Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (140)
  • Open Access

    ARTICLE

    VKFQ: A Verifiable Keyword Frequency Query Framework with Local Differential Privacy in Blockchain

    Youlin Ji, Bo Yin*, Ke Gu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4205-4223, 2024, DOI:10.32604/cmc.2024.049086

    Abstract With its untameable and traceable properties, blockchain technology has been widely used in the field of data sharing. How to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data sharing. In this paper, we study verifiable keyword frequency (KF) queries with local differential privacy in blockchain. Both the numerical and the keyword attributes are present in data objects; the latter are sensitive and require privacy protection. However, prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF queries. We propose an efficient framework that… More >

  • Open Access

    ARTICLE

    A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism

    Nannan Wu1, Xianyi Chen1,*, James Msughter Adeke2, Junjie Zhao2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3001-3019, 2024, DOI:10.32604/cmc.2023.045311

    Abstract Recently, deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding. However, these approaches have some limitations. For example, a cover image lacks self-adaptability, information leakage, or weak concealment. To address these issues, this study proposes a universal and adaptable image-hiding method. First, a domain attention mechanism is designed by combining the Atrous convolution, which makes better use of the relationship between the secret image domain and the cover image domain. Second, to improve perceived human similarity, perceptual loss is incorporated into the training process. The experimental results are promising, with the proposed method achieving an… More >

  • Open Access

    ARTICLE

    Enhancing Identity Protection in Metaverse-Based Psychological Counseling System

    Jun Lee1, Hanna Lee2, Seong Chan Lee2, Hyun Kwon3,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 617-632, 2024, DOI:10.32604/cmc.2023.045768

    Abstract Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regarding client identity. However, these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions, such as facial cues, to the counselor. This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling. The proposed system incorporates a voice modulation function that instantly modifies/masks the client’s voice to safeguard their identity. Additionally, it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s… More >

  • Open Access

    ARTICLE

    Multi-Scale Design and Optimization of Composite Material Structure for Heavy-Duty Truck Protection Device

    Yanhui Zhang1, Lianhua Ma1, Hailiang Su1,2,3,*, Jirong Qin2, Zhining Chen2, Kaibiao Deng1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1961-1980, 2024, DOI:10.32604/cmes.2023.045570

    Abstract In this paper, to present a lightweight-developed front underrun protection device (FUPD) for heavy-duty trucks, plain weave carbon fiber reinforced plastic (CFRP) is used instead of the original high-strength steel. First, the mechanical and structural properties of plain carbon fiber composite anti-collision beams are comparatively analyzed from a multi-scale perspective. For studying the design capability of carbon fiber composite materials, we investigate the effects of TC-33 carbon fiber diameter (D), fiber yarn width (W) and height (H), and fiber yarn density (N) on the front underrun protective beam of carbon fiber composite materials. Based on the investigation, a material-structure matching… More >

  • Open Access

    ARTICLE

    Distribution Line Longitudinal Protection Method Based on Virtual Measurement Current Restraint

    Wei Wang1, Yang Yu1, Simin Luo2,*, Wenlin Liu2, Wei Tang1, Yuanbo Ye1

    Energy Engineering, Vol.121, No.2, pp. 315-337, 2024, DOI:10.32604/ee.2023.042082

    Abstract As an effective approach to achieve the “dual-carbon” goal, the grid-connected capacity of renewable energy increases constantly. Photovoltaics are the most widely used renewable energy sources and have been applied on various occasions. However, the inherent randomness, intermittency, and weak support of grid-connected equipment not only cause changes in the original flow characteristics of the grid but also result in complex fault characteristics. Traditional overcurrent and differential protection methods cannot respond accurately due to the effects of unknown renewable energy sources. Therefore, a longitudinal protection method based on virtual measurement of current restraint is proposed in this paper. The positive… More >

  • Open Access

    ARTICLE

    Wave Reflection by Rectangular Breakwaters for Coastal Protection

    Hasna Akarni*, Hamza Mabchour, Laila El Aarabi, Soumia Mordane

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.3, pp. 579-593, 2024, DOI:10.32604/fdmp.2023.043080

