Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (526)

Search Parameters:
Keywords = location privacy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 662 KB  
Article
Machine Learning-Based Sentiment Analysis of Glamping Reviews in South Korea
by Md Rokibul Hasan, Bristy Akter, Valentierrano Rezka Rizaldin, Narariya Dita Handani and Rianmahardhika Sahid Budiharseno
Tour. Hosp. 2026, 7(5), 124; https://doi.org/10.3390/tourhosp7050124 - 30 Apr 2026
Abstract
Glamping tourism has expanded rapidly as travelers increasingly seek nature-based experiences combined with comfort and privacy, particularly in the post-COVID-19 period. Online reviews provide a valuable source of insight into how guests perceive such experiential accommodation, yet large-scale, data-driven analyses of glamping sentiment [...] Read more.
Glamping tourism has expanded rapidly as travelers increasingly seek nature-based experiences combined with comfort and privacy, particularly in the post-COVID-19 period. Online reviews provide a valuable source of insight into how guests perceive such experiential accommodation, yet large-scale, data-driven analyses of glamping sentiment remain limited. This study applies machine-learning techniques to classify customer sentiment expressed in online reviews of glamping sites in South Korea. A total of 3233 reviews were collected from ten leading glamping locations on Naver Map, cleaned, and translated from Korean to English. Sentiment labels (negative, neutral, and positive) were generated using VADER (Valence Aware Dictionary and sEntiment Reasoner), a lexicon-based sentiment scoring tool validated for short informal texts and the labeled corpus was subsequently used to train and evaluate six supervised classifiers. Six supervised classifiers—Naïve Bayes, k-Nearest Neighbors, Random Forest, Logistic Regression, Gradient Boosting, and Support Vector Machine (SVM)—were trained and evaluated through stratified ten-fold cross-validation using accuracy, AUC, F1-score, and Matthews Correlation Coefficient (MCC). Results indicate that SVM achieved the strongest overall discriminatory performance, particularly in identifying minority sentiment classes under substantial class imbalance. These findings suggest that automated sentiment classification holds practical potential for supporting evidence-based service monitoring and reputation management in glamping tourism, although further validation in operational settings is needed before deployment can be recommended. Full article
22 pages, 481 KB  
Article
PrivAgriVolt: Privacy-Preserving Shadow-Aware Vision for Crop Stress Diagnosis in Agrivoltaic Photovoltaic Systems
by Zuoming Yin, Yifei Zhang, Qiangqiang Lei and Fang Feng
Electronics 2026, 15(8), 1762; https://doi.org/10.3390/electronics15081762 - 21 Apr 2026
Viewed by 152
Abstract
Agrivoltaic systems co-locate photovoltaic (PV) arrays and crops, offering land-use efficiency and potential microclimate benefits, yet they introduce new challenges for computer-vision-based crop monitoring. PV structures produce strong, spatially varying shadows, specular reflections, and periodic occlusions that confound visual cues for diagnosing crop [...] Read more.
Agrivoltaic systems co-locate photovoltaic (PV) arrays and crops, offering land-use efficiency and potential microclimate benefits, yet they introduce new challenges for computer-vision-based crop monitoring. PV structures produce strong, spatially varying shadows, specular reflections, and periodic occlusions that confound visual cues for diagnosing crop diseases and abiotic stresses. Meanwhile, agrivoltaic deployments are often distributed across farms and operators, making centralized data collection impractical due to privacy, ownership, and regulatory concerns. This paper proposes PrivAgriVolt, a novel privacy-preserving learning framework for agrivoltaic crop issue recognition that explicitly models PV-induced illumination and enables collaborative training without sharing raw images. The core algorithm integrates (i) a PV-geometry-conditioned shadow normalization module that fuses estimated array layout and sun-angle priors into a shadow-aware appearance canonization network, reducing illumination-induced domain shift across times and sites; (ii) a federated contrastive stress learner that aligns stress semantics across farms via prototype-based contrastive objectives while remaining robust to heterogeneous sensors and crop stages; and (iii) an adaptive privacy layer that combines secure aggregation with budget-aware gradient perturbation and client-level clipping to provide formal privacy guarantees while preserving fine-grained diagnostic performance. Extensive experiments on real agricultural vision benchmarks and agrivoltaic shadow variants demonstrate that PrivAgriVolt improves stress recognition and segmentation under PV shading while maintaining strong privacy–utility trade-offs. Full article
(This article belongs to the Special Issue Deep/Machine Learning in Visual Recognition and Anomaly Detection)
Show Figures

