Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (13,775)

Search Parameters:
Keywords = CAN security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 865 KiB  
Review
Barriers and Facilitators to Artificial Intelligence Implementation in Diabetes Management from Healthcare Workers’ Perspective: A Scoping Review
by Giovanni Cangelosi, Andrea Conti, Gabriele Caggianelli, Massimiliano Panella, Fabio Petrelli, Stefano Mancin, Matteo Ratti and Alice Masini
Medicina 2025, 61(8), 1403; https://doi.org/10.3390/medicina61081403 (registering DOI) - 1 Aug 2025
Abstract
Background and Objectives: Diabetes is a global public health challenge, with increasing prevalence worldwide. The implementation of artificial intelligence (AI) in the management of this condition offers potential benefits in improving healthcare outcomes. This study primarily investigates the barriers and facilitators perceived by [...] Read more.
Background and Objectives: Diabetes is a global public health challenge, with increasing prevalence worldwide. The implementation of artificial intelligence (AI) in the management of this condition offers potential benefits in improving healthcare outcomes. This study primarily investigates the barriers and facilitators perceived by healthcare professionals in the adoption of AI. Secondarily, by analyzing both quantitative and qualitative data collected, it aims to support the potential development of AI-based programs for diabetes management, with particular focus on a possible bottom-up approach. Materials and Methods: A scoping review was conducted following PRISMA-ScR guidelines for reporting and registered in the Open Science Framework (OSF) database. The study selection process was conducted in two phases—title/abstract screening and full-text review—independently by three researchers, with a fourth resolving conflicts. Data were extracted and assessed using Joanna Briggs Institute (JBI) tools. The included studies were synthesized narratively, combining both quantitative and qualitative analyses to ensure methodological rigor and contextual depth. Results: The adoption of AI tools in diabetes management is influenced by several barriers, including perceived unsatisfactory clinical performance, high costs, issues related to data security and decision-making transparency, as well as limited training among healthcare workers. Key facilitators include improved clinical efficiency, ease of use, time-saving, and organizational support, which contribute to broader acceptance of the technology. Conclusions: The active and continuous involvement of healthcare workers represents a valuable opportunity to develop more effective, reliable, and well-integrated AI solutions in clinical practice. Our findings emphasize the importance of a bottom-up approach and highlight how adequate training and organizational support can help overcome existing barriers, promoting sustainable and equitable innovation aligned with public health priorities. Full article
(This article belongs to the Special Issue Advances in Public Health and Healthcare Management for Chronic Care)
24 pages, 1294 KiB  
Article
Confidential Smart Contracts and Blockchain to Implement a Watermarking Protocol
by Franco Frattolillo
Future Internet 2025, 17(8), 352; https://doi.org/10.3390/fi17080352 (registering DOI) - 1 Aug 2025
Abstract
Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter in proposing secure, easy-to-use and, at the same time, [...] Read more.
Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter in proposing secure, easy-to-use and, at the same time, “trusted third parties” (TTPs)-free solutions. In this regard, implementations based on blockchain and smart contracts are among the most advanced and promising, even if they are affected by problems regarding the performance and privacy of the information exchanged and processed by smart contracts and managed by blockchains. This paper presents a watermarking protocol implemented by smart contracts and blockchain. The protocol uses a “layer-2” blockchain execution model and performs the computation in “trusted execution environments” (TEEs). Therefore, its implementation can guarantee efficient and confidential execution without compromising ease of use or resorting to TTPs. The protocol and its implementation can, thus, be considered a valid answer to the “trilemma” that afflicts the use of blockchains, managing to guarantee decentralization, security, and scalability. Full article
Show Figures

