Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (251)
  • Open Access

    ARTICLE

    A Blockchain-Based Access Management System for Enhanced Patient Privacy and Secure Telehealth and Telemedicine Data

    Ayoub Ghani1,*, Ahmed Zinedine1, Mohammed El Mohajir2

    Intelligent Automation & Soft Computing, Vol.40, pp. 75-98, 2025, DOI:10.32604/iasc.2025.060143 - 23 January 2025

    Abstract The Internet of Things (IoT) advances allow healthcare providers to distantly gather and immediately analyze patient health data for diagnostic purposes via connected health devices. In a COVID-19-like pandemic, connected devices can mitigate virus spread and make essential information, such as respiratory patterns, available to healthcare professionals. However, these devices generate vast amounts of data, rendering them susceptible to privacy breaches, and data leaks. Blockchain technology is a robust solution to address these issues in telemedicine systems. This paper proposes a blockchain-based access management solution to enhance patient privacy and secure telehealth and telemedicine data.… More >

  • Open Access

    ARTICLE

    A Support Vector Machine (SVM) Model for Privacy Recommending Data Processing Model (PRDPM) in Internet of Vehicles

    Ali Alqarni*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 389-406, 2025, DOI:10.32604/cmc.2024.059238 - 03 January 2025

    Abstract Open networks and heterogeneous services in the Internet of Vehicles (IoV) can lead to security and privacy challenges. One key requirement for such systems is the preservation of user privacy, ensuring a seamless experience in driving, navigation, and communication. These privacy needs are influenced by various factors, such as data collected at different intervals, trip durations, and user interactions. To address this, the paper proposes a Support Vector Machine (SVM) model designed to process large amounts of aggregated data and recommend privacy-preserving measures. The model analyzes data based on user demands and interactions with service More >

  • Open Access

    REVIEW

    The Internet of Things under Federated Learning: A Review of the Latest Advances and Applications

    Jinlong Wang1,2,*, Zhenyu Liu1, Xingtao Yang1, Min Li1, Zhihan Lyu3

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1-39, 2025, DOI:10.32604/cmc.2024.058926 - 03 January 2025

    Abstract With the rapid development of artificial intelligence, the Internet of Things (IoT) can deploy various machine learning algorithms for network and application management. In the IoT environment, many sensors and devices generate massive data, but data security and privacy protection have become a serious challenge. Federated learning (FL) can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing. This review aims to deeply explore the combination of FL and the IoT, and analyze the application of federated learning in the IoT from More >

  • Open Access

    ARTICLE

    AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation

    Congcong Wang1, Chen Wang2,3,*, Wenying Zheng4,*, Wei Gu5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 799-816, 2025, DOI:10.32604/cmc.2024.057975 - 03 January 2025

    Abstract As smart grid technology rapidly advances, the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection. Current research emphasizes data security and user privacy concerns within smart grids. However, existing methods struggle with efficiency and security when processing large-scale data. Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge. This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities. The approach optimizes data preprocessing, More >

  • Open Access

    ARTICLE

    SensFL: Privacy-Preserving Vertical Federated Learning with Sensitive Regularization

    Chongzhen Zhang1,2,*, Zhichen Liu3, Xiangrui Xu3, Fuqiang Hu3, Jiao Dai3, Baigen Cai1, Wei Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 385-404, 2025, DOI:10.32604/cmes.2024.055596 - 17 December 2024

    Abstract In the realm of Intelligent Railway Transportation Systems, effective multi-party collaboration is crucial due to concerns over privacy and data silos. Vertical Federated Learning (VFL) has emerged as a promising approach to facilitate such collaboration, allowing diverse entities to collectively enhance machine learning models without the need to share sensitive training data. However, existing works have highlighted VFL’s susceptibility to privacy inference attacks, where an honest but curious server could potentially reconstruct a client’s raw data from embeddings uploaded by the client. This vulnerability poses a significant threat to VFL-based intelligent railway transportation systems. In… More >

  • Open Access

    ARTICLE

    ML-SPAs: Fortifying Healthcare Cybersecurity Leveraging Varied Machine Learning Approaches against Spear Phishing Attacks