Figure 1

35 pages, 2823 KB  
Article
FedCycle: An Improved Federated Learning Framework for Assessment Across Modalities and Domains
by Betul Dundar, Ebru Akcapinar Sezer, Feyza Yildirim Okay and Suat Ozdemir
Electronics 2026, 15(8), 1752; https://doi.org/10.3390/electronics15081752 - 21 Apr 2026
Viewed by 257
Abstract
Artificial Intelligence (AI) systems based on traditional Deep Learning (DL) are expected to play a leading role in the early detection of various diseases in healthcare applications. However, there are two major drawbacks of these systems: protecting patient privacy and obtaining sufficiently large, [...] Read more.
Artificial Intelligence (AI) systems based on traditional Deep Learning (DL) are expected to play a leading role in the early detection of various diseases in healthcare applications. However, there are two major drawbacks of these systems: protecting patient privacy and obtaining sufficiently large, high-quality datasets to train reliable models. In traditional DL, collecting data from different sources on a single central server increases system complexity and raises serious privacy and security concerns. Federated Learning (FL) makes it possible to train models locally at multiple data locations while collaboratively improving a global model without exposing raw data, making it a promising architectural solution for privacy preservation. Although previous studies have reported that FL can achieve performance comparable to centralized DL approaches, traditional FL approaches often struggle to maintain consistent performance across different settings. This limitation becomes more noticeable when heterogeneous data distributions, modalities, and domains are involved. In these situations, client drift, overfitting, and generalization capability of the global model arise as major challenges. Thus, this study presents FedCycle as an incremental improvement of the FedAvg algorithm. It modifies the aggregation frequency. It aims to overcome these drawbacks and make the global model more stable and efficient. The FedCycle eliminates centralized data collection, enhances data security, and effectively reduces client drift and overfitting by supporting model training across heterogeneous data distributions, modalities, and domains. The performance evaluation involves extensive experiments using various real-world breast cancer image datasets, namely BREAKHIS, ROBOFLOW, RSNA, BUSI, and BCFPP. The presented method is evaluated against both traditional DL and FL approaches using accuracy, precision, recall, F1-score, and AUC. The findings confirm that applying fine-tuning within FedCycle reduces overfitting during training. As a result, FedCycle achieves performance improvements of 7.75% and 4.65% in accuracy and F1-score on the RSNA and BCFPP datasets compared to traditional DL approaches, while also providing an average improvement of approximately 1.5% in accuracy and F1-score across BREAKHIS, ROBOFLOW, and BUSI datasets compared to FedAvg. Full article
(This article belongs to the Special Issue Federated Learning and Its Application)
Show Figures

