You are currently on the new version of our website. Access the old version .

Journal of Sensor and Actuator Networks, Volume 14, Issue 4

2025 August - 22 articles

Cover Story: Images often contain sensitive content such as personal data, medical records, confidential documents, or military intelligence. Unauthorized access can lead to severe consequences. Encryption is an effective approach to safeguarding image security and privacy. Recently, a JPEG image encryption method using an adaptive encryption key was presented by He et al. However, He’s scheme has shown to be vulnerable to chosen plaintext attack. This study first demonstrates that the adaptive key generation in He’s scheme introduces exploitable security risks and then proposes an improved chosen plaintext attack scheme by replacing the single-permutation approach with an additive value method, which can significantly improve the attack success rates. The proposed method also provides insights for developing more robust image cryptographic schemes. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (22)

  • Article
  • Open Access
2,501 Views
23 Pages

Can Differential Privacy Hinder Poisoning Attack Detection in Federated Learning?

  • Chaitanya Aggarwal,
  • Divya G. Nair,
  • Jafar Aco Mohammadi,
  • Jyothisha J. Nair and
  • Jörg Ott

We consider the problem of data poisoning attack detection in a federated learning (FL) setup with differential privacy (DP). Local DP in FL ensures that privacy leakage caused by shared gradients is controlled by adding randomness to the process. We...

  • Article
  • Open Access
1 Citations
1,910 Views
18 Pages

This paper presents a microcontroller-based technique for accurately measuring resistive sensors over a wide dynamic range using an adaptive constant current source. Unlike conventional voltage dividers or fixed-current methods—often limited by...

  • Article
  • Open Access
1,580 Views
20 Pages

Space-Air-Ground Integrated Network (SAGIN), which is considered a network architecture with great development potential, exhibits significant cross-domain collaboration characteristics at present. However, most of the existing works ignore the match...

  • Article
  • Open Access
3 Citations
1,856 Views
21 Pages

Nondestructive Inspection of Steel Cables Based on YOLOv9 with Magnetic Flux Leakage Images

  • Min Zhao,
  • Ning Ding,
  • Zehao Fang,
  • Bingchun Jiang,
  • Jiaming Zhong and
  • Fuqin Deng

The magnetic flux leakage (MFL) method is widely acknowledged as a highly effective non-destructive evaluation (NDE) technique for detecting local damage in ferromagnetic structures such as steel wire ropes. In this study, a multi-channel MFL sensor...

  • Article
  • Open Access
2 Citations
5,088 Views
40 Pages

Real-Time Service Migration in Edge Networks: A Survey

  • Yutong Zhang,
  • Ke Zhao,
  • Yihong Yang and
  • Zhangbing Zhou

With the rapid proliferation of Internet of Things (IoT) devices and mobile applications and the growing demand for low-latency services, edge computing has emerged as a transformative paradigm that brings computation and storage closer to end users....

  • Article
  • Open Access
7 Citations
10,052 Views
24 Pages

Federated Learning-Based Intrusion Detection in IoT Networks: Performance Evaluation and Data Scaling Study

  • Nurtay Albanbay,
  • Yerlan Tursynbek,
  • Kalman Graffi,
  • Raissa Uskenbayeva,
  • Zhuldyz Kalpeyeva,
  • Zhastalap Abilkaiyr and
  • Yerlan Ayapov

This paper presents a large-scale empirical study aimed at identifying the optimal local deep learning model and data volume for deploying intrusion detection systems (IDS) on resource-constrained IoT devices using federated learning (FL). While prev...

  • Article
  • Open Access
1 Citations
1,178 Views
16 Pages

Traditional methods for predicting feeding amounts rely on historical data and experience but fail to account for non-linear fish growth and the influence of water quality and meteorological factors. This study presents a novel approach for sea bass...

  • Article
  • Open Access
4 Citations
11,623 Views
40 Pages

Research and Education in Robotics: A Comprehensive Review, Trends, Challenges, and Future Directions

  • Mutaz Ryalat,
  • Natheer Almtireen,
  • Ghaith Al-refai,
  • Hisham Elmoaqet and
  • Nathir Rawashdeh

Robotics has emerged as a transformative discipline at the intersection of the engineering, computer science, and cognitive sciences. This state-of-the-art review explores the current trends, methodologies, and challenges in both robotics research an...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Sens. Actuator Netw. - ISSN 2224-2708