Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    REVIEW

    Enhancing Deepfake Detection: Proactive Forensics Techniques Using Digital Watermarking

    Zhimao Lai1,2, Saad Arif3, Cong Feng4, Guangjun Liao5, Chuntao Wang6,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 73-102, 2025, DOI:10.32604/cmc.2024.059370 - 03 January 2025

    Abstract With the rapid advancement of visual generative models such as Generative Adversarial Networks (GANs) and stable Diffusion, the creation of highly realistic Deepfake through automated forgery has significantly progressed. This paper examines the advancements in Deepfake detection and defense technologies, emphasizing the shift from passive detection methods to proactive digital watermarking techniques. Passive detection methods, which involve extracting features from images or videos to identify forgeries, encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics. In contrast, proactive digital watermarking techniques embed specific markers into images or videos, facilitating More >

  • Open Access

    REVIEW

    The Impact of Domain Name Server (DNS) over Hypertext Transfer Protocol Secure (HTTPS) on Cyber Security: Limitations, Challenges, and Detection Techniques

    Muhammad Dawood1, Shanshan Tu1, Chuangbai Xiao1, Muhammad Haris2, Hisham Alasmary3, Muhammad Waqas4,5,*, Sadaqat Ur Rehman6

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4513-4542, 2024, DOI:10.32604/cmc.2024.050049 - 12 September 2024

    Abstract The DNS over HTTPS (Hypertext Transfer Protocol Secure) (DoH) is a new technology that encrypts DNS traffic, enhancing the privacy and security of end-users. However, the adoption of DoH is still facing several research challenges, such as ensuring security, compatibility, standardization, performance, privacy, and increasing user awareness. DoH significantly impacts network security, including better end-user privacy and security, challenges for network security professionals, increasing usage of encrypted malware communication, and difficulty adapting DNS-based security measures. Therefore, it is important to understand the impact of DoH on network security and develop new privacy-preserving techniques to allow More >

  • Open Access

    REVIEW

    A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques

    Singamaneni Krishnapriya*, Sukhvinder Singh

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2675-2719, 2024, DOI:10.32604/cmc.2024.052447 - 15 August 2024

    Abstract The increase in number of people using the Internet leads to increased cyberattack opportunities. Advanced Persistent Threats, or APTs, are among the most dangerous targeted cyberattacks. APT attacks utilize various advanced tools and techniques for attacking targets with specific goals. Even countries with advanced technologies, like the US, Russia, the UK, and India, are susceptible to this targeted attack. APT is a sophisticated attack that involves multiple stages and specific strategies. Besides, TTP (Tools, Techniques, and Procedures) involved in the APT attack are commonly new and developed by an attacker to evade the security system.… More >

  • Open Access

    REVIEW

    An Insight Survey on Sensor Errors and Fault Detection Techniques in Smart Spaces

    Sheetal Sharma1,2, Kamali Gupta1, Deepali Gupta1, Shalli Rani1,*, Gaurav Dhiman3,4,5,6,7,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2029-2059, 2024, DOI:10.32604/cmes.2023.029997 - 15 December 2023

    Abstract The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making them more intelligent and connected. However, this advancement comes with challenges related to the effectiveness of IoT devices. These devices, present in offices, homes, industries, and more, need constant monitoring to ensure their proper functionality. The success of smart systems relies on their seamless operation and ability to handle faults. Sensors, crucial components of these systems, gather data and contribute to their functionality. Therefore, sensor faults can compromise the system’s reliability and undermine the trustworthiness of smart environments. To address… More > Graphic Abstract

    An Insight Survey on Sensor Errors and Fault Detection Techniques in Smart Spaces

  • Open Access

    ARTICLE

    Performance Analysis of Three Spectrum Sensing Detection Techniques with Ambient Backscatter Communication in Cognitive Radio Networks

    Shayla Islam1, Anil Kumar Budati1,*, Mohammad Kamrul Hasan2, Saoucene Mahfoudh3, Syed Bilal Hussian Shah3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 813-825, 2023, DOI:10.32604/cmes.2023.027595 - 23 April 2023

    Abstract In wireless communications, the Ambient Backscatter Communication (AmBC) technique is a promising approach, detecting user presence accurately at low power levels. At low power or a low Signal-to-Noise Ratio (SNR), there is no dedicated power for the users. Instead, they can transmit information by reflecting the ambient Radio Frequency (RF) signals in the spectrum. Therefore, it is essential to detect user presence in the spectrum for the transmission of data without loss or without collision at a specific time. In this paper, the authors proposed a novel Spectrum Sensing (SS) detection technique in the Cognitive… More >

  • Open Access

    ARTICLE

    Community Detection Using Jaacard Similarity with SIM-Edge Detection Techniques

    K. Chitra*, A. Tamilarasi

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 327-337, 2023, DOI:10.32604/csse.2023.023920 - 01 June 2022

    Abstract The structure and dynamic nature of real-world networks can be revealed by communities that help in promotion of recommendation systems. Social Media platforms were initially developed for effective communication, but now it is being used widely for extending and to obtain profit among business community. The numerous data generated through these platforms are utilized by many companies that make a huge profit out of it. A giant network of people in social media is grouped together based on their similar properties to form a community. Community detection is recent topic among the research community due… More >

Displaying 1-10 on page 1 of 6. Per Page