Figure 1

16 pages, 7078 KB  
Article
FPGA Implementation of a Radar-Based Fall Detection System Using Binarized Convolutional Neural Networks
by Hyeongwon Cho, Soongyu Kang and Yunho Jung
Sensors 2026, 26(8), 2469; https://doi.org/10.3390/s26082469 - 17 Apr 2026
Viewed by 265
Abstract
As the number of elderly individuals living alone increases, the risk of fall-related accidents correspondingly rises, underscoring the need for rapid fall detection systems. Because falls are difficult to predict in terms of location, detection systems must be deployed in a distributed manner, [...] Read more.
As the number of elderly individuals living alone increases, the risk of fall-related accidents correspondingly rises, underscoring the need for rapid fall detection systems. Because falls are difficult to predict in terms of location, detection systems must be deployed in a distributed manner, which in turn requires compact and low-power implementations. Unlike camera sensors, radar sensors do not raise privacy concerns and are not limited by line-of-sight constraints. Moreover, compared with wearable sensors, radar enables continuous monitoring without user intervention. However, prior radar-based approaches incur high computational complexity, leading to increased power consumption and larger hardware area, thereby necessitating efficient hardware design. This paper proposes a lightweight fall detection system based on continuous-wave (CW) radar and a binarized convolutional neural network (BCNN). Radar signals are preprocessed using short-time Fourier transform (STFT) to generate binary spectrograms, which are then fed into a BCNN-based classification network. The proposed system performs binary classification of five fall activities and seven non-fall activities with an accuracy of 96.1%. The preprocessing module and classification network were implemented as hardware accelerators and integrated with a microprocessor in a system-on-chip (SoC) architecture on a field-programmable gate array (FPGA). Compared with the software implementation, the proposed hardware achieved speedups of 387.5× and 86.7× for the preprocessing and classification modules, respectively. Furthermore, the overall system processing time was 2.58 ms, corresponding to an 89.5× speedup over the software baseline. Full article
(This article belongs to the Special Issue Sensor-Based Movement Signal Acquisition, Processing and Analysis)
Show Figures

Figure 1

20 pages, 2952 KB  
Article
Physics-Informed Smart Grid Dispatch Under Renewable Uncertainty: Dynamic Graph Learning, Privacy-Aware Multi-Agent Reinforcement Learning, and Causal Intervention Analysis
by Yue Liu, Qinglin Cheng, Yuchun Li, Jinwei Yang, Shaosong Zhao and Zhengsong Huang
Processes 2026, 14(8), 1274; https://doi.org/10.3390/pr14081274 - 16 Apr 2026
Viewed by 320
Abstract
High-penetration renewable energy significantly increases uncertainty, dynamic network coupling, and the need for secure and coordinated smart-grid dispatch. To address the limitations of conventional forecasting-based and static graph-based methods, this paper proposes a unified dispatch framework that integrates topology-informed dynamic graph learning, privacy-aware [...] Read more.
High-penetration renewable energy significantly increases uncertainty, dynamic network coupling, and the need for secure and coordinated smart-grid dispatch. To address the limitations of conventional forecasting-based and static graph-based methods, this paper proposes a unified dispatch framework that integrates topology-informed dynamic graph learning, privacy-aware multi-agent symbiotic reinforcement learning, and structural causal intervention analysis. The dispatch problem is formulated as a constrained partially observable stochastic game, in which multiple agents coordinate generation adjustment, reserve allocation, and congestion-aware corrective actions under engineering constraints. A physics-informed dynamic graph convolutional module captures both fixed physical topology and stress-dependent operational couplings, while a KL-regularized multi-agent reinforcement learning scheme improves cooperative task allocation under renewable fluctuations. Federated optimization with Rényi differential privacy is introduced to protect sensitive local operational information during training. In addition, a structural causal module provides intervention-based interpretation of how wind variation, load escalation, and line stress affect dispatch cost, congestion risk, and renewable curtailment. Experiments on a public-trace-driven benchmark based on a modified IEEE 30-bus system show that the proposed method achieves the best overall performance among the compared baselines, reducing dispatch-cost RMSE to 3.82, locational-price MAE to 2.95, renewable curtailment to 4.8%, and the constraint-violation rate to 0.30%. Overall, the framework shows favorable performance on the test benchmark, provides post hoc intervention-based interpretation of dispatch outcomes, and is evaluated under a reproducible benchmark construction and assessment protocol. Full article
(This article belongs to the Section Energy Systems)
Show Figures

