Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (47)

Search Parameters:
Keywords = false compliance

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
32 pages, 2966 KB  
Article
CSPC-BRS: An Enhanced Real-Time Multi-Target Detection and Tracking Algorithm for Complex Open Channels
by Wei Li, Xianpeng Zhu, Aghaous Hayat, Hu Yuan and Xiaojiang Yang
Electronics 2025, 14(24), 4942; https://doi.org/10.3390/electronics14244942 - 16 Dec 2025
Abstract
Ensuring worker safety compliance and secure cargo transportation in complex port environments is critical for modern logistics hubs. However, conventional supervision methods, including manual inspection and passive video monitoring, suffer from limited coverage, poor real-time responsiveness, and low robustness under frequent occlusion, scale [...] Read more.
Ensuring worker safety compliance and secure cargo transportation in complex port environments is critical for modern logistics hubs. However, conventional supervision methods, including manual inspection and passive video monitoring, suffer from limited coverage, poor real-time responsiveness, and low robustness under frequent occlusion, scale variation, and cross-camera transitions, leading to unstable target association and missed risk events. To address these challenges, this paper proposes CSPC-BRS, a real-time multi-object detection and tracking framework for open-channel port scenarios. CSPC (Coordinated Spatial Perception Cascade) enhances the YOLOv8 backbone by integrating CASAM, SPPELAN-DW, and CACC modules to improve feature representation under cluttered backgrounds and degraded visual conditions. Meanwhile, BRS (Bounding Box Reduction Strategy) mitigates scale distortion during tracking, and a Multi-Dimensional Re-identification Scoring (MDRS) mechanism fuses six perceptual features—color, texture, shape, motion, size, and time—to achieve stable cross-camera identity consistency. Experimental results demonstrate that CSPC-BRS outperforms the YOLOv8-n baseline by improving the mAP@0.5:0.95 by 9.6% while achieving a real-time speed of 132.63 FPS. Furthermore, in practical deployment, it reduces the false capture rate by an average of 59.7% compared to the YOLOv8 + Bot-SORT tracker. These results confirm that CSPC-BRS effectively balances detection accuracy and computational efficiency, providing a practical and deployable solution for intelligent safety monitoring in complex industrial logistics environments. Full article
27 pages, 2832 KB  
Article
How to Optimize Data Sharing in Logistics Enterprises: Analysis of Collaborative Governance Model Based on Evolutionary Game Theory
by Tongxin Pei, Xu Lian and Wensheng Wang
Sustainability 2025, 17(24), 11064; https://doi.org/10.3390/su172411064 - 10 Dec 2025
Viewed by 117
Abstract
Data, as a key production factor in modern logistics systems, plays a crucial role in enhancing industry efficiency and promoting supply chain coordination. To address challenges in data sharing among logistics enterprises—such as conflicts of interest, unequal risk allocation, and insufficient security governance—this [...] Read more.
Data, as a key production factor in modern logistics systems, plays a crucial role in enhancing industry efficiency and promoting supply chain coordination. To address challenges in data sharing among logistics enterprises—such as conflicts of interest, unequal risk allocation, and insufficient security governance—this study develops a tripartite evolutionary game model involving logistics enterprises, data partners, and supervisory institutions. The payoff matrix incorporates prospect theory to account for risk attitudes, loss–gain perceptions, and subjective judgments. Stable equilibrium points are derived using the Jacobian matrix, and numerical simulations examine strategic evolution under varying parameters. Results indicate that increased returns for data partners reduce their motivation to provide truthful data, while higher enterprise profits suppress logistics enterprises’ willingness to share. Compensation levels have limited impact, whereas excessively high supervision subsidies weaken participation and oversight across all parties. Stronger penalties and higher-level enforcement significantly promote compliance and positive system evolution. Enterprise investment positively correlates with data-sharing behavior, and risk preferences of all parties accelerate convergence to stable equilibria. Conversely, excessively low risk preference in supervisory institutions may lead to an unstable “sharing–false data–non-regulation” pattern. These findings provide theoretical support and policy guidance for designing a dynamic governance mechanism that balances incentives, constraints, and collaboration, thereby facilitating secure and effective logistics data sharing and informing the development of the data factor market. Full article
(This article belongs to the Special Issue Advances in Sustainable Supply Chain Management and Logistics)
Show Figures

