Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (90)

Search Parameters:
Keywords = K-anonymity

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 4863 KiB  
Article
Evaluation of Explainable, Interpretable and Non-Interpretable Algorithms for Cyber Threat Detection
by José Ramón Trillo, Felipe González-López, Juan Antonio Morente-Molinera, Roberto Magán-Carrión and Pablo García-Sánchez
Electronics 2025, 14(15), 3073; https://doi.org/10.3390/electronics14153073 (registering DOI) - 31 Jul 2025
Abstract
As anonymity-enabling technologies such as VPNs and proxies become increasingly exploited for malicious purposes, detecting traffic associated with such services emerges as a critical first step in anticipating potential cyber threats. This study analyses a network traffic dataset focused on anonymised IP addresses—not [...] Read more.
As anonymity-enabling technologies such as VPNs and proxies become increasingly exploited for malicious purposes, detecting traffic associated with such services emerges as a critical first step in anticipating potential cyber threats. This study analyses a network traffic dataset focused on anonymised IP addresses—not direct attacks—to evaluate and compare explainable, interpretable, and opaque machine learning models. Through advanced preprocessing and feature engineering, we examine the trade-off between model performance and transparency in the early detection of suspicious connections. We evaluate explainable ML-based models such as k-nearest neighbours, fuzzy algorithms, decision trees, and random forests, alongside interpretable models like naïve Bayes, support vector machines, and non-interpretable algorithms such as neural networks. Results show that neural networks achieve the highest performance, with a macro F1-score of 0.8786, but explainable models like HFER offer strong performance (macro F1-score = 0.6106) with greater interpretability. The choice of algorithm depends on project-specific needs: neural networks excel in accuracy, while explainable algorithms are preferred for resource efficiency and transparency, as stated in this work. This work underscores the importance of aligning cybersecurity strategies with operational requirements, providing insights into balancing performance with interpretability. Full article
(This article belongs to the Special Issue Network Security and Cryptography Applications)
Show Figures

Graphical abstract

24 pages, 7849 KiB  
Article
Face Desensitization for Autonomous Driving Based on Identity De-Identification of Generative Adversarial Networks
by Haojie Ji, Liangliang Tian, Jingyan Wang, Yuchi Yao and Jiangyue Wang
Electronics 2025, 14(14), 2843; https://doi.org/10.3390/electronics14142843 - 15 Jul 2025
Viewed by 258
Abstract
Automotive intelligent agents are increasingly collecting facial data for applications such as driver behavior monitoring and identity verification. These excessive collections of facial data bring serious risks of sensitive information leakage to autonomous driving. Facial information has been explicitly required to be anonymized, [...] Read more.
Automotive intelligent agents are increasingly collecting facial data for applications such as driver behavior monitoring and identity verification. These excessive collections of facial data bring serious risks of sensitive information leakage to autonomous driving. Facial information has been explicitly required to be anonymized, but the availability of most desensitized facial data is poor, which will greatly affect its application in autonomous driving. This paper proposes an automotive sensitive information anonymization method with high-quality generated facial images by considering the data availability under privacy protection. By comparing K-Same and Generative Adversarial Networks (GANs), this paper proposes a hierarchical self-attention mechanism in StyleGAN3 to enhance the feature perception of face images. The synchronous regularization of sample data is applied to optimize the loss function of the discriminator of StyleGAN3, thereby improving the convergence stability of the model. The experimental results demonstrate that the proposed facial desensitization model reduces the Frechet inception distance (FID) and structural similarity index measure (SSIM) by 95.8% and 24.3%, respectively. The image quality and privacy desensitization of the facial data generated by the StyleGAN3 model have been fully verified in this work. This research provides an efficient and robust facial privacy protection solution for autonomous driving, which is conducive to promoting the security guarantee of automotive data. Full article
(This article belongs to the Special Issue Development and Advances in Autonomous Driving Technology)
Show Figures