Figure 1

30 pages, 1474 KB  
Review
Dynamic Virtual Power Plants: Resource Coordination for Measured Inertia and Fast Frequency Services
by Yitong Wang, Yutian Huang, Gang Lei, Allen Wang and Jianguo Zhu
Appl. Sci. 2026, 16(8), 3731; https://doi.org/10.3390/app16083731 - 10 Apr 2026
Viewed by 263
Abstract
This paper reviews recent work on dynamic virtual power plants (DVPPs) using an Energy–Information–Market framework. It addresses the important problem of how DVPPs can support low-inertia power system operation and feeder-level stability under high renewable penetration. First, system-level studies on low-inertia operation and [...] Read more.
This paper reviews recent work on dynamic virtual power plants (DVPPs) using an Energy–Information–Market framework. It addresses the important problem of how DVPPs can support low-inertia power system operation and feeder-level stability under high renewable penetration. First, system-level studies on low-inertia operation and frequency control are used to frame quantitative requirements on rate of change of frequency, nadir, and quasi-steady-state limits. Second, energy-layer models are surveyed, including participation-factor-based DVPP controllers, grid-forming architectures, model-free frequency regulation, and robust frequency-constrained scheduling for allocating virtual inertia and fast frequency response (FFR) across distributed energy resource fleets. Third, information-layer and market-layer models are reviewed, covering stochastic and robust bidding, distribution locational marginal price-based clearing, peer-to-peer and community markets, privacy-preserving coordination, and emerging governance and cybersecurity schemes for DVPP participation. Across these strands, much of the literature remains centred on steady-state active and reactive power dispatch, with dynamic security enforced as constraints rather than formulated as verifiable and tradable services. This review identifies gaps in dynamic metrics and benchmarks, forecasting of available inertia and FFR capacity, market-physics co-design, multi-aggregator interaction, and experimentally validated DVPP implementations. These findings suggest that DVPPs can “sell stability” at the feeder level only through co-designed control, information, and market mechanisms and outline a research roadmap for this purpose. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

31 pages, 3398 KB  
Article
Multimodal Smart-Skin for Real-Time Sitting Posture Recognition with Cross-Session Validation
by Giva Andriana Mutiara, Muhammad Rizqy Alfarisi, Paramita Mayadewi, Lisda Meisaroh and Periyadi
Multimodal Technol. Interact. 2026, 10(4), 39; https://doi.org/10.3390/mti10040039 - 9 Apr 2026
Viewed by 317
Abstract
Prolonged sitting with poor posture is associated with musculoskeletal disorders, reduced productivity, and long-term health risks. Many existing posture monitoring systems predominantly rely on single-modality sensing, such as pressure or vision-based approaches, limiting their ability to capture both static alignment and dynamic micro-movements. [...] Read more.
Prolonged sitting with poor posture is associated with musculoskeletal disorders, reduced productivity, and long-term health risks. Many existing posture monitoring systems predominantly rely on single-modality sensing, such as pressure or vision-based approaches, limiting their ability to capture both static alignment and dynamic micro-movements. This study proposes a multimodal smart-skin system integrating pressure, temperature, and vibration sensors for sitting posture recognition. A total of 42 sensors distributed across 14 anatomical locations were deployed, generating 15,037 samples collected over three independent sessions to evaluate cross-session temporal generalization across nine posture classes under controlled experimental conditions. Two deep learning architectures—Temporal Convolutional Networks with Attention (TCN + Attn) and Convolutional Neural Network–Long Short-Term Memory (CNN − LSTM)—were compared under Leave-One-Session-Out (LOSO) cross-validation. TCN + Attn achieved 85.23% LOSO accuracy, outperforming CNN − LSTM by 2.56 percentage points while reducing training time by 36.7% and inference latency by 33.9%. Ablation analysis revealed that temperature sensing was the most discriminative unimodal modality (71.5% accuracy), and full multimodal fusion improved LOSO accuracy by 22.93% compared to pressure-only configurations. These results demonstrate the feasibility of multimodal smart-skin sensing combined with temporal convolutional modeling for cross-session posture recognition and indicate potential for efficient real-time, privacy-preserving ergonomic monitoring. This study should be interpreted as a controlled, single-subject proof-of-concept, and further validation in multi-subject and real-world environments is required to establish broader generalizability. Full article
Show Figures