Figure 1

58 pages, 7248 KB  
Article
Super Time-Cognitive Neural Networks (Phase 3 of Sophimatics): Temporal-Philosophical Reasoning for Security-Critical AI Applications
by Gerardo Iovane and Giovanni Iovane
Appl. Sci. 2025, 15(22), 11876; https://doi.org/10.3390/app152211876 - 7 Nov 2025
Cited by 1 | Viewed by 481
Abstract
Current generative AI systems, despite extraordinary progress, face fundamental limitations in temporal reasoning, contextual understanding, and ethical decision-making. These systems process information statistically without authentic comprehension of experiential time or intentional context, limiting their applicability in security-critical domains where reasoning about past experiences, [...] Read more.
Current generative AI systems, despite extraordinary progress, face fundamental limitations in temporal reasoning, contextual understanding, and ethical decision-making. These systems process information statistically without authentic comprehension of experiential time or intentional context, limiting their applicability in security-critical domains where reasoning about past experiences, present situations, and future implications is essential. We present Phase 3 of the Sophimatics framework: Super Time-Cognitive Neural Networks (STCNNs), which address these limitations through complex-time representation T ∈ ℂ where chronological time (Re(T)) integrates with experiential dimensions of memory (Im(T) < 0), present awareness (Im(T) ≈ 0), and imagination (Im(T) > 0). The STCNN architecture implements philosophical constraints through geometric parameters α and β that bound memory accessibility and creative projection, enabling neural systems to perform temporal-philosophical reasoning while maintaining computational tractability. We demonstrate STCNN’s effectiveness across five security-critical applications: threat intelligence (AUC 0.94, 1.8 s anticipation), privacy-preserving AI (84% utility at ε = 1.0), intrusion detection (96.3% detection, 2.1% false positives), secure multi-party computation (ethical compliance 0.93), and blockchain anomaly detection (94% detection, 3.2% false positives). Empirical evaluation shows 23–45% improvement over baseline systems while maintaining temporal coherence > 0.9, demonstrating that integration of temporal-philosophical reasoning with neural architectures enables AI systems to reason about security threats through simultaneous processing of historical patterns, current contexts, and projected risks. Full article
Show Figures

Figure 1

21 pages, 6738 KB  
Article
Optimized Defense Resource Allocation for Coupled Power-Transportation Networks Considering Information Security
by Yuheng Liu, Wenteng Liang, Jie Li, Yufeng Xiong, Yan Li, Qinran Hu, Tao Qian and Jinyu Yue
Energies 2025, 18(21), 5855; https://doi.org/10.3390/en18215855 - 6 Nov 2025
Viewed by 338
Abstract
Electric vehicle charging stations (EVCSs) are critical interfaces between urban mobility and distribution grids and are increasingly exposed to false data that can mislead operations and degrade voltage quality. This study proposes a defense-planning framework that models how cyber manipulation propagates to physical [...] Read more.
Electric vehicle charging stations (EVCSs) are critical interfaces between urban mobility and distribution grids and are increasingly exposed to false data that can mislead operations and degrade voltage quality. This study proposes a defense-planning framework that models how cyber manipulation propagates to physical impacts in a coupled transport–power system. The interaction is modeled as a tri-level defender–attacker–operator problem in which a defender hardens a subset of charging stations, an attacker forges measurements and demand, and an operator redispatches resources to keep the system secure. We solve this problem with a method that embeds corrective operation into the evaluation and uses improved implicit enumeration (IIE) with pruning to identify a small set of high-value stations to protect with far fewer trials than an exhaustive search. On a benchmark feeder coupled to a road network, protecting a few traffic-critical stations restores compliance with voltage limits under tested attack levels while requiring roughly an order of magnitude fewer evaluations than complete enumeration. Sensitivity analysis shows that the loss of reactive power from PV inverters (PV VARs) harms voltage profiles more than an equivalent reduction in distributed storage, indicating that maintaining local reactive capability reduces the number of stations that must be hardened to meet a given voltage target. These results guide utilities and city planners to prioritize protection at traffic-critical EVCSs and co-plan local Volt/VAR capability, achieving code-compliant voltage quality under adversarial conditions with markedly lower planning effort. Full article
Show Figures