    Saad Awadh Alanazi*

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4049-4080, 2024, DOI:10.32604/cmc.2024.057211 - 19 December 2024

    Abstract Spear Phishing Attacks (SPAs) pose a significant threat to the healthcare sector, resulting in data breaches, financial losses, and compromised patient confidentiality. Traditional defenses, such as firewalls and antivirus software, often fail to counter these sophisticated attacks, which target human vulnerabilities. To strengthen defenses, healthcare organizations are increasingly adopting Machine Learning (ML) techniques. ML-based SPA defenses use advanced algorithms to analyze various features, including email content, sender behavior, and attachments, to detect potential threats. This capability enables proactive security measures that address risks in real-time. The interpretability of ML models fosters trust and allows security… More >

  • Open Access

    ARTICLE

    A Location Trajectory Privacy Protection Method Based on Generative Adversarial Network and Attention Mechanism

    Xirui Yang, Chen Zhang*

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3781-3804, 2024, DOI:10.32604/cmc.2024.057131 - 19 December 2024

    Abstract User location trajectory refers to the sequence of geographic location information that records the user’s movement or stay within a period of time and is usually used in mobile crowd sensing networks, in which the user participates in the sensing task, the process of sensing data collection faces the problem of privacy leakage. To address the privacy leakage issue of trajectory data during uploading, publishing, and sharing when users use location services on mobile smart group sensing terminal devices, this paper proposes a privacy protection method based on generative adversarial networks and attention mechanisms (BiLS-A-GAN).… More >

  • Open Access

    ARTICLE

    Improving Smart Home Security via MQTT: Maximizing Data Privacy and Device Authentication Using Elliptic Curve Cryptography

    Zainatul Yushaniza Mohamed Yusoff1, Mohamad Khairi Ishak2,*, Lukman A. B. Rahim3, Mohd Shahrimie Mohd Asaari1

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1669-1697, 2024, DOI:10.32604/csse.2024.056741 - 22 November 2024

    Abstract The rapid adoption of Internet of Things (IoT) technologies has introduced significant security challenges across the physical, network, and application layers, particularly with the widespread use of the Message Queue Telemetry Transport (MQTT) protocol, which, while efficient in bandwidth consumption, lacks inherent security features, making it vulnerable to various cyber threats. This research addresses these challenges by presenting a secure, lightweight communication proxy that enhances the scalability and security of MQTT-based Internet of Things (IoT) networks. The proposed solution builds upon the Dang-Scheme, a mutual authentication protocol designed explicitly for resource-constrained environments and enhances it… More >

  • Open Access

    ARTICLE

    Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network

    Deema Alsekait1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2395-2436, 2024, DOI:10.32604/cmc.2024.055469 - 18 November 2024

    Abstract The widespread adoption of Internet of Things (IoT) devices has resulted in notable progress in different fields, improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks. Further, the study suggests using an advanced approach that utilizes machine learning, specifically the Wide Residual Network (WRN), to identify hidden malware in IoT systems. The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices, using the MalMemAnalysis dataset. Moreover, thorough experimentation provides evidence for the effectiveness of the WRN-based strategy, resulting in… More >

  • Open Access

    ARTICLE

    Trust Score-Based Malicious Vehicle Detection Scheme in Vehicular Network Environments

    Wenming Wang1,2,3,*, Zhiquan Liu1, Shumin Zhang1, Guijiang Liu1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2517-2545, 2024, DOI:10.32604/cmc.2024.055184 - 18 November 2024

    Abstract Advancements in the vehicular network technology enable real-time interconnection, data sharing, and intelligent cooperative driving among vehicles. However, malicious vehicles providing illegal and incorrect information can compromise the interests of vehicle users. Trust mechanisms serve as an effective solution to this issue. In recent years, many researchers have incorporated blockchain technology to manage and incentivize vehicle nodes, incurring significant overhead and storage requirements due to the frequent ingress and egress of vehicles within the area. In this paper, we propose a distributed vehicular network scheme based on trust scores. Specifically, the designed architecture partitions multiple More >

Displaying 1-10 on page 1 of 251. Per Page