Figure 1

23 pages, 8076 KB  
Article
Task Offloading of Parked Vehicles Edge Computing Based on Differential Privacy Hotstuff
by Guoling Liang, Zhaoyu Su, Chunhai Li, Mingfeng Chen and Feng Zhao
Information 2026, 17(4), 339; https://doi.org/10.3390/info17040339 - 1 Apr 2026
Viewed by 327
Abstract
The integration of blockchain into parked vehicle edge computing (PVEC) has emerged as a promising approach to mitigate the inherent trust challenges in distributed and untrusted computing environments. However, during task offloading and consensus, vehicles are vulnerable to location information disclosure, leading to [...] Read more.
The integration of blockchain into parked vehicle edge computing (PVEC) has emerged as a promising approach to mitigate the inherent trust challenges in distributed and untrusted computing environments. However, during task offloading and consensus, vehicles are vulnerable to location information disclosure, leading to privacy leakage. To address this problem, we propose a location differential privacy-enabled blockchain PVEC (DBPVEC) framework to protect location information during offloading and consensus. Specifically, we design a location differential privacy mechanism based on the Laplace mechanism and theoretically prove that it satisfies ε-differential privacy. This mechanism perturbs vehicles’ locations, and a privacy-preserving offloading strategy is designed to enhance the Hotstuff consensus and protect location privacy in edge computing. Subsequently, we formulate a joint optimization problem, considering system energy consumption, latency, and privacy strength. To solve it, we design a two-layer deep reinforcement learning (DRL) algorithm, with a Deep Q-Network (DQN) as the upper layer and a Deep Deterministic Policy Gradient (DDPG) as the lower layer, to determine the optimal offloading strategy. The experimental results demonstrate that our scheme achieves significant reductions compared to the two baseline methods: the total cost decreases by 68.31% and 63.25%, energy consumption by 9.96% and 16.27%, and delay by 31.46% and 18.07%, respectively. Moreover, it effectively preserves vehicle location privacy during task offloading and consensus while maintaining favorable performance in energy consumption and latency. Full article
(This article belongs to the Section Information and Communications Technology)
Show Figures

Figure 1

51 pages, 1932 KB  
Review
Federated Retrieval-Augmented Generation for Cybersecurity in Resource-Constrained IoT and Edge Environments: A Deployment-Oriented Scoping Review
by Hangyu He, Xin Yuan, Kai Wu and Wei Ni
Electronics 2026, 15(7), 1409; https://doi.org/10.3390/electronics15071409 - 27 Mar 2026
Viewed by 756
Abstract
Cybersecurity operations in IoT and edge environments require fast, evidence-grounded decisions under strict resource and trust constraints. While large language models can support triage and incident analysis, their parametric knowledge may be outdated and prone to hallucination. Retrieval-augmented generation (RAG) improves grounding by [...] Read more.
Cybersecurity operations in IoT and edge environments require fast, evidence-grounded decisions under strict resource and trust constraints. While large language models can support triage and incident analysis, their parametric knowledge may be outdated and prone to hallucination. Retrieval-augmented generation (RAG) improves grounding by conditioning responses on retrieved evidence, but also introduces new risks such as knowledge-base poisoning, indirect prompt injection, and embedding leakage. Federated learning enables collaborative adaptation without centralizing sensitive data, motivating federated RAG (FedRAG) architectures for distributed cybersecurity deployments. This study presents a deployment-oriented scoping review of FedRAG for cybersecurity. The review follows PRISMA-ScR reporting guidance and synthesizes 82 studies published between 2020 and 2026, identified through keyword search and citation snowballing over OpenAlex, arXiv, and Crossref. We develop a taxonomy that clarifies the components of federated systems, deployment locations, trust boundaries, and protected assets. We further map the combined RAG+FL attack surface, summarize practical defenses and system patterns, and distill actionable guidance for secure, privacy-preserving, and efficient FedRAG deployment in real-world IoT and edge scenarios. Our synthesis highlights recurring trade-offs among robustness, privacy, latency, communication overhead, and maintainability, and identifies open research priorities in benchmark design, governance mechanisms, and cross-silo evaluation protocols for practical deployment. Full article
(This article belongs to the Special Issue Novel Approaches for Deep Learning in Cybersecurity)
Show Figures