Figure 1

33 pages, 1523 KB  
Review
Early Detection of Lung Cancer: A Review of Innovative Milestones and Techniques
by Faisal M. Habbab, Eric L. R. Bédard, Anil A. Joy, Zarmina Alam, Aswin G. Abraham and Wilson H. Y. Roa
J. Clin. Med. 2025, 14(21), 7812; https://doi.org/10.3390/jcm14217812 - 3 Nov 2025
Viewed by 3216
Abstract
Lung cancer is the most frequently diagnosed cancer and the leading cause of cancer death worldwide. Early detection of lung cancer can lead to identification of the cancer at its initial treatable stages and improves survival. Low-dose CT scan (LDCT) is currently the [...] Read more.
Lung cancer is the most frequently diagnosed cancer and the leading cause of cancer death worldwide. Early detection of lung cancer can lead to identification of the cancer at its initial treatable stages and improves survival. Low-dose CT scan (LDCT) is currently the gold standard for lung cancer screening in high-risk individuals. Despite the observed stage migration and consistently demonstrated disease-specific overall survival benefit, LDCT has inherent limitations, including false-positive results, radiation exposure, and low compliance. Recently, new techniques have been investigated for early detection of lung cancer. Several studies have shown that liquid biopsy biomarkers such as circulating cell-free DNA (cfDNA), microRNA molecules (miRNA), circulating tumor cells (CTCs), tumor-derived exosomes (TDEs), and tumor-educated platelets (TEPs), as well as volatile organic compounds (VOCs), have the power to distinguish lung cancer patients from healthy subjects, offering potential for minimally invasive and non-invasive means of early cancer detection. Furthermore, recent studies have shown that the integration of artificial intelligence (AI) with clinical, imaging, and laboratory data has provided significant advancements and can offer potential solutions to some challenges related to early detection of lung cancer. Adopting AI-based multimodality strategies, such as multi-omics liquid biopsy and/or VOCs’ detection, with LDCT augmented by advanced AI, could revolutionize early lung cancer screening by improving accuracy, efficiency, and personalization, especially when combined with patient clinical data. However, challenges remain in validating, standardizing, and integrating these approaches into clinical practice. In this review, we described these innovative milestones and methods, as well as their advantages and limitations in screening and early diagnosis of lung cancer. Full article
(This article belongs to the Section Oncology)
Show Figures

