Advancing Intelligent Digital Systems: Theory, Practice, and Security Frontiers

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Artificial Intelligence".

Deadline for manuscript submissions: 30 September 2026 | Viewed by 1210

Special Issue Editors


E-Mail Website
Guest Editor
Department of Informatics and Computer Engineering, University of West Attica, 12243 Egaleo, Greece
Interests: personalization; human–computer interaction; artificial intelligence
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Informatics and Computer Engineering, University of West Attica, 12243 Egaleo, Greece
Interests: semantic analysis; multimedia applications; artificial intelligence
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Informatics and Computer Engineering, University of West Attica, 12243 Egaleo, Greece
Interests: software engineering; educational technology; artificial intelligence
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue invites submissions of extended and significantly revised versions of high-quality papers presented at the 5th International Conference on Novel & Intelligent Digital Systems (NiDS 2025). Additionally, the Special Issue enthusiastically welcomes new and original contributions from researchers, academics, and industry practitioners who did not participate in the conference but whose work aligns with its thematic scope.

The Special Issue is dedicated to advancing research and innovation in the design, development, and deployment of intelligent digital systems. It seeks to foster the integration of intelligent techniques into modern software and system architectures, addressing both theoretical foundations and practical applications. Contributions exploring emerging trends, challenges, and future directions in intelligent system design and security are particularly encouraged.

Submissions may cover, but are not limited to, the following topics:

  • AI-enhanced security mechanisms for digital systems;
  • Privacy-preserving techniques in data-driven environments;
  • Human-centered AI interfaces and interactive systems;
  • Cybersecurity strategies for smart, interconnected environments;
  • Synergies between AI, IoT, and big data analytics;
  • Personalized and adaptive systems for diverse application domains;
  • Affective computing and emotion-aware intelligent systems;
  • Secure data processing and trustworthy AI frameworks;
  • Intelligent solutions for sustainable and resilient smart cities;
  • The ethical, legal, and social implications of intelligent digital systems.

Particular emphasis will be placed on works related to the main tracks of NiDS 2025, including:

  • Intelligent Multimedia Applications and Human-Centered Technologies;
  • AI-Driven Transformation for Industry and Society;
  • Data Intelligence and Ubiquitous Computing Solutions.

However, submissions are not restricted to these areas. High-quality, innovative works that contribute to the broader vision of intelligent and secure digital ecosystems are strongly encouraged, even if they fall outside the direct scope of the conference topics.

This Special Issue provides a valuable platform for scholars and practitioners to disseminate novel insights, groundbreaking methodologies, and impactful applications that are shaping the future of secure, adaptive, and intelligent digital environments.

Dr. Christos Troussas
Dr. Akrivi Krouska
Dr. Phivos Mylonas
Prof. Dr. Cleo Sgouropoulou
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • artificial intelligence
  • database security
  • cybersecurity in AI systems
  • human-centered technologies
  • intelligent multimedia applications
  • smart environments and IoT
  • data privacy and protection
  • big data analytics
  • ubiquitous computing
  • secure cloud and distributed systems

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

29 pages, 818 KB  
Article
Templated and Overlay HW/SW Co-Optimization for Crossbar-Free P4 Deparser FPGA Architectures
by Parisa Mashreghi-Moghadam, Tarek Ould-Bachir and Yvon Savaria
Electronics 2025, 14(24), 4850; https://doi.org/10.3390/electronics14244850 - 10 Dec 2025
Viewed by 77
Abstract
The deparser stage in the Protocol-Independent Switch Architecture (PISA) is often overshadowed by parser and match-action optimizations. Yet, it remains a critical performance bottleneck in P4-programmable FPGA data planes. Challenges associated with the deparser stem from dynamic header layouts, variable emission orders, and [...] Read more.
The deparser stage in the Protocol-Independent Switch Architecture (PISA) is often overshadowed by parser and match-action optimizations. Yet, it remains a critical performance bottleneck in P4-programmable FPGA data planes. Challenges associated with the deparser stem from dynamic header layouts, variable emission orders, and alignment constraints, which often necessitate resource-intensive designs, such as wide, dynamic crossbar routing. While compile-time specialization techniques can reduce logic usage, they sacrifice runtime adaptability: any change to the protocol graph, including adding, removing, or reordering headers, requires full hardware resynthesis and re-implementation, limiting their practicality for evolving or multi-tenant workloads. This work presents a unified FPGA-targeted deparser architecture that merges templated and overlay concepts within a hardware–software co-design framework. At design time, template parameters define upper bounds on protocol complexity, enabling resource-efficient synthesis tailored to specific workloads. Within these bounds, runtime reconfiguration is supported through overlay control tables derived from static deparser DAG analysis, which capture the per-path emission order, header alignments, and offsets. These tables drive protocol-agnostic, chunk-based emission blocks that eliminate the overhead of crossbar interconnects, thereby significantly reducing complexity and resource usage. The proposed design sustains high throughput while preserving the flexibility needed for in-field updates and long-term protocol evolution. Full article
Show Figures