    Abstract In this study, we focus on the numerical modelling of the interaction between waves and submerged structures in the presence of a uniform flow current. Both the same and opposite senses of wave propagation are considered. The main objective is an understanding of the effect of the current and various geometrical parameters on the reflection coefficient. The wave used in the study is based on potential theory, and the submerged structures consist of two rectangular breakwaters positioned at a fixed distance from each other and attached to the bottom of a wave flume. The numerical modeling approach employed in this… More >

  • Open Access

    REVIEW

    Multi-Robot Privacy-Preserving Algorithms Based on Federated Learning: A Review

    Jiansheng Peng1,2,*, Jinsong Guo1, Fengbo Bao1, Chengjun Yang2, Yong Xu2, Yong Qin2

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2971-2994, 2023, DOI:10.32604/cmc.2023.041897

    Abstract The robotics industry has seen rapid development in recent years due to the Corona Virus Disease 2019. With the development of sensors and smart devices, factories and enterprises have accumulated a large amount of data in their daily production, which creates extremely favorable conditions for robots to perform machine learning. However, in recent years, people’s awareness of data privacy has been increasing, leading to the inability to circulate data between different enterprises, resulting in the emergence of data silos. The emergence of federated learning provides a feasible solution to this problem, and the combination of federated learning and multi-robot systems… More >

  • Open Access

    ARTICLE

    Fractional Gradient Descent RBFNN for Active Fault-Tolerant Control of Plant Protection UAVs

    Lianghao Hua1,2, Jianfeng Zhang1,*, Dejie Li3, Xiaobo Xi1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2129-2157, 2024, DOI:10.32604/cmes.2023.030535

    Abstract With the increasing prevalence of high-order systems in engineering applications, these systems often exhibit significant disturbances and can be challenging to model accurately. As a result, the active disturbance rejection controller (ADRC) has been widely applied in various fields. However, in controlling plant protection unmanned aerial vehicles (UAVs), which are typically large and subject to significant disturbances, load disturbances and the possibility of multiple actuator faults during pesticide spraying pose significant challenges. To address these issues, this paper proposes a novel fault-tolerant control method that combines a radial basis function neural network (RBFNN) with a second-order ADRC and leverages a… More > Graphic Abstract

    Fractional Gradient Descent RBFNN for Active Fault-Tolerant Control of Plant Protection UAVs

  • Open Access

    REVIEW

    Ensuring User Privacy and Model Security via Machine Unlearning: A Review

    Yonghao Tang1, Zhiping Cai1,*, Qiang Liu1, Tongqing Zhou1, Qiang Ni2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2645-2656, 2023, DOI:10.32604/cmc.2023.032307

    Abstract As an emerging discipline, machine learning has been widely used in artificial intelligence, education, meteorology and other fields. In the training of machine learning models, trainers need to use a large amount of practical data, which inevitably involves user privacy. Besides, by polluting the training data, a malicious adversary can poison the model, thus compromising model security. The data provider hopes that the model trainer can prove to them the confidentiality of the model. Trainer will be required to withdraw data when the trust collapses. In the meantime, trainers hope to forget the injected data to regain security when finding… More >

  • Open Access

    ARTICLE

    An Intelligent Approach for Intrusion Detection in Industrial Control System

    Adel Alkhalil1,*, Abdulaziz Aljaloud1, Diaa Uliyan1, Mohammed Altameemi1, Magdy Abdelrhman2,3, Yaser Altameemi4, Aakash Ahmad5, Romany Fouad Mansour6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2049-2078, 2023, DOI:10.32604/cmc.2023.044506

    Abstract Supervisory control and data acquisition (SCADA) systems are computer systems that gather and analyze real-time data, distributed control systems are specially designed automated control system that consists of geographically distributed control elements, and other smaller control systems such as programmable logic controllers are industrial solid-state computers that monitor inputs and outputs and make logic-based decisions. In recent years, there has been a lot of focus on the security of industrial control systems. Due to the advancement in information technologies, the risk of cyberattacks on industrial control system has been drastically increased. Because they are so inextricably tied to human life,… More >

Displaying 1-10 on page 1 of 140. Per Page