Figure 1

25 pages, 2389 KiB  
Article
Analysis of Demographic, Familial, and Social Determinants of Smoking Behavior Using Machine Learning Methods
by Joanna Chwał, Małgorzata Kostka, Paweł Stanisław Kostka, Radosław Dzik, Anna Filipowska and Rafał Jan Doniec
Appl. Sci. 2025, 15(8), 4442; https://doi.org/10.3390/app15084442 - 17 Apr 2025
Cited by 1 | Viewed by 1016
Abstract
Smoking behavior, encompassing both traditional tobacco and electronic cigarette use, is influenced by a range of demographic, familial, and social factors. This study examines the relationship between smoking habits and family dynamics through a cross-sectional survey of 100 participants, using an anonymous questionnaire [...] Read more.
Smoking behavior, encompassing both traditional tobacco and electronic cigarette use, is influenced by a range of demographic, familial, and social factors. This study examines the relationship between smoking habits and family dynamics through a cross-sectional survey of 100 participants, using an anonymous questionnaire to collect demographic data, smoking patterns, and familial interactions. Validated instruments, including the Penn State Electronic Cigarette Dependence Index and the Family Relationship Assessment Scale, were employed to assess smoking dependence and family dynamics. The analysis identified key patterns, such as increased smoking frequency among individuals experiencing higher family tension and variations in smoking habits across age and gender groups. Nocturnal smoking was linked to higher cigarette consumption, whereas early-day smokers exhibited a lower desire to quit. Machine learning models were applied to predict and classify smoking behaviors based on socio-demographic and familial variables, with an ensemble learning model achieving the highest accuracy (93.33%), outperforming k-nearest neighbors (90.00%), support vector machines (80.00%), and decision trees (83.33%). These findings underscore the complex interplay between family relationships and smoking behavior, providing insights for public health interventions. Additionally, this study highlights the potential of machine learning in behavioral research, demonstrating its utility in identifying and predicting smoking-related patterns. Full article
(This article belongs to the Special Issue Artificial Intelligence in Medicine and Healthcare)
Show Figures

Figure 1

31 pages, 340 KiB  
Article
Goal Setting for Teacher Development: Enhancing Culturally Responsive, Inclusive, and Social Justice Pedagogy
by Lydiah Nganga, Aaron Nydam and John Kambutu
Educ. Sci. 2025, 15(3), 264; https://doi.org/10.3390/educsci15030264 - 20 Feb 2025
Cited by 1 | Viewed by 2210
Abstract
This interpretive phenomenological study explores the perspectives of in-service, K-12 teachers in a graduate teacher education program on using goal setting to promote culturally responsive practices. The participants set two goals, documented their growth, and rated course instructional strategies that contributed to their [...] Read more.
This interpretive phenomenological study explores the perspectives of in-service, K-12 teachers in a graduate teacher education program on using goal setting to promote culturally responsive practices. The participants set two goals, documented their growth, and rated course instructional strategies that contributed to their learning. Data were collected through written reflections and responses to an anonymous midterm questionnaire in an online forum. Additional data came from the participants’ final reflections, the principal researcher’s reflective teaching notes, and end-of-semester reflections gathered by an unaffiliated critical friend after grades were posted. Coded data revealed that: 1. In-service teachers created goals that were relevant to specific areas of growth in professional learning and development in culturally responsive teaching practices and understanding diverse learners, 2. Goal setting, as a self-regulated learning strategy, serves to empower teachers toward teaching for promoting culturally responsive teaching practices, 3. Instructional supports and activities enhance personal development in becoming culturally responsive teachers, 4. Teacher educators’ reflection-on-action supports professional development. Full article
13 pages, 3643 KiB  
Article
A Critical Appraisal of System-Reported Organ Dose (OD) Versus Manually Calculated Mean Glandular Dose (MGD) in Dubai’s Mammography Services
by Kaltham Abdulwahid Mohammad Noor, Norhashimah Mohd Norsuddin, Muhammad Khalis Abdul Karim, Iza Nurzawani Che Isa and Vaidehi Ulaganathan
Diagnostics 2025, 15(1), 81; https://doi.org/10.3390/diagnostics15010081 - 1 Jan 2025
Viewed by 1112
Abstract
Background: This study compares system-reported organ doses (ODs) to manually calculated mean glandular doses (MGDs) in mammography across multiple centers and manufacturers in Dubai. Methods: A retrospective study of 2754 anonymized mammograms from six clinics in Dubai were randomly retrieved from [...] Read more.
Background: This study compares system-reported organ doses (ODs) to manually calculated mean glandular doses (MGDs) in mammography across multiple centers and manufacturers in Dubai. Methods: A retrospective study of 2754 anonymized mammograms from six clinics in Dubai were randomly retrieved from a central dose survey database. Organ doses were documented along with other dosimetry information like kVp, mAs, filter, target, compression force, and breast thickness. Mean glandular doses, MGDs, were calculated manually for all the patients using the Dance formula and inferential statistical analyses were run to compare the two figures and verify the factors affecting each. Results: Our study’s analysis revealed that manually calculated mean glandular doses (MGDs) provide a more reliable indicator of radiation exposure than organ doses (ODs) reported by DICOM, particularly in multi-vendor scenarios. Manually calculated MGD values were consistently lower than system-reported ODs (MLO view: 0.96 ± 0.37 mGy vs. 1.38 ± 0.45 mGy; CC view: 0.81 ± 0.33 mGy vs. 1.22 ± 0.38 mGy). Significant differences in both system-reported ODs and manually calculated MGDs were observed across centers (p < 0.001). Strong correlations between system-reported ODs and manually calculated MGDs were found for Siemens equipment (r = 0.923, p < 0.001) but only moderate correlations for GE systems (r = 0.638, p < 0.001). Calculated MGD values were significantly higher for GE equipment compared to Siemens (1.49 ± 0.77 mGy vs. 0.93 ± 0.33 mGy, p < 0.001). Conclusions: This study addresses concerns regarding mammography dosimetry accuracy by demonstrating the superiority of mean glandular doses over DICOM-generated organ doses. These findings empower practitioners to optimize dose levels, ensuring safer and more effective breast cancer screening protocols. Full article
(This article belongs to the Section Medical Imaging and Theranostics)
Show Figures

