Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,969)

Search Parameters:
Keywords = privacy protection

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
46 pages, 3093 KiB  
Review
Security and Privacy in the Internet of Everything (IoE): A Review on Blockchain, Edge Computing, AI, and Quantum-Resilient Solutions
by Haluk Eren, Özgür Karaduman and Muharrem Tuncay Gençoğlu
Appl. Sci. 2025, 15(15), 8704; https://doi.org/10.3390/app15158704 (registering DOI) - 6 Aug 2025
Abstract
The IoE forms the foundation of the modern digital ecosystem by enabling seamless connectivity and data exchange among smart devices, sensors, and systems. However, the inherent nature of this structure, characterized by high heterogeneity, distribution, and resource constraints, renders traditional security approaches insufficient [...] Read more.
The IoE forms the foundation of the modern digital ecosystem by enabling seamless connectivity and data exchange among smart devices, sensors, and systems. However, the inherent nature of this structure, characterized by high heterogeneity, distribution, and resource constraints, renders traditional security approaches insufficient in areas such as data privacy, authentication, access control, and scalable protection. Moreover, centralized security systems face increasing fragility due to single points of failure, various AI-based attacks, including adversarial learning, model poisoning, and deepfakes, and the rising threat of quantum computers to encryption protocols. This study systematically examines the individual and integrated solution potentials of technologies such as Blockchain, Edge Computing, Artificial Intelligence, and Quantum-Resilient Cryptography within the scope of IoE security. Comparative analyses are provided based on metrics such as energy consumption, latency, computational load, and security level, while centralized and decentralized models are evaluated through a multi-layered security lens. In addition to the proposed multi-layered architecture, the study also structures solution methods and technology integrations specific to IoE environments. Classifications, architectural proposals, and the balance between performance and security are addressed from both theoretical and practical perspectives. Furthermore, a future vision is presented regarding federated learning-based privacy-preserving AI solutions, post-quantum digital signatures, and lightweight consensus algorithms. In this context, the study reveals existing vulnerabilities through an interdisciplinary approach and proposes a holistic framework for sustainable, scalable, and quantum-compatible IoE security. Full article
Show Figures

Figure 1

38 pages, 2332 KiB  
Article
Decision Tree Pruning with Privacy-Preserving Strategies
by Yee Jian Chew, Shih Yin Ooi, Ying Han Pang and Zheng You Lim
Electronics 2025, 14(15), 3139; https://doi.org/10.3390/electronics14153139 - 6 Aug 2025
Abstract
Machine learning techniques, particularly decision trees, have been extensively utilized in Network-based Intrusion Detection Systems (NIDSs) due to their transparent, rule-based structures that enable straightforward interpretation. However, this transparency presents privacy risks, as decision trees may inadvertently expose sensitive information such as network [...] Read more.
Machine learning techniques, particularly decision trees, have been extensively utilized in Network-based Intrusion Detection Systems (NIDSs) due to their transparent, rule-based structures that enable straightforward interpretation. However, this transparency presents privacy risks, as decision trees may inadvertently expose sensitive information such as network configurations or IP addresses. In our previous work, we introduced a sensitive pruning-based decision tree to mitigate these risks within a limited dataset and basic pruning framework. In this extended study, three privacy-preserving pruning strategies are proposed: standard sensitive pruning, which conceals specific sensitive attribute values; optimistic sensitive pruning, which further simplifies the decision tree when the sensitive splits are minimal; and pessimistic sensitive pruning, which aggressively removes entire subtrees to maximize privacy protection. The methods are implemented using the J48 (Weka C4.5 package) decision tree algorithm and are rigorously validated across three full-scale NIDS datasets: GureKDDCup, UNSW-NB15, and CIDDS-001. To ensure a realistic evaluation of time-dependent intrusion patterns, a rolling-origin resampling scheme is employed in place of conventional cross-validation. Additionally, IP address truncation and port bilateral classification are incorporated to further enhance privacy preservation. Experimental results demonstrate that the proposed pruning strategies effectively reduce the exposure of sensitive information, significantly simplify decision tree structures, and incur only minimal reductions in classification accuracy. These findings reaffirm that privacy protection can be successfully integrated into decision tree models without severely compromising detection performance. To further support the proposed pruning strategies, this study also includes a comprehensive review of decision tree post-pruning techniques. Full article
21 pages, 3733 KiB  
Article
DNO-RL: A Reinforcement-Learning-Based Approach to Dynamic Noise Optimization for Differential Privacy
by Guixin Wang, Xiangfei Liu, Yukun Zheng, Zeyu Zhang and Zhiming Cai
Electronics 2025, 14(15), 3122; https://doi.org/10.3390/electronics14153122 - 5 Aug 2025
Abstract
With the globalized deployment of cross-border vehicle location services and the trajectory data, which contain user identity information and geographically sensitive features, the variability in privacy regulations in different jurisdictions can further exacerbate the technical and compliance challenges of data privacy protection. Traditional [...] Read more.
With the globalized deployment of cross-border vehicle location services and the trajectory data, which contain user identity information and geographically sensitive features, the variability in privacy regulations in different jurisdictions can further exacerbate the technical and compliance challenges of data privacy protection. Traditional static differential privacy mechanisms struggle to accommodate spatiotemporal heterogeneity in dynamic scenarios because of the use of a fixed privacy budget parameter, leading to wasted privacy budgets or insufficient protection of sensitive regions. This study proposes a reinforcement-learning-based dynamic noise optimization method (DNO-RL) that dynamically adjusts the Laplacian noise scale by real-time sensing of vehicle density, region sensitivity, and the remaining privacy budget via a deep Q-network (DQN), with the aim of providing context-adaptive differential privacy protection for cross-border vehicle location services. Simulation experiments of cross-border scenarios based on the T-Drive dataset showed that DNO-RL reduced the average localization error by 28.3% and saved 17.9% of the privacy budget compared with the local differential privacy under the same privacy budget. This study provides a new paradigm for the dynamic privacy–utility balancing of cross-border vehicular networking services. Full article
Show Figures