Figure 1

21 pages, 1073 KB  
Article
A Graph Neural Network Model Incorporating Spatial and Temporal Information for Next-Location Prediction
by Yue-Shi Lee, Show-Jane Yen and Ren-He Wang
Electronics 2025, 14(23), 4657; https://doi.org/10.3390/electronics14234657 - 26 Nov 2025
Viewed by 363
Abstract
With the rapid growth of smart devices and positioning technologies, spatiotemporal data has become essential for predicting user behavior. However, many existing next-location prediction models employ oversimplified temporal modeling, neglect spatial structure and semantic relationships, and fail to capture complex location interaction patterns. [...] Read more.
With the rapid growth of smart devices and positioning technologies, spatiotemporal data has become essential for predicting user behavior. However, many existing next-location prediction models employ oversimplified temporal modeling, neglect spatial structure and semantic relationships, and fail to capture complex location interaction patterns. This study proposes a graph neural network model that integrates spatiotemporal features to enhance next-location prediction. There are three components in the proposed method. The first is location feature representation which combines geocodes and location category embeddings to construct semantically enriched node representations. The second is temporal modeling which computes temporal similarity between historical trajectories and current behaviors to generate time-decay weights, thereby capturing behavioral periodicity and preference shifts. The third is preference integration which long-term historical preferences and short-term current preferences are modeled using a long short-term memory (LSTM) network and subsequently fused with spatial preferences to generate a comprehensive semantic representation encompassing both user preferences and location characteristics. Experiments on real-world trajectory datasets demonstrate that our proposed model achieves superior accuracy compared to state-of-the-art approaches in next-location prediction. Full article
Show Figures

Figure 1

18 pages, 1828 KB  
Article
A Hybrid Global-Split WGAN-GP Framework for Addressing Class Imbalance in IDS Datasets
by Jisoo Jang, Taesu Kim, Hyoseng Park and Dongkyoo Shin
Electronics 2025, 14(20), 4068; https://doi.org/10.3390/electronics14204068 - 16 Oct 2025
Viewed by 453
Abstract
The continuously evolving cyber threat landscape necessitates not only resilient defense mechanisms but also the sustained capacity development of security personnel. However, conventional training pipelines are predominantly dependent on static real-world datasets, which fail to adequately reflect the diversity and dynamics of emerging [...] Read more.
The continuously evolving cyber threat landscape necessitates not only resilient defense mechanisms but also the sustained capacity development of security personnel. However, conventional training pipelines are predominantly dependent on static real-world datasets, which fail to adequately reflect the diversity and dynamics of emerging attack tactics. To address these limitations, this study employs a Wasserstein GAN with Gradient Penalty (WGAN-GP) to synthesize realistic network traffic that preserves both temporal and statistical characteristics. Using the CIC-IDS-2017 dataset, which encompasses diverse attack scenarios including brute-force, Heartbleed, botnet, DoS/DDoS, web, and infiltration attacks, two training methodologies are proposed. The first trains a single conditional WGAN-GP on the entire dataset to capture the global distribution. The second employs multiple generators tailored to individual attack types, while sharing a discriminator pretrained on the complete traffic set, thereby ensuring consistent decision boundaries across classes. The quality of the generated traffic was evaluated using a Train on Synthetic, Test on Real (TSTR) protocol with LSTM and Random Forest classifiers, along with distribution similarity measures in the embedding space. The proposed approach achieved a classification accuracy of 97.88% and a Fréchet Inception Distance (FID) score of 3.05, surpassing baseline methods by more than one percentage point. These results demonstrate that the proposed synthetic traffic generation strategy provides advantages in scalability, diversity, and privacy, thereby enriching cyber range training scenarios and supporting the development of adaptive intrusion detection systems that generalize more effectively to evolving threats. Full article
Show Figures

Figure 1

Back to TopTop