Figure 1

21 pages, 526 KiB  
Article
Collaborative Caching for Implementing a Location-Privacy Aware LBS on a MANET
by Rudyard Fuster, Patricio Galdames and Claudio Gutierréz-Soto
Appl. Sci. 2024, 14(22), 10480; https://doi.org/10.3390/app142210480 - 14 Nov 2024
Viewed by 972
Abstract
This paper addresses the challenge of preserving user privacy in location-based services (LBSs) by proposing a novel, complementary approach to existing privacy-preserving techniques such as k-anonymity and l-diversity. Our approach implements collaborative caching strategies within a mobile ad hoc network (MANET), exploiting [...] Read more.
This paper addresses the challenge of preserving user privacy in location-based services (LBSs) by proposing a novel, complementary approach to existing privacy-preserving techniques such as k-anonymity and l-diversity. Our approach implements collaborative caching strategies within a mobile ad hoc network (MANET), exploiting the geographic of location-based queries (LBQs) to reduce data exposure to untrusted LBS servers. Unlike existing approaches that rely on centralized servers or stationary infrastructure, our solution facilitates direct data exchange between users’ devices, providing an additional layer of privacy protection. We introduce a new privacy entropy-based metric called accumulated privacy loss (APL) to quantify the privacy loss incurred when accessing either the LBS or our proposed system. Our approach implements a two-tier caching strategy: local caching maintained by each user and neighbor caching based on proximity. This strategy not only reduces the number of queries to the LBS server but also significantly enhances user privacy by minimizing the exposure of location data to centralized entities. Empirical results demonstrate that while our collaborative caching system incurs some communication costs, it significantly mitigates redundant data among user caches and reduces the need to access potentially privacy-compromising LBS servers. Our findings show a 40% reduction in LBS queries, a 64% decrease in data redundancy within cells, and a 31% reduction in accumulated privacy loss compared to baseline methods. In addition, we analyze the impact of data obsolescence on cache performance and privacy loss, proposing mechanisms for maintaining the relevance and accuracy of cached data. This work contributes to the field of privacy-preserving LBSs by providing a decentralized, user-centric approach that improves both cache redundancy and privacy protection, particularly in scenarios where central infrastructure is unreachable or untrusted. Full article
(This article belongs to the Special Issue New Advances in Computer Security and Cybersecurity)
Show Figures