Figure 1

23 pages, 3004 KiB  
Article
An Ensemble Learning for Automatic Stroke Lesion Segmentation Using Compressive Sensing and Multi-Resolution U-Net
by Mohammad Emami, Mohammad Ali Tinati, Javad Musevi Niya and Sebelan Danishvar
Biomimetics 2025, 10(8), 509; https://doi.org/10.3390/biomimetics10080509 - 4 Aug 2025
Abstract
A stroke is a critical medical condition and one of the leading causes of death among humans. Segmentation of the lesions of the brain in which the blood flow is impeded because of blood coagulation plays a vital role in drug prescription and [...] Read more.
A stroke is a critical medical condition and one of the leading causes of death among humans. Segmentation of the lesions of the brain in which the blood flow is impeded because of blood coagulation plays a vital role in drug prescription and medical diagnosis. Computed tomography (CT) scans play a crucial role in detecting abnormal tissue. There are several methods for segmenting medical images that utilize the main images without considering the patient’s privacy information. In this paper, a deep network is proposed that utilizes compressive sensing and ensemble learning to protect patient privacy and segment the dataset efficiently. The compressed version of the input CT images from the ISLES challenge 2018 dataset is applied to the ensemble part of the proposed network, which consists of two multi-resolution modified U-shaped networks. The evaluation metrics of accuracy, specificity, and dice coefficient are 92.43%, 91.3%, and 91.83%, respectively. The comparison to the state-of-the-art methods confirms the efficiency of the proposed compressive sensing-based ensemble net (CS-Ensemble Net). The compressive sensing part provides information privacy, and the parallel ensemble learning produces better results. Full article
Show Figures

Figure 1

17 pages, 462 KiB  
Article
Fingerprint-Based Secure Query Scheme for Databases over Symmetric Mirror Servers
by Yu Zhang, Rui Zhu, Yin Li and Wenjv Hu
Symmetry 2025, 17(8), 1227; https://doi.org/10.3390/sym17081227 - 4 Aug 2025
Viewed by 67
Abstract
The Karp and Rabin (KR) fingerprint is a special hash-like function widely utilized for efficient string matching. Recently, Sharma et al.leveraged its linear and symmetric properties to facilitate private database queries. However, their approach mainly protects encrypted or secret-shared databases rather than public [...] Read more.
The Karp and Rabin (KR) fingerprint is a special hash-like function widely utilized for efficient string matching. Recently, Sharma et al.leveraged its linear and symmetric properties to facilitate private database queries. However, their approach mainly protects encrypted or secret-shared databases rather than public databases, where only the query privacy is required. In this paper, we focus explicitly on privacy-preserving queries over public read-only databases. We propose a novel fingerprint-based keyword query scheme using the distributed point function (DPF), which effectively hides users’ data access patterns across two symmetric mirror servers. Moreover, we provide a rigorous analysis of the false positive probability inherent in fingerprinting and discuss strategies for its minimization. Our scheme achieves efficiency close to plaintext methods, significantly reducing deployment complexity. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