Figure 1

15 pages, 290 KB  
Review
Probiotic Viability Reconsidered: Integrating VBNC Resuscitation and Culture-Independent Methods for Accurate Probiotic Enumeration
by Sara Arroyo-Moreno, Gonzalo Saiz-Gonzalo, Seamus McSweeney and Sinead B. Bleiel
Microorganisms 2025, 13(11), 2479; https://doi.org/10.3390/microorganisms13112479 - 30 Oct 2025
Viewed by 1060
Abstract
Probiotic enumeration in foods and beverages remains anchored in culture dependent colony-forming unit (CFU) counts, the regulatory gold standard for label compliance. However, culturability does not fully equate to viability as environmental stresses can convert probiotic cells into a viable but non-culturable (VBNC) [...] Read more.
Probiotic enumeration in foods and beverages remains anchored in culture dependent colony-forming unit (CFU) counts, the regulatory gold standard for label compliance. However, culturability does not fully equate to viability as environmental stresses can convert probiotic cells into a viable but non-culturable (VBNC) state, where they remain metabolically active but undetectable by CFU counts. Microencapsulation can provide a degree of protection to probiotics against stress; nevertheless, this blind spot in quantification forces manufacturers to overdose formulations or risk non-compliance with health benefits claims. Thus, the efficacy of probiotics may be underestimated when evaluation relies solely on CFU, creating a false dichotomy between VBNC and non-viable cells. Culture-independent methods, including flow cytometry quantification of active fluorescent units (AFUs), viability PCR/dPCR, and rRNA-targeted Flow-FISH, can aid closing this gap by detecting metabolically active cells non-detectable by culturing, providing complementary quantification data to CFU counts alone. Understanding the relationship between quantification by culture and culture-independent methods provides a more accurate measure of probiotic dose delivery in functional foods and beverages. This review covers the current understanding of VBNC state, including induction, detection, and resuscitation in probiotics, with emphasis on experimental controls that differentiate true VBNC resuscitation from population growth. Case studies in Lactobacillus and Bifidobacterium illustrate triggers, molecular mechanisms, and methodological advances. Finally, guidance is provided for the development of an integrated quantification approach that reconciles culture-dependent and culture-independent data, ultimately aiming to improve CFU count accuracy through the controlled resuscitation of VBNC cells. Full article
(This article belongs to the Section Food Microbiology)
13 pages, 709 KB  
Review
Patch Test Preparations: Basis and State-of-the-Art Modern Diagnostic Tools for Contact Allergy
by Julia Zimmer, Sonja Neimanis, Sandra Schmidt, Steffen Schubert and Vera Mahler
J. Clin. Med. 2025, 14(21), 7521; https://doi.org/10.3390/jcm14217521 - 23 Oct 2025
Viewed by 1376
Abstract
Reliable quality of epicutaneous patch test (PT) preparations is a prerequisite for establishing a robust diagnosis in patients with suspected allergic contact dermatitis due to delayed-type sensitization. It is difficult to identify potential quality issues in daily practice, since confirmatory methods are lacking [...] Read more.
Reliable quality of epicutaneous patch test (PT) preparations is a prerequisite for establishing a robust diagnosis in patients with suspected allergic contact dermatitis due to delayed-type sensitization. It is difficult to identify potential quality issues in daily practice, since confirmatory methods are lacking and assessment of PT-relevance is predominantly based on patients’ history and exposure. The quality of PT products can be affected, e.g., by the properties of the active substance, an insufficient development of the PT preparation or issues during manufacturing. Resulting quality deficiencies can cause both false-negative and false-positive test results. As PT preparations are medicinal products according to Directive 2001/83/EC, they require a marketing authorization (MA) entailing assessment of quality, safety and efficacy by the competent authorities. The corresponding product dossier is the basis for MA. It is continuously updated, e.g., upon change of a source material supplier, ensuring comparability of the respective product over time. Compliance with regulatory requirements is a crucial foundation for sustainable quality to prevent product deficiencies, ensuring reliable test results in practice. Harmonization across the EU is important to ensure the widespread availability of high-quality PT products. This review presents the MA requirements of PT preparations in the EU, as well as challenges previously reported by physicians. Full article
Show Figures

Figure 1

56 pages, 732 KB  
Review
The Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions
by Dan Xu, Iqbal Gondal, Xun Yi, Teo Susnjak, Paul Watters and Timothy R. McIntosh
J. Cybersecur. Priv. 2025, 5(4), 87; https://doi.org/10.3390/jcp5040087 - 15 Oct 2025
Viewed by 4140
Abstract
Generative artificial intelligence (AI) and persistent empirical gaps are reshaping the cyber threat landscape faster than Zero-Trust Architecture (ZTA) research can respond. We reviewed 10 recent ZTA surveys and 136 primary studies (2022–2024) and found that 98% provided only partial or no real-world [...] Read more.
Generative artificial intelligence (AI) and persistent empirical gaps are reshaping the cyber threat landscape faster than Zero-Trust Architecture (ZTA) research can respond. We reviewed 10 recent ZTA surveys and 136 primary studies (2022–2024) and found that 98% provided only partial or no real-world validation, leaving several core controls largely untested. Our critique, therefore, proceeds on two axes: first, mainstream ZTA research is empirically under-powered and operationally unproven; second, generative-AI attacks exploit these very weaknesses, accelerating policy bypass and detection failure. To expose this compounding risk, we contribute the Cyber Fraud Kill Chain (CFKC), a seven-stage attacker model (target identification, preparation, engagement, deception, execution, monetization, and cover-up) that maps specific generative techniques to NIST SP 800-207 components they erode. The CFKC highlights how synthetic identities, context manipulation and adversarial telemetry drive up false-negative rates, extend dwell time, and sidestep audit trails, thereby undermining the Zero-Trust principles of verify explicitly and assume breach. Existing guidance offers no systematic countermeasures for AI-scaled attacks, and that compliance regimes struggle to audit content that AI can mutate on demand. Finally, we outline research directions for adaptive, evidence-driven ZTA, and we argue that incremental extensions of current ZTA that are insufficient; only a generative-AI-aware redesign will sustain defensive parity in the coming threat cycle. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1