Figure 1

26 pages, 4281 KiB  
Article
Secure and Transparent Lung and Colon Cancer Classification Using Blockchain and Microsoft Azure
by Entesar Hamed I. Eliwa, Amr Mohamed El Koshiry, Tarek Abd El-Hafeez and Ahmed Omar
Adv. Respir. Med. 2024, 92(5), 395-420; https://doi.org/10.3390/arm92050037 - 17 Oct 2024
Cited by 29 | Viewed by 2184
Abstract
Background: The global healthcare system faces challenges in diagnosing and managing lung and colon cancers, which are significant health burdens. Traditional diagnostic methods are inefficient and prone to errors, while data privacy and security concerns persist. Objective: This study aims to develop a [...] Read more.
Background: The global healthcare system faces challenges in diagnosing and managing lung and colon cancers, which are significant health burdens. Traditional diagnostic methods are inefficient and prone to errors, while data privacy and security concerns persist. Objective: This study aims to develop a secure and transparent framework for remote consultation and classification of lung and colon cancer, leveraging blockchain technology and Microsoft Azure cloud services. Dataset and Features: The framework utilizes the LC25000 dataset, containing 25,000 histopathological images, for training and evaluating advanced machine learning models. Key features include secure data upload, anonymization, encryption, and controlled access via blockchain and Azure services. Methods: The proposed framework integrates Microsoft Azure’s cloud services with a permissioned blockchain network. Patients upload CT scans through a mobile app, which are then preprocessed, anonymized, and stored securely in Azure Blob Storage. Blockchain smart contracts manage data access, ensuring only authorized specialists can retrieve and analyze the scans. Azure Machine Learning is used to train and deploy state-of-the-art machine learning models for cancer classification. Evaluation Metrics: The framework’s performance is evaluated using metrics such as accuracy, precision, recall, and F1-score, demonstrating the effectiveness of the integrated approach in enhancing diagnostic accuracy and data security. Results: The proposed framework achieves an impressive accuracy of 100% for lung and colon cancer classification using DenseNet, ResNet50, and MobileNet models with different split ratios (70–30, 80–20, 90–10). The F1-score and k-fold cross-validation accuracy (5-fold and 10-fold) also demonstrate exceptional performance, with values exceeding 99.9%. Real-time notifications and secure remote consultations enhance the efficiency and transparency of the diagnostic process, contributing to better patient outcomes and streamlined cancer care management. Full article
Show Figures

Figure 1

23 pages, 2789 KiB  
Article
TCα-PIA: A Personalized Social Network Anonymity Scheme via Tree Clustering and α-Partial Isomorphism
by Mingmeng Zhang, Liang Chang, Yuanjing Hao, Pengao Lu and Long Li
Electronics 2024, 13(19), 3966; https://doi.org/10.3390/electronics13193966 - 9 Oct 2024
Viewed by 961
Abstract
Social networks have become integral to daily life, allowing users to connect and share information. The efficient analysis of social networks benefits fields such as epidemiology, information dissemination, marketing, and sentiment analysis. However, the direct publishing of social networks is vulnerable to privacy [...] Read more.
Social networks have become integral to daily life, allowing users to connect and share information. The efficient analysis of social networks benefits fields such as epidemiology, information dissemination, marketing, and sentiment analysis. However, the direct publishing of social networks is vulnerable to privacy attacks such as typical 1-neighborhood attacks. This attack can infer the sensitive information of private users using users’ relationships and identities. To defend against these attacks, the k-anonymity scheme is a widely used method for protecting user privacy by ensuring that each user is indistinguishable from at least k1 other users. However, this approach requires extensive modifications that compromise the utility of the anonymized graph. In addition, it applies uniform privacy protection, ignoring users’ different privacy preferences. To address the above challenges, this paper proposes an anonymity scheme called TCα-PIA (Tree Clustering and α-Partial Isomorphism Anonymization). Specifically, TCα-PIA first constructs a similarity tree to capture subgraph feature information at different levels using a novel clustering method. Then, it extracts the different privacy requirements of each user based on the node cluster. Using the privacy requirements, it employs an α-partial isomorphism-based graph structure anonymization method to achieve personalized privacy requirements for each user. Extensive experiments on four public datasets show that TCα-PIA outperforms other alternatives in balancing graph privacy and utility. Full article
Show Figures