Figure 1

18 pages, 6234 KB  
Article
From Provenance Statements to Antiquities Trafficking Networks: A Privacy-Aware Workflow Using Repatriation and OSINT Data
by Michela Herbert, Katherine Davidson and Pier Matteo Barone
Heritage 2026, 9(4), 126; https://doi.org/10.3390/heritage9040126 - 25 Mar 2026
Viewed by 1300
Abstract
It is difficult to capture the realities of the illicit antiquities market because of the lack of accessible, unsiloed data from underground trade networks. Despite existing literature on social network analyses and machine-learning experiments with antiquities data, there is a gap in simple [...] Read more.
It is difficult to capture the realities of the illicit antiquities market because of the lack of accessible, unsiloed data from underground trade networks. Despite existing literature on social network analyses and machine-learning experiments with antiquities data, there is a gap in simple open-source methodologies accessible to the non-academic public. By using a provenance-based analysis, we present a case study of the Italian antiquities trafficking networks that more fully captures their complexity. This study culls provenance data from repatriated antiquities gathered in the Museum of Looted Antiquities’ dataset to create a network visualization for analysis. Using open-source provenance and repatriation data from 1950 to July 2025, we built a dataset of 233 repatriation events with 15.858 objects to produce a network that reveals central actors, roles, and locations while staying within ethical privacy limits. This study captures large portions of the trafficking network by using accessible data and produces a reproducible, ethically framed workflow. Full article
(This article belongs to the Section Cultural Heritage)
Show Figures

Figure 1

28 pages, 901 KB  
Article
PrivLocAuth: Enabling Location-Aware Cross-Domain UAV Authentication with Zero-Knowledge Location Privacy
by Shayesta Naziri, Xu Wang, Jian Xu, Christy Jie Liang and Guangsheng Yu
Electronics 2026, 15(6), 1243; https://doi.org/10.3390/electronics15061243 - 17 Mar 2026
Viewed by 411
Abstract
Secure cross-domain UAV authentication is challenging because identity verification alone is insufficient to guarantee safe operation. In many UAV applications, it is equally critical to verify that a UAV is currently located within an authorized geographic region. Existing approaches often expose precise GPS [...] Read more.
Secure cross-domain UAV authentication is challenging because identity verification alone is insufficient to guarantee safe operation. In many UAV applications, it is equally critical to verify that a UAV is currently located within an authorized geographic region. Existing approaches often expose precise GPS coordinates, rely on static identifiers that enable tracking, or fail to guarantee the freshness and authenticity of location evidence. These weaknesses allow replay, location spoofing, and trajectory inference attacks, especially in multi-domain environments. To address these limitations, we propose PrivLocAuth, a zero-knowledge-based cross-domain UAV authentication protocol that enforces geofence restrictions without revealing actual locations. In PrivLocAuth, UAVs encode their current coordinates into fresh Pedersen commitments, which are attested by the home Local Domain Server (LDS) using short-lived Schnorr signatures. Based on these attested commitments, UAVs generate Bulletproof range proofs to demonstrate compliance with cross-domain server-defined geofences. This design ensures that UAVs operate within authorized airspace while preserving strong location privacy. PrivLocAuth further incorporates a lightweight elliptic curve cryptography (ECC) and Schnorr signature-based credential framework that enables unlinkable authentication across-domains, preventing session correlation and identity tracking. Formal security analysis demonstrates resistance to impersonation, replay, geofence-bypass, and linkage attacks. Experimental evaluation shows low computational latency and minimal communication overhead, confirming the protocol’s suitability for resource-constrained UAV platforms operating in dynamic cross-domain environments. Full article
(This article belongs to the Special Issue Security and Privacy in Networks and Multimedia, 2nd Edition)
Show Figures