Figure 1

21 pages, 97817 KiB  
Article
Compression of 3D Optical Encryption Using Singular Value Decomposition
by Kyungtae Park, Min-Chul Lee and Myungjin Cho
Sensors 2025, 25(15), 4742; https://doi.org/10.3390/s25154742 (registering DOI) - 1 Aug 2025
Abstract
In this paper, we propose a compressionmethod for optical encryption using singular value decomposition (SVD). Double random phase encryption (DRPE), which employs two distinct random phase masks, is adopted as the optical encryption technique. Since the encrypted data in DRPE have the same [...] Read more.
In this paper, we propose a compressionmethod for optical encryption using singular value decomposition (SVD). Double random phase encryption (DRPE), which employs two distinct random phase masks, is adopted as the optical encryption technique. Since the encrypted data in DRPE have the same size as the input data and consists of complex values, a compression technique is required to improve data efficiency. To address this issue, we introduce SVD as a compression method. SVD decomposes any matrix into simpler components, such as a unitary matrix, a rectangular diagonal matrix, and a complex unitary matrix. By leveraging this property, the encrypted data generated by DRPE can be effectively compressed. However, this compression may lead to some loss of information in the decrypted data. To mitigate this loss, we employ volumetric computational reconstruction based on integral imaging. As a result, the proposed method enhances the visual quality, compression ratio, and security of DRPE simultaneously. To validate the effectiveness of the proposed method, we conduct both computer simulations and optical experiments. The performance is evaluated quantitatively using peak signal-to-noise ratio (PSNR), structural similarity index (SSIM), and peak sidelobe ratio (PSR) as evaluation metrics. Full article
Show Figures

Figure 1

28 pages, 1328 KiB  
Review
Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions
by Dung T. Nguyen, Mien L. Trinh, Minh T. Nguyen, Thang C. Vu, Tao V. Nguyen, Long Q. Dinh and Mui D. Nguyen
Future Internet 2025, 17(8), 350; https://doi.org/10.3390/fi17080350 (registering DOI) - 1 Aug 2025
Abstract
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to [...] Read more.
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to be important components of the IoT system (WSN-IoT) to create smart applications and automate processes. As the number of connected IoT devices increases, privacy and security issues become more complicated due to their external working environments and limited resources. Hence, solutions need to be updated to ensure that data and user privacy are protected from threats and attacks. To support the safety and reliability of such systems, in this paper, security issues in the WSN-IoT are addressed and classified as identifying security challenges and requirements for different kinds of attacks in either WSNs or IoT systems. In addition, security solutions corresponding to different types of attacks are provided, analyzed, and evaluated. We provide different comparisons and classifications based on specific goals and applications that hopefully can suggest suitable solutions for specific purposes in practical. We also suggest some research directions to support new security mechanisms. Full article
Show Figures

Figure 1

24 pages, 3110 KiB  
Article
Coupling Individual Psychological Security and Information for Modeling the Spread of Infectious Diseases
by Na Li, Jianlin Zhou, Haiyan Liu and Xikai Wang
Systems 2025, 13(8), 637; https://doi.org/10.3390/systems13080637 (registering DOI) - 1 Aug 2025
Abstract
Background: Faced with the profound impact of major infectious diseases on public life and economic development, humans have long sought to understand disease transmission and intervention strategies. To better explore the impact of individuals’ different coping behaviors—triggered by changes in their psychological [...] Read more.
Background: Faced with the profound impact of major infectious diseases on public life and economic development, humans have long sought to understand disease transmission and intervention strategies. To better explore the impact of individuals’ different coping behaviors—triggered by changes in their psychological security due to public information and external environmental changes—on the spread to infectious diseases, the model will place greater emphasis on quantifying psychological factors to make it more aligned with real-world situations. Methods: To better understand the interplay between information dissemination and disease transmission, we propose a two-layer network model that incorporates psychological safety factors. Results: Our model reveals key insights into disease transmission dynamics: (1) active defense behaviors help reduce both disease spread and information diffusion; (2) passive resistance behaviors expand disease transmission and may trigger recurrence but enhance information spread; (3) high-timeliness, low-fuzziness information reduces the peak of the initial infection but does not significantly curb overall disease spread, and the rapid dissemination of disease-related information is most effective in limiting the early stages of transmission; and (4) community structures in information networks can effectively curb the spread of infectious diseases. Conclusions: These findings offer valuable theoretical support for public health strategies and disease prevention after government information release. Full article
(This article belongs to the Section Systems Practice in Social Science)
Show Figures