Figure 1

24 pages, 6162 KiB  
Article
Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity
by Nanlan Jiang, Yinan Zhai, Yujun Wang, Xuesong Yin, Sai Yang and Pingping Xu
Sensors 2024, 24(18), 6153; https://doi.org/10.3390/s24186153 - 23 Sep 2024
Cited by 1 | Viewed by 1587
Abstract
With the development of the Internet of Things (IoT) and edge computing, more and more devices, such as sensor nodes and intelligent automated guided vehicles (AGVs), can serve as edge devices to provide Location-Based Services (LBS) through the IoT. As the number of [...] Read more.
With the development of the Internet of Things (IoT) and edge computing, more and more devices, such as sensor nodes and intelligent automated guided vehicles (AGVs), can serve as edge devices to provide Location-Based Services (LBS) through the IoT. As the number of applications increases, there is an abundance of sensitive information in the communication process, pushing the focus of privacy protection towards the communication process and edge devices. The challenge lies in the fact that most traditional location privacy protection algorithms are not suited for the IoT with edge computing, as they primarily focus on the security of remote servers. To enhance the capability of location privacy protection, this paper proposes a novel K-anonymity algorithm based on clustering. This novel algorithm incorporates a scheme that flexibly combines real and virtual locations based on the requirements of applications. Simulation results demonstrate that the proposed algorithm significantly improves location privacy protection for the IoT with edge computing. When compared to traditional K-anonymity algorithms, the proposed algorithm further enhances the security of location privacy by expanding the potential region in which the real node may be located, thereby limiting the effectiveness of “narrow-region” attacks. Full article
(This article belongs to the Special Issue Advanced Mobile Edge Computing in 5G Networks)
Show Figures

Figure 1

26 pages, 3882 KiB  
Article
A Network Performance Analysis of MQTT Security Protocols with Constrained Hardware in the Dark Net for DMS
by Antonio Francesco Gentile, Davide Macrì, Domenico Luca Carnì, Emilio Greco and Francesco Lamonaca
Appl. Sci. 2024, 14(18), 8501; https://doi.org/10.3390/app14188501 - 20 Sep 2024
Cited by 2 | Viewed by 3098
Abstract
In the context of the internet of things, and particularly within distributed measurement systems that are subject to high privacy risks, it is essential to emphasize the need for increasingly effective privacy protections. The idea presented in this work involves managing critical traffic [...] Read more.
In the context of the internet of things, and particularly within distributed measurement systems that are subject to high privacy risks, it is essential to emphasize the need for increasingly effective privacy protections. The idea presented in this work involves managing critical traffic through an architectural proposal aimed at solving the problem of communications between nodes by optimizing both the confidentiality to be guaranteed to the payload and the transmission speed. Specifically, data such as a typical sensor on/off signal could be sent via a standard encrypted channel, while a sensitive aggregate could be transmitted through a dedicated private channel. Additionally, this work emphasizes the critical importance of optimizing message sizes to 5 k-bytes (small payload messages) for transmission over the reserve channel, enhancing both privacy and system responsiveness, a mandatory requirement in distributed measurement systems. By focusing on small, encrypted payloads, the study facilitates secure, timely updates and summaries of network conditions, maintaining the integrity and privacy of communications in even the most challenging and privacy-sensitive environments. This study provides a comprehensive performance analysis of IoT networks using Dark Net technologies and MQTT protocols, with a focus on privacy and anonymity. It highlights the trade-offs between enhanced security and performance, noting increased latency, reduced bandwidth, and network instability when using TOR, particularly with cipher suites like AES256-GCM-SHA384 and DHE-RSA-CHACHA20-POLY1305. The research emphasizes the need for further exploration of alternative protocols like LWM2M in secure IoT environments and calls for optimization to balance privacy with performance in Dark-Net-based IoT deployments. Full article
Show Figures

Figure 1

15 pages, 657 KiB  
Article
A Differentially Private (Random) Decision Tree without Noise from k-Anonymity
by Atsushi Waseda, Ryo Nojima and Lihua Wang
Appl. Sci. 2024, 14(17), 7625; https://doi.org/10.3390/app14177625 - 28 Aug 2024
Cited by 1 | Viewed by 1305
Abstract
This paper focuses on the relationship between decision trees, a typical machine learning method, and data anonymization. It is known that information leaked from trained decision trees can be evaluated using well-studied data anonymization techniques and that decision trees can be strengthened using [...] Read more.
This paper focuses on the relationship between decision trees, a typical machine learning method, and data anonymization. It is known that information leaked from trained decision trees can be evaluated using well-studied data anonymization techniques and that decision trees can be strengthened using k-anonymity and -diversity; unfortunately, however, this does not seem sufficient for differential privacy. In this paper, we show how one might apply k-anonymity to a (random) decision tree, which is a variant of the decision tree. Surprisingly, this results in differential privacy, which means that security is amplified from k-anonymity to differential privacy without the addition of noise. Full article
(This article belongs to the Special Issue Data Privacy and Security for Information Engineering)
Show Figures