Figure 1

43 pages, 6922 KB  
Article
Multi-Flow Hybrid Task Offloading Scheme for Multimodal High-Load V2I Services
by Weiqi Luo, Yaqi Hu, Maoqiang Wu, Yijie Zhou, Rong Yu and Junbin Qin
Electronics 2026, 15(6), 1229; https://doi.org/10.3390/electronics15061229 - 16 Mar 2026
Viewed by 459
Abstract
In the Internet of Vehicles (IoV), connected vehicles generate high-load perception tasks with large-scale and multimodal sensitive data, imposing strict requirements on latency, computing, and privacy. Existing solutions still suffer from high task service latency and privacy risks. To address these issues, this [...] Read more.
In the Internet of Vehicles (IoV), connected vehicles generate high-load perception tasks with large-scale and multimodal sensitive data, imposing strict requirements on latency, computing, and privacy. Existing solutions still suffer from high task service latency and privacy risks. To address these issues, this paper proposes an integrated framework that jointly considers multi-flow task offloading, adaptive privacy preservation, and latency-aware resource incentive mechanism. Specifically, we propose a Location-Aware and Trust-based (LA-Trust) dual-node task offloading algorithm based on deep reinforcement learning (DRL), which treats pre-partitioned subtasks as multiple parallel flows and enables flow-level collaborative offloading optimization across neighboring nodes, allows subtask data uploading and processing to proceed concurrently, and incorporates node security into decision making. To further enhance privacy protection, a Distribution-Aware Local Differential Privacy (DA-LDP) algorithm is designed to adaptively inject artificial noise according to data heterogeneity, balancing privacy protection and task execution accuracy. In addition, a Delay-Cost Reverse Auction (DC-RA) algorithm is proposed to further reduce latency by introducing wireless channel modeling between idle vehicles and edge nodes into the incentive mechanism. Experimental results show that the proposed framework improves task execution accuracy by 38% and reduces offloading cost, delay, incentive cost, and auction communication latency by 64.41%, 64.64%, 19%, and 44%, respectively, while more than 60% of tasks are offloaded to high-trust nodes. Full article
Show Figures

Figure 1

21 pages, 8692 KB  
Article
Occupant Behavior Sensing and Environmental Safety Monitoring in Age-Friendly Residential Buildings Using Distributed Optical Fiber Sensing
by Yueheng Tong, Yi Lei, Yaolong Wang, Rong Chen and Tiantian Huang
Buildings 2026, 16(6), 1145; https://doi.org/10.3390/buildings16061145 - 13 Mar 2026
Viewed by 302
Abstract
Under the global trend of population aging, providing a safe and reliable living environment for the elderly who live at home has become a major social issue. This study reports a monitoring technology for elderly-friendly residential buildings based on distributed acoustic sensing (DAS) [...] Read more.
Under the global trend of population aging, providing a safe and reliable living environment for the elderly who live at home has become a major social issue. This study reports a monitoring technology for elderly-friendly residential buildings based on distributed acoustic sensing (DAS) and distributed temperature sensing (DTS), which is used to monitor and identify the physical behaviors of residents and temperature changes at different locations in the space. The results show that the distributed acoustic sensing (DAS) system can initially identify typical behavioral states such as walking, squatting, and falling. The fiber DTS technology can not only monitor the temperature distribution at different locations indoors, but also be used for the monitoring and early warning of local fires in different areas of the room. The sensing probes of the monitoring system proposed in this paper are linear optical cables, which have the advantages of easy installation, strong anti-interference ability, intrinsic explosion-proof, less likely to leak residents’ privacy, all-weather operation, precise event location, and low cost for large-scale distributed measurement systems. By integrating the sensing optical cables, fiber signal processing systems, and application software introduced in this paper, an intelligent management and early warning platform for elderly-friendly residential buildings can be established, providing a new solution for remote supervision of the living safety of the elderly. Full article
(This article belongs to the Section Building Energy, Physics, Environment, and Systems)
Show Figures

