Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13)
  • Open Access

    ARTICLE

    A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT

    Xiao Feng1,2,3,*, Zheng Yuan1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1881-1895, 2024, DOI:10.32604/cmc.2023.047243

    Abstract First, we propose a cross-domain authentication architecture based on trust evaluation mechanism, including registration, certificate issuance, and cross-domain authentication processes. A direct trust evaluation mechanism based on the time decay factor is proposed, taking into account the influence of historical interaction records. We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data. We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record. Then we propose an autoencoder-based trust clustering algorithm. We perform feature… More >

  • Open Access

    ARTICLE

    A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture

    Yi-Bo Cao1,*, Xiu-Bo Chen1, Yun-Feng He2, Lu-Xi Liu2, Yin-Mei Che2, Xiao Wang2, Ke Xiao3, Gang Xu3, Si-Yi Chen1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2813-2827, 2024, DOI:10.32604/cmc.2024.046816

    Abstract Due to the rapid advancements in network technology, blockchain is being employed for distributed data storage. In the Internet of Things (IoT) scenario, different participants manage multiple blockchains located in different trust domains, which has resulted in the extensive development of cross-domain authentication techniques. However, the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography, posing a significant security threat. In response to the aforementioned challenges, our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset… More >

  • Open Access

    ARTICLE

    Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management

    Lizhe Zhang1,2,*, Yongqiang Huang2, Jia Nie2, Kenian Wang1,2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1467-1488, 2023, DOI:10.32604/cmc.2023.042305

    Abstract System-wide information management (SWIM) is a complex distributed information transfer and sharing system for the next generation of Air Transportation System (ATS). In response to the growing volume of civil aviation air operations, users accessing different authentication domains in the SWIM system have problems with the validity, security, and privacy of SWIM-shared data. In order to solve these problems, this paper proposes a SWIM cross-domain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication. The scheme uses a consistent hash algorithm with virtual nodes in combination with a… More >

  • Open Access

    ARTICLE

    BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks

    Fengting Luo, Ruwei Huang*, Yuyue Chen

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1815-1835, 2023, DOI:10.32604/cmc.2023.041676

    Abstract Smart parks serve as integral components of smart cities, where they play a pivotal role in the process of urban modernization. The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase. To ensure secure communication, device identities must undergo authentication. The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices, making it impractical for resource-constrained devices. This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks, which simplifies the authentication interaction and requires every device to maintain only one certificate. To… More >

  • Open Access

    ARTICLE

    A Sketch-Based Generation Model for Diverse Ceramic Tile Images Using Generative Adversarial Network

    Jianfeng Lu1,*, Xinyi Liu1, Mengtao Shi1, Chen Cui1,2, Mahmoud Emam1,3

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2865-2882, 2023, DOI:10.32604/iasc.2023.039742

    Abstract Ceramic tiles are one of the most indispensable materials for interior decoration. The ceramic patterns can’t match the design requirements in terms of diversity and interactivity due to their natural textures. In this paper, we propose a sketch-based generation method for generating diverse ceramic tile images based on a hand-drawn sketches using Generative Adversarial Network (GAN). The generated tile images can be tailored to meet the specific needs of the user for the tile textures. The proposed method consists of four steps. Firstly, a dataset of ceramic tile images with diverse distributions is created and then pre-trained based on GAN.… More >

  • Open Access

    ARTICLE

    Cross-Domain Data Traceability Mechanism Based on Blockchain

    Shoucai Zhao, Lifeng Cao*, Jinhui Li, Jiling Wan, Jinlong Bai

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2531-2549, 2023, DOI:10.32604/cmc.2023.040776

    Abstract With the application and development of blockchain technology, many problems faced by blockchain traceability are gradually exposed. Such as cross-chain information collaboration, data separation and storage, multi-system, multi-security domain collaboration, etc. To solve these problems, it is proposed to construct trust domains based on federated chains. The public chain is used as the authorization chain to build a cross-domain data traceability mechanism applicable to multi-domain collaboration. First, the architecture of the blockchain cross-domain model is designed. Combined with the data access strategy and the decision mechanism, the open and transparent judgment of cross-domain permission and cross-domain identity authentication is realized.… More >

  • Open Access

    ARTICLE

    Cross-Domain TSK Fuzzy System Based on Semi-Supervised Learning for Epilepsy Classification

    Zaihe Cheng1, Yuwen Tao2, Xiaoqing Gu3, Yizhang Jiang2, Pengjiang Qian2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1613-1633, 2023, DOI:10.32604/cmes.2023.027708

    Abstract Through semi-supervised learning and knowledge inheritance, a novel Takagi-Sugeno-Kang (TSK) fuzzy system framework is proposed for epilepsy data classification in this study. The new method is based on the maximum mean discrepancy (MMD) method and TSK fuzzy system, as a basic model for the classification of epilepsy data. First, for medical data, the interpretability of TSK fuzzy systems can ensure that the prediction results are traceable and safe. Second, in view of the deviation in the data distribution between the real source domain and the target domain, MMD is used to measure the distance between dierent data distributions. The objective… More >

  • Open Access

    ARTICLE

    A Cross-Domain Trust Model of Smart City IoT Based on Self-Certification

    Yao Wang1, Yubo Wang1, Zhenhu Ning1,*, Sadaqat ur Rehman2, Muhammad Waqas1,3

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 981-996, 2023, DOI:10.32604/iasc.2023.030091

    Abstract Smart city refers to the information system with Internet of things and cloud computing as the core technology and government management and industrial development as the core content, forming a large-scale, heterogeneous and dynamic distributed Internet of things environment between different Internet of things. There is a wide demand for cooperation between equipment and management institutions in the smart city. Therefore, it is necessary to establish a trust mechanism to promote cooperation, and based on this, prevent data disorder caused by the interaction between honest terminals and malicious terminals. However, most of the existing research on trust mechanism is divorced… More >

  • Open Access

    ARTICLE

    Vehicle Matching Based on Similarity Metric Learning

    Yujiang Li1,2, Chun Ding1,2, Zhili Zhou1,2,*

    Journal of New Media, Vol.4, No.1, pp. 51-58, 2022, DOI:10.32604/jnm.2022.028775

    Abstract With the development of new media technology, vehicle matching plays a further significant role in video surveillance systems. Recent methods explored the vehicle matching based on the feature extraction. Meanwhile, similarity metric learning also has achieved enormous progress in vehicle matching. But most of these methods are less effective in some realistic scenarios where vehicles usually be captured in different times. To address this cross-domain problem, we propose a cross-domain similarity metric learning method that utilizes the GAN to generate vehicle images with another domain and propose the two-channel Siamese network to learn a similarity metric from both domains (i.e.,… More >

  • Open Access

    ARTICLE

    Research on Cross-domain Representation Learning Based on Multi-network Space Fusion

    Ye Yang1, Dongjie Zhu2,*, Xiaofang Li3, Haiwen Du4, Yundong Sun4, Zhixin Huo2, Mingrui Wu2, Ning Cao1, Russell Higgs5

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1379-1391, 2022, DOI:10.32604/iasc.2022.025181

    Abstract In recent years, graph representation learning has played a huge role in the fields and research of node clustering, node classification, link prediction, etc., among which many excellent models and methods have emerged. These methods can achieve better results for model training and verification of data in a single space domain. However, in real scenarios, the solution of cross-domain problems of multiple information networks is very practical and important, and the existing methods cannot be applied to cross-domain scenarios, so we research on cross-domain representation is based on multi-network space integration. This paper conducts representation learning research for cross-domain scenarios.… More >

Displaying 1-10 on page 1 of 13. Per Page