Figure 1

29 pages, 2443 KiB  
Article
User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks
by Farid Yessoufou, Salma Sassi, Elie Chicha, Richard Chbeir and Jules Degila
Future Internet 2024, 16(9), 311; https://doi.org/10.3390/fi16090311 - 28 Aug 2024
Viewed by 4265
Abstract
With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users’ geographic locations, has proven to be particularly [...] Read more.
With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users’ geographic locations, has proven to be particularly innovative. However, this trend raises significant privacy concerns, particularly regarding the precise geographic data required by these crowdsourcing platforms. Traditional methods, such as dummy locations, spatial cloaking, differential privacy, k-anonymity, and encryption, often fail to mitigate the risks associated with the continuous disclosure of location data. An unauthorized entity could access these data and infer personal information about individuals, such as their home address, workplace, religion, or political affiliations, thus constituting a privacy violation. In this paper, we propose a user mobility model designed to enhance location privacy protection by accurately identifying Points of Interest (POIs) and countering inference attacks. Our main contribution here focuses on user mobility modeling and the introduction of an advanced algorithm for precise POI identification. We evaluate our contributions using GPS data collected from 10 volunteers over a period of 3 months. The results show that our mobility model delivers significant performance and that our POI extraction algorithm outperforms existing approaches. Full article
Show Figures

Figure 1

14 pages, 982 KiB  
Article
Development and Validation of a Questionnaire to Measure Adherence to a Mediterranean-Type Diet in Youth
by Yu-Jin Kwon, Young-Hwan Park, Yae-Ji Lee, Li-Rang Lim and Ji-Won Lee
Nutrients 2024, 16(16), 2754; https://doi.org/10.3390/nu16162754 - 18 Aug 2024
Cited by 3 | Viewed by 2330
Abstract
Proper nutrition during childhood is crucial for preventing chronic diseases and ensuring optimal growth. This study aimed to develop and validate the Korean version of the KIDMED (K-KIDMED) questionnaire to accurately measure Mediterranean diet (MD) adherence among Korean children and adolescents. A total [...] Read more.
Proper nutrition during childhood is crucial for preventing chronic diseases and ensuring optimal growth. This study aimed to develop and validate the Korean version of the KIDMED (K-KIDMED) questionnaire to accurately measure Mediterranean diet (MD) adherence among Korean children and adolescents. A total of 226 parents, representing their children and adolescents, completed the K-KIDMED, a 112-item food frequency questionnaire (FFQ), and a 24-h dietary recall method through an anonymous online survey. The K-KIDMED comprised 11 questions, with five excluded from the original scoring as they did not apply to the FFQ. Scores were categorized into three levels of adherence to the MD: low (1 or less), average (2–4), and good (5 or more). The agreement between total MD scores from the Korean version of the Mediterranean diet adherence screener and the FFQ was moderate (intraclass correlation coefficient = 0.455, 95% confidence interval: 0.346, 0.553). Among the 226 children and adolescents, 36.7% had low adherence to the KIDMED, 43.3% had intermediate adherence, and 19.9% had good adherence. Higher K-KIDMED scores were correlated with greater intakes of fiber, vitamin K, vitamin B6, and potassium (all p < 0.05). We developed the K-KIDMED as a valid tool to assess MD adherence in Korean children and adolescents. Full article
Show Figures