Figure 1

23 pages, 760 KB  
Article
Trajectory Data Publishing Scheme Based on Transformer Decoder and Differential Privacy
by Haiyong Wang and Wei Huang
ISPRS Int. J. Geo-Inf. 2026, 15(3), 106; https://doi.org/10.3390/ijgi15030106 - 3 Mar 2026
Viewed by 439
Abstract
The proliferation of Location-Based Services (LBSs) has generated vast trajectory datasets that offer immense analytical value but pose critical privacy risks. Achieving an optimal balance between data utility and privacy preservation remains a challenge, a difficulty compounded by the limitations of existing methods [...] Read more.
The proliferation of Location-Based Services (LBSs) has generated vast trajectory datasets that offer immense analytical value but pose critical privacy risks. Achieving an optimal balance between data utility and privacy preservation remains a challenge, a difficulty compounded by the limitations of existing methods in modeling complex, long-term spatiotemporal dependencies. To address this, this paper proposes a trajectory data publishing scheme combining a Transformer decoder with differential privacy. Unlike traditional single-layer approaches, the proposed method establishes a systematic generation–generalization framework. First, a Transformer decoder is integrated into a Generative Adversarial Network (GAN). This architecture mitigates the gradient vanishing issues common in RNN-based models, generating high-fidelity synthetic trajectories that capture long-range correlations while decoupling them from sensitive source data. Second, to provide rigorous privacy guarantees, a clustering-based generalization strategy is implemented, utilizing Exponential and Laplace mechanisms to ensure ϵ-differential privacy. Experiments on the Geolife and Foursquare NYC datasets demonstrate that the scheme significantly outperforms leading baselines, achieving a superior trade-off between privacy protection and data utility. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

19 pages, 2138 KB  
Article
A Trajectory Privacy Protection Scheme Based on the Replacement of Stay Points
by Wanqing Wu and Delong Li
Appl. Sci. 2026, 16(3), 1391; https://doi.org/10.3390/app16031391 - 29 Jan 2026
Viewed by 375
Abstract
Location-based services generate a large amount of location and trajectory data, which contain rich spatiotemporal and semantic information. Publishing these data without proper protection can seriously threaten users’ trajectory privacy. Existing trajectory privacy protection schemes generally fail to consider the dependency between a [...] Read more.
Location-based services generate a large amount of location and trajectory data, which contain rich spatiotemporal and semantic information. Publishing these data without proper protection can seriously threaten users’ trajectory privacy. Existing trajectory privacy protection schemes generally fail to consider the dependency between a stay point and its preceding location and also overlook the relationship between the semantic information of location and privacy. Moreover, they often suffer from issues such as over-protection. Therefore, this paper proposes a trajectory privacy protection scheme based on the replacement of stay points. First, a stay point extraction algorithm is proposed, which extracts users’ stay points by setting distance and time thresholds based on the principle of the sliding window. Then, this paper proposes a location perturbation algorithm based on the vector indistinguishability mechanism and introduces different protection strategies for ordinary stay points and long-duration stay points, respectively. Finally, the perturbed trajectory is adjusted by generating a certain number of location points near the replacement points to maintain the temporal continuity and integrity of the trajectory. The experimental results indicate that it is necessary to provide more meticulous protection for long-duration stay points. Compared with similar schemes, the proposed scheme in this paper achieves higher data utility while ensuring privacy. Full article
Show Figures

Figure 1

Back to TopTop