Figure 1

29 pages, 1858 KiB  
Article
Securing a Renewable Energy Supply for a Single-Family House Using a Photovoltaic Micro-Installation and a Pellet Boiler
by Jakub Stolarski, Ewelina Olba-Zięty, Michał Krzyżaniak and Mariusz Jerzy Stolarski
Energies 2025, 18(15), 4072; https://doi.org/10.3390/en18154072 (registering DOI) - 31 Jul 2025
Abstract
Photovoltaic (PV) micro-installations producing renewable electricity and automatic pellet boilers producing renewable heat energy are promising solutions for single-family houses. A single-family house equipped with a prosumer 7.56 kWp PV micro-installation and a 26 kW pellet boiler was analyzed. This study aimed to [...] Read more.
Photovoltaic (PV) micro-installations producing renewable electricity and automatic pellet boilers producing renewable heat energy are promising solutions for single-family houses. A single-family house equipped with a prosumer 7.56 kWp PV micro-installation and a 26 kW pellet boiler was analyzed. This study aimed to analyze the production and use of electricity and heat over three successive years (from 1 January 2021 to 31 December 2023) and to identify opportunities for securing renewable energy supply for the house. Electricity production by the PV was, on average, 6481 kWh year−1; the amount of energy fed into the grid was 4907 kWh year−1; and the electricity consumption by the house was 4606 kWh year−1. The electricity supply for the house was secured by drawing an average of 34.2% of energy directly from the PV and 85.2% from the grid. Based on mathematical modeling, it was determined that if the PV installation had been located to the south (azimuth 180°) in the analyzed period, the maximum average production would have been 6897 kWh. Total annual heat and electricity consumption by the house over three years amounted, on average, to 39,059 kWh year−1. Heat energy accounted for a dominant proportion of 88.2%. From a year-round perspective, a properly selected small multi-energy installation can ensure energy self-sufficiency and provide renewable energy to a single-family house. Full article
(This article belongs to the Section B: Energy and Environment)
Show Figures

Figure 1

31 pages, 434 KiB  
Article
A Unified Method for Selecting Parameters and Primitive Elements in 2 × 2 Matrix Fields for Cryptographic Protocols
by Alimzhan Baikenov, Emil Faure, Anatoly Shcherba, Viktor Khaliavka, Sakhybay Tynymbayev and Olga Abramkina
Symmetry 2025, 17(8), 1212; https://doi.org/10.3390/sym17081212 - 31 Jul 2025
Abstract
This paper introduces a novel method for selecting parameters of finite fields formed by 2 × 2 matrices over a finite field of integers modulo a prime p. The method aims to simultaneously determine both the field parameters and primitive elements, thereby [...] Read more.
This paper introduces a novel method for selecting parameters of finite fields formed by 2 × 2 matrices over a finite field of integers modulo a prime p. The method aims to simultaneously determine both the field parameters and primitive elements, thereby optimizing the construction of cryptographic algorithms. The proposed approach leverages the properties of quadratic residues and non-residues, simplifying the process of finding matrix field parameters while maintaining computational efficiency. The method is particularly effective when the prime number p is either a Mersenne prime or (p + 1)/2 is also a prime. This study demonstrates that the resulting matrix fields can be practically computed, offering a high degree of flexibility for cryptographic protocols such as key agreement and secure data transmission. Compared to previous methods, the new method reduces the parameter search space and provides a structured way to identify primitive elements without the need for a separate search procedure. The findings have significant implications for the development of efficient cryptographic systems using matrix-based finite fields. Full article
(This article belongs to the Section Computer)
25 pages, 2349 KiB  
Article
Development of a Method for Determining Password Formation Rules Using Neural Networks
by Leila Rzayeva, Alissa Ryzhova, Merei Zhaparkhanova, Ali Myrzatay, Olzhas Konakbayev, Abilkair Imanberdi, Yussuf Ahmed and Zhaksylyk Kozhakhmet
Information 2025, 16(8), 655; https://doi.org/10.3390/info16080655 (registering DOI) - 31 Jul 2025
Abstract
According to the latest Verizon DBIR report, credential abuse, including password reuse and human factors in password creation, remains the leading attack vector. It was revealed that most users change their passwords only when they forget them, and 35% of respondents find mandatory [...] Read more.
According to the latest Verizon DBIR report, credential abuse, including password reuse and human factors in password creation, remains the leading attack vector. It was revealed that most users change their passwords only when they forget them, and 35% of respondents find mandatory password rotation policies inconvenient. These findings highlight the importance of combining technical solutions with user-focused education to strengthen password security. In this research, the “human factor in the creation of usernames and passwords” is considered a vulnerability, as identifying the patterns or rules used by users in password generation can significantly reduce the number of possible combinations that attackers need to try in order to gain access to personal data. The proposed method based on an LSTM model operates at a character level, detecting recurrent structures and generating generalized masks that reflect the most common components in password creation. Open datasets of 31,000 compromised passwords from real-world leaks were used to train the model and it achieved over 90% test accuracy without signs of overfitting. A new method of evaluating the individual password creation habits of users and automatically fetching context-rich keywords from a user’s public web and social media footprint via a keyword-extraction algorithm is developed, and this approach is incorporated into a web application that allows clients to locally fine-tune an LSTM model locally, run it through ONNX, and carry out all inference on-device, ensuring complete data confidentiality and adherence to privacy regulations. Full article
Show Figures