30 pages, 1428 KB  
Review
Healthcare 5.0-Driven Clinical Intelligence: The Learn-Predict-Monitor-Detect-Correct Framework for Systematic Artificial Intelligence Integration in Critical Care
by Hanene Boussi Rahmouni, Nesrine Ben El Hadj Hassine, Mariem Chouchen, Halil İbrahim Ceylan, Raul Ioan Muntean, Nicola Luigi Bragazzi and Ismail Dergaa
Healthcare 2025, 13(20), 2553; https://doi.org/10.3390/healthcare13202553 - 10 Oct 2025
Viewed by 1790
Abstract
Background: Healthcare 5.0 represents a shift toward intelligent, human-centric care systems. Intensive care units generate vast amounts of data that require real-time decisions, but current decision support systems lack comprehensive frameworks for safe integration of artificial intelligence. Objective: We developed and validated the [...] Read more.
Background: Healthcare 5.0 represents a shift toward intelligent, human-centric care systems. Intensive care units generate vast amounts of data that require real-time decisions, but current decision support systems lack comprehensive frameworks for safe integration of artificial intelligence. Objective: We developed and validated the Learn–Predict–Monitor–Detect–Correct (LPMDC) framework as a methodology for systematic artificial intelligence integration across the critical care workflow. The framework improves predictive analytics, continuous patient monitoring, intelligent alerting, and therapeutic decision support while maintaining essential human clinical oversight. Methods: Framework development employed systematic theoretical modeling integrating Healthcare 5.0 principles, comprehensive literature synthesis covering 2020–2024, clinical workflow analysis across 15 international ICU sites, technology assessment of mature and emerging AI applications, and multi-round expert validation by 24 intensive care physicians and medical informaticists. Each LPMDC phase was designed with specific integration requirements, performance metrics, and safety protocols. Results: LPMDC implementation and aggregated evidence from prior studies demonstrated significant clinical improvements: 30% mortality reduction, 18% ICU length-of-stay decrease (7.5 to 6.1 days), 45% clinician cognitive load reduction, and 85% sepsis bundle compliance improvement. Machine learning algorithms achieved an 80% sensitivity for sepsis prediction three hours before clinical onset, with false-positive rates below 15%. Additional applications demonstrated effectiveness in predicting respiratory failure, preventing cardiovascular crises, and automating ventilator management. Digital twins technology enabled personalized treatment simulations, while the integration of the Internet of Medical Things provided comprehensive patient and environmental surveillance. Implementation challenges were systematically addressed through phased deployment strategies, staff training programs, and regulatory compliance frameworks. Conclusions: The Healthcare 5.0-enabled LPMDC framework provides the first comprehensive theoretical foundation for systematic AI integration in critical care while preserving human oversight and clinical safety. The cyclical five-phase architecture enables processing beyond traditional cognitive limits through continuous feedback loops and system optimization. Clinical validation demonstrates measurable improvements in patient outcomes, operational efficiency, and clinician satisfaction. Future developments incorporating quantum computing, federated learning, and explainable AI technologies offer additional advancement opportunities for next-generation critical care systems. Full article
(This article belongs to the Section Artificial Intelligence in Healthcare)
Show Figures

