Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,360)
  • Open Access

    ARTICLE

    FL-EASGD: Federated Learning Privacy Security Method Based on Homomorphic Encryption

    Hao Sun*, Xiubo Chen, Kaiguo Yuan

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2361-2373, 2024, DOI:10.32604/cmc.2024.049159

    Abstract Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext data. However, there is still a potential risk of privacy leakage, for example, attackers can obtain the original data through model inference attacks. Therefore, safeguarding the privacy of model parameters becomes crucial. One proposed solution involves incorporating homomorphic encryption algorithms into the federated learning process. However, the existing federated learning privacy protection scheme based on homomorphic encryption will greatly reduce the efficiency and robustness when there are performance differences between parties or abnormal nodes. To solve the above problems, this paper proposes a… More >

  • Open Access

    ARTICLE

    Attribute Reduction of Hybrid Decision Information Systems Based on Fuzzy Conditional Information Entropy

    Xiaoqin Ma1,2, Jun Wang1, Wenchang Yu1, Qinli Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2063-2083, 2024, DOI:10.32604/cmc.2024.049147

    Abstract The presence of numerous uncertainties in hybrid decision information systems (HDISs) renders attribute reduction a formidable task. Currently available attribute reduction algorithms, including those based on Pawlak attribute importance, Skowron discernibility matrix, and information entropy, struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values, and attributes with fuzzy boundaries and abnormal values. In order to address the aforementioned issues, this paper delves into the study of attribute reduction within HDISs. First of all, a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring… More >

  • Open Access

    ARTICLE

    Elevating Image Steganography: A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities

    Muhammad Zaman Ali1, Omer Riaz1, Hafiz Muhammad Hasnain2, Waqas Sharif2, Tenvir Ali2, Gyu Sang Choi3,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2923-2943, 2024, DOI:10.32604/cmc.2024.049139

    Abstract In today’s rapidly evolving landscape of communication technologies, ensuring the secure delivery of sensitive data has become an essential priority. To overcome these difficulties, different steganography and data encryption methods have been proposed by researchers to secure communications. Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution. In this work, we have an approach that utilizes a combination of Most Significant Bit (MSB) matching and Least Significant Bit (LSB) substitution. The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,… More >

  • Open Access

    ARTICLE

    A Novel Scheduling Framework for Multi-Programming Quantum Computing in Cloud Environment

    Danyang Zheng, Jinchen Xv, Feng Yue, Qiming Du, Zhiheng Wang, Zheng Shan*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1957-1974, 2024, DOI:10.32604/cmc.2024.048956

    Abstract As cloud quantum computing gains broader acceptance, a growing quantity of researchers are directing their focus towards this domain. Nevertheless, the rapid surge in demand for cloud-based quantum computing resources has led to a scarcity, which in turn hampers users from achieving optimal satisfaction. Therefore, cloud quantum computing service providers require a unified analysis and scheduling framework for their quantum resources and user jobs to meet the ever-growing usage demands. This paper introduces a new multi-programming scheduling framework for quantum computing in a cloud environment. The framework addresses the issue of limited quantum computing resources in cloud environments and ensures… More >

  • Open Access

    ARTICLE

    Lightweight Res-Connection Multi-Branch Network for Highly Accurate Crowd Counting and Localization

    Mingze Li, Diwen Zheng, Shuhua Lu*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2105-2122, 2024, DOI:10.32604/cmc.2024.048928

    Abstract Crowd counting is a promising hotspot of computer vision involving crowd intelligence analysis, achieving tremendous success recently with the development of deep learning. However, there have been still many challenges including crowd multi-scale variations and high network complexity, etc. To tackle these issues, a lightweight Res-connection multi-branch network (LRMBNet) for highly accurate crowd counting and localization is proposed. Specifically, using improved ShuffleNet V2 as the backbone, a lightweight shallow extractor has been designed by employing the channel compression mechanism to reduce enormously the number of network parameters. A light multi-branch structure with different expansion rate convolutions is demonstrated to extract… More >

  • Open Access

    ARTICLE

    MoBShield: A Novel XML Approach for Securing Mobile Banking

    Saeed Seraj1, Ali Safaa Sadiq1,*, Omprakash Kaiwartya1, Mohammad Aljaidi2, Alexandros Konios1, Mohammed Ali3, Mohammed Abazeed3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2123-2149, 2024, DOI:10.32604/cmc.2024.048914