Figure 1

36 pages, 2671 KiB  
Article
DIKWP-Driven Artificial Consciousness for IoT-Enabled Smart Healthcare Systems
by Yucong Duan and Zhendong Guo
Appl. Sci. 2025, 15(15), 8508; https://doi.org/10.3390/app15158508 (registering DOI) - 31 Jul 2025
Viewed by 43
Abstract
This study presents a DIKWP-driven artificial consciousness framework for IoT-enabled smart healthcare, integrating a Data–Information–Knowledge–Wisdom–Purpose (DIKWP) cognitive architecture with a software-defined IoT infrastructure. The proposed system deploys DIKWP agents at edge and cloud nodes to transform raw sensor data into high-level knowledge and [...] Read more.
This study presents a DIKWP-driven artificial consciousness framework for IoT-enabled smart healthcare, integrating a Data–Information–Knowledge–Wisdom–Purpose (DIKWP) cognitive architecture with a software-defined IoT infrastructure. The proposed system deploys DIKWP agents at edge and cloud nodes to transform raw sensor data into high-level knowledge and purpose-driven actions. This is achieved through a structured DIKWP pipeline—from data acquisition and information processing to knowledge extraction, wisdom inference, and purpose-driven decision-making—that enables semantic reasoning, adaptive goal-driven responses, and privacy-preserving decision-making in healthcare environments. The architecture integrates wearable sensors, edge computing nodes, and cloud services to enable dynamic task orchestration and secure data fusion. For evaluation, a smart healthcare scenario for early anomaly detection (e.g., arrhythmia and fever) was implemented using wearable devices with coordinated edge–cloud analytics. Simulated experiments on synthetic vital sign datasets achieved approximately 98% anomaly detection accuracy and up to 90% reduction in communication overhead compared to cloud-centric solutions. Results also demonstrate enhanced explainability via traceable decisions across DIKWP layers and robust performance under intermittent connectivity. These findings indicate that the DIKWP-driven approach can significantly advance IoT-based healthcare by providing secure, explainable, and adaptive services aligned with clinical objectives and patient-centric care. Full article
(This article belongs to the Special Issue IoT in Smart Cities and Homes, 2nd Edition)
Show Figures