Figure 1

21 pages, 2975 KB  
Article
ARGUS: An Autonomous Robotic Guard System for Uncovering Security Threats in Cyber-Physical Environments
by Edi Marian Timofte, Mihai Dimian, Alin Dan Potorac, Doru Balan, Daniel-Florin Hrițcan, Marcel Pușcașu and Ovidiu Chiraș
J. Cybersecur. Priv. 2025, 5(4), 78; https://doi.org/10.3390/jcp5040078 - 1 Oct 2025
Viewed by 1521
Abstract
Cyber-physical infrastructures such as hospitals and smart campuses face hybrid threats that target both digital and physical domains. Traditional security solutions separate surveillance from network monitoring, leaving blind spots when attackers combine these vectors. This paper introduces ARGUS, an autonomous robotic platform designed [...] Read more.
Cyber-physical infrastructures such as hospitals and smart campuses face hybrid threats that target both digital and physical domains. Traditional security solutions separate surveillance from network monitoring, leaving blind spots when attackers combine these vectors. This paper introduces ARGUS, an autonomous robotic platform designed to close this gap by correlating cyber and physical anomalies in real time. ARGUS integrates computer vision for facial and weapon detection with intrusion detection systems (Snort, Suricata) for monitoring malicious network activity. Operating through an edge-first microservice architecture, it ensures low latency and resilience without reliance on cloud services. Our evaluation covered five scenarios—access control, unauthorized entry, weapon detection, port scanning, and denial-of-service attacks—with each repeated ten times under varied conditions such as low light, occlusion, and crowding. Results show face recognition accuracy of 92.7% (500 samples), weapon detection accuracy of 89.3% (450 samples), and intrusion detection latency below one second, with minimal false positives. Audio analysis of high-risk sounds further enhanced situational awareness. Beyond performance, ARGUS addresses GDPR and ISO 27001 compliance and anticipates adversarial robustness. By unifying cyber and physical detection, ARGUS advances beyond state-of-the-art patrol robots, delivering comprehensive situational awareness and a practical path toward resilient, ethical robotic security. Full article
(This article belongs to the Special Issue Cybersecurity Risk Prediction, Assessment and Management)
Show Figures