    Abstract Mobile banking security has witnessed significant R&D attention from both financial institutions and academia. This is due to the growing number of mobile baking applications and their reachability and usefulness to society. However, these applications are also attractive prey for cybercriminals, who use a variety of malware to steal personal banking information. Related literature in mobile banking security requires many permissions that are not necessary for the application’s intended security functionality. In this context, this paper presents a novel efficient permission identification approach for securing mobile banking (MoBShield) to detect and prevent malware. A permission-based dataset is generated for mobile… More >

  • Open Access

    ARTICLE

    Investigation of Inside-Out Tracking Methods for Six Degrees of Freedom Pose Estimation of a Smartphone in Augmented Reality

    Chanho Park1, Takefumi Ogawa2,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3047-3065, 2024, DOI:10.32604/cmc.2024.048901

    Abstract Six degrees of freedom (6DoF) input interfaces are essential for manipulating virtual objects through translation or rotation in three-dimensional (3D) space. A traditional outside-in tracking controller requires the installation of expensive hardware in advance. While inside-out tracking controllers have been proposed, they often suffer from limitations such as interaction limited to the tracking range of the sensor (e.g., a sensor on the head-mounted display (HMD)) or the need for pose value modification to function as an input interface (e.g., a sensor on the controller). This study investigates 6DoF pose estimation methods without restricting the tracking range, using a smartphone as… More >

  • Open Access

    ARTICLE

    Improved Particle Swarm Optimization for Parameter Identification of Permanent Magnet Synchronous Motor

    Shuai Zhou1, Dazhi Wang1,*, Yongliang Ni2, Keling Song2, Yanming Li2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2187-2207, 2024, DOI:10.32604/cmc.2024.048859

    Abstract In the process of identifying parameters for a permanent magnet synchronous motor, the particle swarm optimization method is prone to being stuck in local optima in the later stages of iteration, resulting in low parameter accuracy. This work proposes a fuzzy particle swarm optimization approach based on the transformation function and the filled function. This approach addresses the topic of particle swarm optimization in parameter identification from two perspectives. Firstly, the algorithm uses a transformation function to change the form of the fitness function without changing the position of the extreme point of the fitness function, making the extreme point… More >

  • Open Access

    ARTICLE

    YOLO-MFD: Remote Sensing Image Object Detection with Multi-Scale Fusion Dynamic Head

    Zhongyuan Zhang, Wenqiu Zhu*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2547-2563, 2024, DOI:10.32604/cmc.2024.048755

    Abstract Remote sensing imagery, due to its high altitude, presents inherent challenges characterized by multiple scales, limited target areas, and intricate backgrounds. These inherent traits often lead to increased miss and false detection rates when applying object recognition algorithms tailored for remote sensing imagery. Additionally, these complexities contribute to inaccuracies in target localization and hinder precise target categorization. This paper addresses these challenges by proposing a solution: The YOLO-MFD model (YOLO-MFD: Remote Sensing Image Object Detection with Multi-scale Fusion Dynamic Head). Before presenting our method, we delve into the prevalent issues faced in remote sensing imagery analysis. Specifically, we emphasize the… More >

  • Open Access

    ARTICLE

    RepBoTNet-CESA: An Alzheimer’s Disease Computer Aided Diagnosis Method Using Structural Reparameterization BoTNet and Cubic Embedding Self Attention

    Xiabin Zhang1,2, Zhongyi Hu1,2,*, Lei Xiao1,2, Hui Huang1,2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2879-2905, 2024, DOI:10.32604/cmc.2024.048725

    Abstract Various deep learning models have been proposed for the accurate assisted diagnosis of early-stage Alzheimer’s disease (AD). Most studies predominantly employ Convolutional Neural Networks (CNNs), which focus solely on local features, thus encountering difficulties in handling global features. In contrast to natural images, Structural Magnetic Resonance Imaging (sMRI) images exhibit a higher number of channel dimensions. However, during the Position Embedding stage of Multi Head Self Attention (MHSA), the coded information related to the channel dimension is disregarded. To tackle these issues, we propose the RepBoTNet-CESA network, an advanced AD-aided diagnostic model that is capable of learning local and global… More >

Displaying 71-80 on page 8 of 22360. Per Page