Figure 1

17 pages, 460 KiB  
Article
Efficient Multi-Layer Credential Revocation Scheme for 6G Using Dynamic RSA Accumulators and Blockchain
by Guangchao Wang, Yanlong Zou, Jizhe Zhou, Houxiao Cui and Ying Ju
Electronics 2025, 14(15), 3066; https://doi.org/10.3390/electronics14153066 (registering DOI) - 31 Jul 2025
Viewed by 40
Abstract
As a new generation of mobile communication networks, 6G security faces many new security challenges. Vehicle to Everything (V2X) will be an important part of 6G. In V2X, connected and automated vehicles (CAVs) need to frequently share data with other vehicles and infrastructures. [...] Read more.
As a new generation of mobile communication networks, 6G security faces many new security challenges. Vehicle to Everything (V2X) will be an important part of 6G. In V2X, connected and automated vehicles (CAVs) need to frequently share data with other vehicles and infrastructures. Therefore, identity revocation technology in the authentication is an important way to secure CAVs and other 6G scenario applications. This paper proposes an efficient credential revocation scheme with a four-layer architecture. First, a rapid pre-filtration layer is constructed based on the cuckoo filter, responsible for the initial screening of credentials. Secondly, a directed routing layer and the precision judgement layer are designed based on the consistency hash and the dynamic RSA accumulator. By proposing the dynamic expansion of the RSA accumulator and load-balancing algorithm, a smaller and more stable revocation delay can be achieved when many users and terminal devices access 6G. Finally, a trusted storage layer is built based on the blockchain, and the key revocation parameters are uploaded to the blockchain to achieve a tamper-proof revocation mechanism and trusted data traceability. Based on this architecture, this paper also proposes a detailed identity credential revocation and verification process. Compared to existing solutions, this paper’s solution has a combined average improvement of 59.14% in the performance of the latency of the cancellation of the inspection, and the system has excellent load balancing, with a standard deviation of only 11.62, and the maximum deviation is controlled within the range of ±4%. Full article
(This article belongs to the Special Issue Connected and Autonomous Vehicles in Mixed Traffic Systems)
Show Figures

Figure 1

15 pages, 2538 KiB  
Article
Dynamic Obstacle Perception Technology for UAVs Based on LiDAR
by Wei Xia, Feifei Song and Zimeng Peng
Drones 2025, 9(8), 540; https://doi.org/10.3390/drones9080540 (registering DOI) - 31 Jul 2025
Viewed by 87
Abstract
With the widespread application of small quadcopter drones in the military and civilian fields, the security challenges they face are gradually becoming apparent. Especially in dynamic environments, the rapidly changing conditions make the flight of drones more complex. To address the computational limitations [...] Read more.
With the widespread application of small quadcopter drones in the military and civilian fields, the security challenges they face are gradually becoming apparent. Especially in dynamic environments, the rapidly changing conditions make the flight of drones more complex. To address the computational limitations of small quadcopter drones and meet the demands of obstacle perception in dynamic environments, a LiDAR-based obstacle perception algorithm is proposed. First, accumulation, filtering, and clustering processes are carried out on the LiDAR point cloud data to complete the segmentation and extraction of point cloud obstacles. Then, an obstacle motion/static discrimination algorithm based on three-dimensional point motion attributes is developed to classify dynamic and static point clouds. Finally, oriented bounding box (OBB) detection is employed to simplify the representation of the spatial position and shape of dynamic point cloud obstacles, and motion estimation is achieved by tracking the OBB parameters using a Kalman filter. Simulation experiments demonstrate that this method can ensure a dynamic obstacle detection frequency of 10 Hz and successfully detect multiple dynamic obstacles in the environment. Full article
Show Figures