Figure 1

6 pages, 220 KB  
Article
Evaluating the Impact of Newborn Screening for Cystic Fibrosis in Portugal: A Decade of Insights and Outcomes
by Bernardo Camacho, Luísa Pereira, Raquel Bragança, Susana Castanhinha, Raquel Penteado, Teresa R. Silva, Pedro Miragaia, Sónia Silva, Ana L. Cardoso, Telma Barbosa, Cristina Freitas, Juan Gonçalves, Ana Marcão, Laura Vilarinho, Celeste Barreto and Carolina Constant
Int. J. Neonatal Screen. 2025, 11(3), 69; https://doi.org/10.3390/ijns11030069 - 27 Aug 2025
Viewed by 1189
Abstract
The implementation of newborn screening (NBS) has revolutionized the diagnostic landscape of cystic fibrosis (CF). In Portugal, NBS was initiated in October 2013 through a pilot study and was subsequently fully integrated into a nationwide program by December 2018. Infants with positive screening [...] Read more.
The implementation of newborn screening (NBS) has revolutionized the diagnostic landscape of cystic fibrosis (CF). In Portugal, NBS was initiated in October 2013 through a pilot study and was subsequently fully integrated into a nationwide program by December 2018. Infants with positive screening results are referred to a specialized CF reference center for diagnostic confirmation, employing Sweat Chloride Testing (SCT) and genetic testing for CFTR variants. We aimed to analyze infants with a positive CF screening and determine the false positive and false negative rates, as well as to calculate the positive predictive value and sensitivity of our NBS program. A retrospective nationwide analysis was conducted on infants with a positive NBS for CF between October 2013 and February 2023. Two hundred and forty infants were referred from the NBS program; 74 (30.8%) were confirmed to have CF through SCT and genetic testing. Sensitivity was 93.2%, and the positive predictive value (PPV) was 30.8%. In addition, 48.5% were homozygous for F508del variants, and 87.8% had at least one F508del variant. Guidelines set forth by the European Cystic Fibrosis Society advise NBS programs to achieve a minimum PPV of 30% and a minimum sensitivity of 95%. Our report demonstrated good compliance with these recommendations. Full article
22 pages, 1908 KB  
Article
AI-Blockchain Integration for Real-Time Cybersecurity: System Design and Evaluation
by Sam Goundar and Iqbal Gondal
J. Cybersecur. Priv. 2025, 5(3), 59; https://doi.org/10.3390/jcp5030059 - 14 Aug 2025
Viewed by 4732
Abstract
This paper proposes and evaluates a novel real-time cybersecurity framework integrating artificial intelligence (AI) and blockchain technology to enhance the detection and auditability of cyber threats. Traditional cybersecurity approaches often lack transparency and robustness in logging and verifying AI-generated decisions, hindering forensic investigations [...] Read more.
This paper proposes and evaluates a novel real-time cybersecurity framework integrating artificial intelligence (AI) and blockchain technology to enhance the detection and auditability of cyber threats. Traditional cybersecurity approaches often lack transparency and robustness in logging and verifying AI-generated decisions, hindering forensic investigations and regulatory compliance. To address these challenges, we developed an integrated solution combining a convolutional neural network (CNN)-based anomaly detection module with a permissioned Ethereum blockchain to securely log and immutably store AI-generated alerts and relevant metadata. The proposed system employs smart contracts to automatically validate AI alerts and ensure data integrity and transparency, significantly enhancing auditability and forensic analysis capabilities. To rigorously test and validate our solution, we conducted comprehensive experiments using the CICIDS2017 dataset and evaluated the system’s detection accuracy, precision, recall, and real-time responsiveness. Additionally, we performed penetration testing and security assessments to verify system resilience against common cybersecurity threats. Results demonstrate that our AI-blockchain integrated solution achieves superior detection performance while ensuring real-time logging, transparency, and auditability. The integration significantly strengthens system robustness, reduces false positives, and provides clear benefits for cybersecurity management, especially in regulated environments. This paper concludes by outlining potential avenues for future research, particularly extending blockchain scalability, privacy enhancements, and optimizing performance for high-throughput cybersecurity applications. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1

19 pages, 929 KB  
Article
Online Banking Fraud Detection Model: Decentralized Machine Learning Framework to Enhance Effectiveness and Compliance with Data Privacy Regulations
by Hisham AbouGrad and Lakshmi Sankuru
Mathematics 2025, 13(13), 2110; https://doi.org/10.3390/math13132110 - 27 Jun 2025
Cited by 1 | Viewed by 6330
Abstract
In such a dynamic and increasingly digitalized financial sector, many sophisticated fraudulent and cybercrime activities continue to challenge conventional detection systems. This research study explores a decentralized anomaly detection framework using deep autoencoders, designed to meet the dual imperatives of fraud detection effectiveness [...] Read more.
In such a dynamic and increasingly digitalized financial sector, many sophisticated fraudulent and cybercrime activities continue to challenge conventional detection systems. This research study explores a decentralized anomaly detection framework using deep autoencoders, designed to meet the dual imperatives of fraud detection effectiveness and user data privacy. Instead of relying on centralized aggregation or data sharing, the proposed model simulates distributed training across multiple financial nodes, with each institution processing data locally and independently. The framework is evaluated using two real-world datasets, the Credit Card Fraud dataset and the NeurIPS 2022 Bank Account Fraud dataset. The research methodology applied robust preprocessing, the implementation of a compact autoencoder architecture, and a threshold-based anomaly detection strategy. Evaluation metrics, such as confusion matrices, receiver operating characteristic (ROC) curves, precision–recall (PR) curves, and reconstruction error distributions, are used to assess the model’s performance. Also, a threshold sensitivity analysis has been applied to explore detection trade-offs at varying levels of strictness. Although the model’s recall remains modest due to class imbalance, it demonstrates strong precision at higher thresholds, which demonstrates its utility in minimizing false positives. Overall, this research study is a practical and privacy-conscious approach to fraud detection that aligns with the operational realities of financial institutions and regulatory compliance toward scalability, privacy preservation, and interpretable fraud detection solutions suitable for real-world financial environments. Full article
(This article belongs to the Special Issue New Insights in Machine Learning (ML) and Deep Neural Networks)
Show Figures

