet of Vehicles Based on Local Differential Privacy and Game Model

    Wenxi Han1, 2, Mingzhi Cheng3, *, Min Lei1, 2, Hanwen Xu2, Yu Yang1, 2, Lei Qian4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1025-1038, 2020, DOI:10.32604/cmc.2020.09815

    Abstract In recent years, with the continuous advancement of the intelligent process of the Internet of Vehicles (IoV), the problem of privacy leakage in IoV has become increasingly prominent. The research on the privacy protection of the IoV has become the focus of the society. This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms, proposes a privacy protection system structure based on untrusted data collection server, and designs a vehicle location acquisition algorithm based on a local differential privacy and game model. The algorithm first meshes the road network space. Then, the dynamic… More >

  • Open Access

    ARTICLE

    New Three-Dimensional Assessment Model and Optimization of Acoustic Positioning System

    Lin Zhao1, Xiaobo Chen1, 2, *, Jianhua Cheng1, Lianhua Yu3, Chengcai Lv4, Jiuru Wang5

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1005-1023, 2020, DOI:10.32604/cmc.2020.010290

    Abstract This paper addresses the problem of assessing and optimizing the acoustic positioning system for underwater target localization with range measurement. We present a new three-dimensional assessment model to evaluate the optimal geometric beacon formation whether meets user requirements. For mathematical tractability, it is assumed that the measurements of the range between the target and beacons are corrupted with white Gaussian noise with variance, which is distance-dependent. Then, the relationship between DOP parameters and positioning accuracy can be derived by adopting dilution of precision (DOP) parameters in the assessment model. In addition, the optimal geometric beacon formation yielding the best performance… More >

  • Open Access

    ARTICLE

    Three-Phase Unbalance Prediction of Electric Power Based on Hierarchical Temporal Memory

    Hui Li1, Cailin Shi2, 3, Xin Liu2, 3, Aziguli Wulamu2, 3, *, Alan Yang4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 987-1004, 2020, DOI:10.32604/cmc.2020.09812

    Abstract The difference in electricity and power usage time leads to an unbalanced current among the three phases in the power grid. The three-phase unbalanced is closely related to power planning and load distribution. When the unbalance occurs, the safe operation of the electrical equipment will be seriously jeopardized. This paper proposes a Hierarchical Temporal Memory (HTM)-based three-phase unbalance prediction model consisted by the encoder for binary coding, the spatial pooler for frequency pattern learning, the temporal pooler for pattern sequence learning, and the sparse distributed representations classifier for unbalance prediction. Following the feasibility of spatialtemporal streaming data analysis, we adopted… More >

  • Open Access

    ARTICLE

    Non-Exchangeable Error Compensation for Strapdown Inertial Navigation System in High Dynamic Environment

    Qi Wang1, 2, *, Changsong Yang2, 3, Shao’en Wu4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 973-986, 2020, DOI:10.32604/cmc.2020.07575

    Abstract Strapdown non-exchangeable error compensation technology in high dynamic environment is one of the key technologies of strapdown inertial navigation system. Mathematical platform is used in strapdown inertial navigation system instead of physical platform in traditional platform inertial navigation system, which improves reliability and reduces cost and volume of system. The maximum error source of attitude matrix solution is the non-exchangeable error of rotation due to the non-exchangeable of finite rotation of rigid bodies. The rotation non-exchangeable error reaches the maximum in coning motion, although it can be reduced by shortening the correction period and increasing the real-time calculation. The equivalent… More >

Displaying 4041-4050 on page 405 of 5350. Per Page