Figure 1

19 pages, 1072 KiB  
Article
Efficient and Reliable Identification of Probabilistic Cloning Attacks in Large-Scale RFID Systems
by Chu Chu, Rui Wang, Nanbing Deng and Gang Li
Micromachines 2025, 16(8), 894; https://doi.org/10.3390/mi16080894 (registering DOI) - 31 Jul 2025
Viewed by 49
Abstract
Radio Frequency Identification (RFID) technology is widely applied in various scenarios, including logistics tracking, supply chain management, and target monitoring. In these contexts, the malicious cloning of legitimate tag information can lead to sensitive data leakage and disrupt the normal acquisition of tag [...] Read more.
Radio Frequency Identification (RFID) technology is widely applied in various scenarios, including logistics tracking, supply chain management, and target monitoring. In these contexts, the malicious cloning of legitimate tag information can lead to sensitive data leakage and disrupt the normal acquisition of tag information by readers, thereby threatening personal privacy and corporate security and incurring significant economic losses. Although some efforts have been made to detect cloning attacks, the presence of missing tags in RFID systems can obscure cloned ones, resulting in a significant reduction in identification efficiency and accuracy. To address these problems, we propose the block-based cloned tag identification (BCTI) protocol for identifying cloning attacks in the presence of missing tags. First, we introduce a block indicator to sort all tags systematically and design a block mechanism that enables tags to respond repeatedly within a block with minimal time overhead. Then, we design a superposition strategy to further reduce the number of verification times, thereby decreasing the execution overhead. Through an in-depth analysis of potential tag response patterns, we develop a precise method to identify cloning attacks and mitigate interference from missing tags in probabilistic cloning attack scenarios. Moreover, we perform parameter optimization of the BCTI protocol and validate its performance across diverse operational scenarios. Extensive simulation results demonstrate that the BCTI protocol meets the required identification reliability threshold and achieves an average improvement of 24.01% in identification efficiency compared to state-of-the-art solutions. Full article
Show Figures

Figure 1

40 pages, 2173 KiB  
Review
Bridging Genes and Sensory Characteristics in Legumes: Multi-Omics for Sensory Trait Improvement
by Niharika Sharma, Soumi Paul Mukhopadhyay, Dhanyakumar Onkarappa, Kalenahalli Yogendra and Vishal Ratanpaul
Agronomy 2025, 15(8), 1849; https://doi.org/10.3390/agronomy15081849 - 31 Jul 2025
Viewed by 85
Abstract
Legumes are vital sources of protein, dietary fibre and nutrients, making them crucial for global food security and sustainable agriculture. However, their widespread acceptance and consumption are often limited by undesirable sensory characteristics, such as “a beany flavour”, bitterness or variable textures. Addressing [...] Read more.
Legumes are vital sources of protein, dietary fibre and nutrients, making them crucial for global food security and sustainable agriculture. However, their widespread acceptance and consumption are often limited by undesirable sensory characteristics, such as “a beany flavour”, bitterness or variable textures. Addressing these challenges requires a comprehensive understanding of the complex molecular mechanisms governing appearance, aroma, taste, flavour, texture and palatability in legumes, aiming to enhance their sensory appeal. This review highlights the transformative power of multi-omics approaches in dissecting these intricate biological pathways and facilitating the targeted enhancement of legume sensory qualities. By integrating data from genomics, transcriptomics, proteomics and metabolomics, the genetic and biochemical networks that directly dictate sensory perception can be comprehensively unveiled. The insights gained from these integrated multi-omics studies are proving instrumental in developing strategies for sensory enhancement. They enable the identification of key biomarkers for desirable traits, facilitating more efficient marker-assisted selection (MAS) and genomic selection (GS) in breeding programs. Furthermore, a molecular understanding of sensory pathways opens avenues for precise gene editing (e.g., using CRISPR-Cas9) to modify specific genes, reduce off-flavour compounds or optimise texture. Beyond genetic improvements, multi-omics data also inform the optimisation of post-harvest handling and processing methods (e.g., germination and fermentation) to enhance desirable sensory profiles and mitigate undesirable ones. This holistic approach, spanning from the genetic blueprint to the final sensory experience, will accelerate the development of new legume cultivars and products with enhanced palatability, thereby fostering increased consumption and ultimately contributing to healthier diets and more resilient food systems worldwide. Full article
Show Figures