Figure 1

27 pages, 22501 KB  
Article
Computer Vision-Based Safety Monitoring of Mobile Scaffolding Integrating Depth Sensors
by Muhammad Sibtain Abbas, Rahat Hussain, Syed Farhan Alam Zaidi, Doyeop Lee and Chansik Park
Buildings 2025, 15(13), 2147; https://doi.org/10.3390/buildings15132147 - 20 Jun 2025
Cited by 5 | Viewed by 1883
Abstract
Mobile scaffolding is essential in construction but presents significant safety risks, particularly falls from height (FFH) due to improper use and insufficient monitoring. While prior research has identified hazards, it often lacks robust, actionable solutions, especially regarding the comprehensive analysis of worker behaviors [...] Read more.
Mobile scaffolding is essential in construction but presents significant safety risks, particularly falls from height (FFH) due to improper use and insufficient monitoring. While prior research has identified hazards, it often lacks robust, actionable solutions, especially regarding the comprehensive analysis of worker behaviors and the spatial context. This study proposed a computer vision-based safety monitoring system that leverages depth cameras for accurate spatial assessments and incorporates temporal conditions to reduce false alarms. The proposed system extends object detection algorithms with mathematical logic derived from safety rules to classify four key unsafe conditions related to safety helmet use, guardrail and outrigger presence, and worker overcrowding on mobile scaffolds. A diverse dataset from multiple sources enhances the model’s applicability to real-world scenarios, while a status trigger module verifies worker behavior over a 3 s window, minimizing detection errors. The experimental results demonstrate high precision (0.95), recall (0.97), F1-score (0.96), and accuracy (0.95) for safe behaviors, with similarly strong metrics for unsafe behaviors. The qualitative analysis further confirms substantial improvements in worker position detection and safety compliance using 3D data over 2D approaches. These findings highlight the effectiveness of the proposed system in improving mobile scaffolding safety, addressing critical research gaps, and advancing construction industry safety standards. Full article
Show Figures

Figure 1

22 pages, 6809 KB  
Article
Relationship-Based Ambient Detection for Concrete Pouring Verification: Improving Detection Accuracy in Complex Construction Environments
by Seungwon Yang and Hyunsoo Kim
Appl. Sci. 2025, 15(12), 6499; https://doi.org/10.3390/app15126499 - 9 Jun 2025
Viewed by 818
Abstract
Efficient monitoring of concrete pouring operations is critical for ensuring compliance with construction regulations and maintaining structural quality. However, traditional monitoring methods face limitations such as overlapping objects, environmental similarities, and detection errors caused by ambiguous boundaries. This study proposes an Ambient Detection-based [...] Read more.
Efficient monitoring of concrete pouring operations is critical for ensuring compliance with construction regulations and maintaining structural quality. However, traditional monitoring methods face limitations such as overlapping objects, environmental similarities, and detection errors caused by ambiguous boundaries. This study proposes an Ambient Detection-based Monitoring Framework that enhances object detection by incorporating contextual relationships between objects in complex construction environments. The framework employs the You Only Look Once version 11 (YOLOv11) algorithm, addressing issues of boundary ambiguity and misrecognition through relational analysis. Key components including Distance Relationship (DR), Attribute Relationship (AR), and Spatial Relationship (SR) allow the system to quantitatively evaluate contextual associations and improve detection accuracy. Experimental validation using 232 test images demonstrated a 12.07% improvement in detection accuracy and a 71% reduction in false positives compared with baseline YOLOv11. By automating the monitoring process, the proposed framework not only improves efficiency but also enhances construction quality, demonstrating its adaptability to diverse construction scenarios. Full article
Show Figures

Figure 1

Back to TopTop