Figure 1

15 pages, 1803 KiB  
Article
A Stealthy Communication Model with Blockchain Smart Contract for Bidding Systems
by Qi Liang, Ning Shi, Yu-an Tan, Chunying Li and Chen Liang
Electronics 2024, 13(13), 2523; https://doi.org/10.3390/electronics13132523 - 27 Jun 2024
Cited by 3 | Viewed by 1582
Abstract
With the widespread adoption of blockchain technology, its public ledger characteristic enhances transaction transparency but also amplifies the risk of privacy breaches. Attackers can infer users’ real identities and behaviors by analyzing public transaction patterns and address relationships, posing a severe threat to [...] Read more.
With the widespread adoption of blockchain technology, its public ledger characteristic enhances transaction transparency but also amplifies the risk of privacy breaches. Attackers can infer users’ real identities and behaviors by analyzing public transaction patterns and address relationships, posing a severe threat to users’ privacy and security, and thus hindering further advancements in blockchain applications. To address this challenge, covert communication has emerged as an effective strategy for safeguarding the privacy of blockchain users and preventing information leakage. But existing blockchain-based covert communication schemes rely solely on the immutability of blockchain itself for robustness and suffer from low transmission efficiency. To tackle these issues, this paper proposes a stealthy communication model with blockchain smart contract for bidding systems. The model initiates by preprocessing sensitive information using a secret-sharing algorithm-the Shamir (t, n) threshold scheme-and subsequently embeds this information into bidding amounts, facilitating the covert transfer of sensitive data. We implemented and deployed this model on the Ethereum platform and conducted comprehensive performance evaluations. To assess the stealthiness of our approach, we employed a suite of statistical tests including the CDF, the Kolmogorov–Smirnov test, Welch’s t-test and K–L divergence. These analyses confirmed that amounts carrying concealed information were statistically indistinguishable from regular transactions, thus validating the effectiveness of our solution in maintaining the anonymity and confidentiality of information transmission within the blockchain ecosystem. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

23 pages, 4769 KiB  
Article
Secure Task Offloading and Resource Allocation Strategies in Mobile Applications Using Probit Mish-Gated Recurrent Unit and an Enhanced-Searching-Based Serval Optimization Algorithm
by Ahmed Obaid N. Sindi, Pengbo Si and Qi Li
Electronics 2024, 13(13), 2462; https://doi.org/10.3390/electronics13132462 - 24 Jun 2024
Viewed by 1264
Abstract
Today, with the presence of 5G communication systems, including Internet of Things (IoT) technology, there is a high demand for mobile devices (especially smartphones, tablets, wearable technology, and so on). Regarding this proliferation and high demand, the massive adoption of mobile devices (MDs) [...] Read more.
Today, with the presence of 5G communication systems, including Internet of Things (IoT) technology, there is a high demand for mobile devices (especially smartphones, tablets, wearable technology, and so on). Regarding this proliferation and high demand, the massive adoption of mobile devices (MDs) has led to an exponential increase in network latency; the heavy demand for cloud servers causes the degradation of data traffic, which considerably impacts the real-time communication and computing aspects of mobile devices. As a result, mobile edge computing (MEC), an efficient framework capable of enhancing processing, optimizing energy usage, and offloading computation tasks, is considered a promising solution. In current research, numerous models have been implemented to achieve resource allocation and task offloading. However, these techniques are ineffective due to privacy issues and a lack of sufficient resources. Hence, this study proposes secure task offloading and resource allocation strategies in mobile devices using the Probit Mish–Gated Recurrent Unit (PM-GRU) and Entropic Linear Interpolation-Serval Optimization Algorithm (ELI-SOA). Primarily, the tasks to be offloaded and their attributes are gathered from mobile users and passed to a local computing model to identify the edge server. Here, the task attributes and the server attributes are compared with a cache table using the Sorensen–Dice coefficient. If the attributes match, then details about the appropriate edge server are produced. If the attributes do not match, then they are inputted into a global scheme that analyzes the attributes and predicts the edge server based on the Probit Mish-Gated Recurrent Unit (PM-GRU). Then, the server information is preserved and updated in the cache table in the local scheme. Further, the attributes, along with the predicted edge server, are inputted into a system for privacy-preserving smart contract creation by using Exponential Earth Mover’s Distance Matrix-Based K-Anonymity (EEMDM-KA) to develop a secure smart contract. Subsequently, the traffic attributes in the smart contract are extracted, and the request load is balanced by using HCD-KM. Load-balanced requests are assigned to the edge server, and the optimal resources are allocated in the cloud server by using the Entropic Linear Interpolation-Serval Optimization Algorithm (ELI-SOA). Finally, the created smart contract is hashed based on KECCAK-512 and stored in the blockchain. With a high accuracy of 99.84%, the evaluation results showed that the proposed approach framework performed better than those used in previous efforts. Full article
Show Figures

Figure 1

Back to TopTop