Figure 1

24 pages, 1537 KiB  
Article
Privacy-Aware Hierarchical Federated Learning in Healthcare: Integrating Differential Privacy and Secure Multi-Party Computation
by Jatinder Pal Singh, Aqsa Aqsa, Imran Ghani, Raj Sonani and Vijay Govindarajan
Future Internet 2025, 17(8), 345; https://doi.org/10.3390/fi17080345 (registering DOI) - 31 Jul 2025
Viewed by 80
Abstract
The development of big data analytics in healthcare has created a demand for privacy-conscious and scalable machine learning algorithms that can allow the use of patient information across different healthcare organizations. In this study, the difficulties that come with traditional federated learning frameworks [...] Read more.
The development of big data analytics in healthcare has created a demand for privacy-conscious and scalable machine learning algorithms that can allow the use of patient information across different healthcare organizations. In this study, the difficulties that come with traditional federated learning frameworks in healthcare sectors, such as scalability, computational effectiveness, and preserving patient privacy for numerous healthcare systems, are discussed. In this work, a new conceptual model known as Hierarchical Federated Learning (HFL) for large, integrated healthcare organizations that include several institutions is proposed. The first level of aggregation forms regional centers where local updates are first collected and then sent to the second level of aggregation to form the global update, thus reducing the message-passing traffic and improving the scalability of the HFL architecture. Furthermore, the HFL framework leveraged more robust privacy characteristics such as Local Differential Privacy (LDP), Gaussian Differential Privacy (GDP), Secure Multi-Party Computation (SMPC) and Homomorphic Encryption (HE). In addition, a Novel Aggregated Gradient Perturbation Mechanism is presented to alleviate noise in model updates and maintain privacy and utility. The performance of the proposed HFL framework is evaluated on real-life healthcare datasets and an artificial dataset created using Generative Adversarial Networks (GANs), showing that the proposed HFL framework is better than other methods. Our approach provided an accuracy of around 97% and 30% less privacy leakage compared to the existing models of FLBM-IoT and PPFLB. The proposed HFL approach can help to find the optimal balance between privacy and model performance, which is crucial for healthcare applications and scalable and secure solutions. Full article
(This article belongs to the Special Issue Security and Privacy in AI-Powered Systems)
Show Figures

Graphical abstract

17 pages, 5247 KiB  
Article
An Intelligent Optimization-Based Secure Filter Design for State Estimation of Power Systems with Multiple Disturbances
by Yudong Xu, Wei Wang, Yong Liu, Xiaokai Meng, Yutong Chen and Zhixiang Liu
Electronics 2025, 14(15), 3059; https://doi.org/10.3390/electronics14153059 (registering DOI) - 31 Jul 2025
Viewed by 83
Abstract
To address multiple disturbance threats such as system anomalies and cyberattacks faced by power systems, an intelligent optimized secure filter method is developed in this paper for state estimation of power systems with the aid of the improved sparrow search algorithm–optimized unscented Kalman [...] Read more.
To address multiple disturbance threats such as system anomalies and cyberattacks faced by power systems, an intelligent optimized secure filter method is developed in this paper for state estimation of power systems with the aid of the improved sparrow search algorithm–optimized unscented Kalman filter (ISSA-UKF). Firstly, the problem of insufficient robustness in noise modeling and parameter selection of the conventional unscented Kalman filter (UKF) is analyzed. Secondly, an intelligent optimization method is adopted to adaptively update the UKF’s process and measurement noise covariances in real time, and an ISSA-UKF fusion framework is constructed to improve the estimation accuracy and system response capability. Thirdly, an adaptive weight function based on disturbance observation differences is provided to strengthen the stability of the algorithm in response to abnormal measurements at edge nodes and dynamic system changes. Finally, simulation analysis under a typical power system model shows that compared with the conventional UKF method, the developed ISSA-UKF algorithm demonstrates significant improvements in estimation accuracy, robustness, and dynamic response performance and can effectively cope with non-ideal disturbances that may occur in power systems. Full article
(This article belongs to the Section Systems & Control Engineering)
Show Figures

Figure 1

Back to TopTop