36 pages, 1010 KiB  
Article
SIBERIA: A Self-Sovereign Identity and Multi-Factor Authentication Framework for Industrial Access
by Daniel Paredes-García, José Álvaro Fernández-Carrasco, Jon Ander Medina López, Juan Camilo Vasquez-Correa, Imanol Jericó Yoldi, Santiago Andrés Moreno-Acevedo, Ander González-Docasal, Haritz Arzelus Irazusta, Aitor Álvarez Muniain and Yeray de Diego Loinaz
Appl. Sci. 2025, 15(15), 8589; https://doi.org/10.3390/app15158589 (registering DOI) - 2 Aug 2025
Viewed by 213
Abstract
The growing need for secure and privacy-preserving identity management in industrial environments has exposed the limitations of traditional, centralized authentication systems. In this context, SIBERIA was developed as a modular solution that empowers users to control their own digital identities, while ensuring robust [...] Read more.
The growing need for secure and privacy-preserving identity management in industrial environments has exposed the limitations of traditional, centralized authentication systems. In this context, SIBERIA was developed as a modular solution that empowers users to control their own digital identities, while ensuring robust protection of critical services. The system is designed in alignment with European standards and regulations, including EBSI, eIDAS 2.0, and the GDPR. SIBERIA integrates a Self-Sovereign Identity (SSI) framework with a decentralized blockchain-based infrastructure for the issuance and verification of Verifiable Credentials (VCs). It incorporates multi-factor authentication by combining a voice biometric module, enhanced with spoofing-aware techniques to detect synthetic or replayed audio, and a behavioral biometrics module that provides continuous authentication by monitoring user interaction patterns. The system enables secure and user-centric identity management in industrial contexts, ensuring high resistance to impersonation and credential theft while maintaining regulatory compliance. SIBERIA demonstrates that it is possible to achieve both strong security and user autonomy in digital identity systems by leveraging decentralized technologies and advanced biometric verification methods. Full article
(This article belongs to the Special Issue Blockchain and Distributed Systems)
Show Figures

Figure 1

27 pages, 2496 KiB  
Article
A Context-Aware Tourism Recommender System Using a Hybrid Method Combining Deep Learning and Ontology-Based Knowledge
by Marco Flórez, Eduardo Carrillo, Francisco Mendes and José Carreño
J. Theor. Appl. Electron. Commer. Res. 2025, 20(3), 194; https://doi.org/10.3390/jtaer20030194 - 2 Aug 2025
Viewed by 238
Abstract
The Santurbán paramo is a sensitive high-mountain ecosystem exposed to pressures from extractive and agricultural activities, as well as increasing tourism. In response, this study presents a context-aware recommendation system designed to support sustainable tourism through the integration of deep neural networks and [...] Read more.
The Santurbán paramo is a sensitive high-mountain ecosystem exposed to pressures from extractive and agricultural activities, as well as increasing tourism. In response, this study presents a context-aware recommendation system designed to support sustainable tourism through the integration of deep neural networks and ontology-based semantic modeling. The proposed system delivers personalized recommendations—such as activities, accommodations, and ecological routes—by processing user preferences, geolocation data, and contextual features, including cost and popularity. The architecture combines a trained TensorFlow Lite model with a domain ontology enriched with GeoSPARQL for geospatial reasoning. All inference operations are conducted locally on Android devices, supported by SQLite for offline data storage, which ensures functionality in connectivity-restricted environments and preserves user privacy. Additionally, the system employs geofencing to trigger real-time environmental notifications when users approach ecologically sensitive zones, promoting responsible behavior and biodiversity awareness. By incorporating structured semantic knowledge with adaptive machine learning, the system enables low-latency, personalized, and conservation-oriented recommendations. This approach contributes to the sustainable management of natural reserves by aligning individual tourism experiences with ecological protection objectives, particularly in remote areas like the Santurbán paramo. Full article
Show Figures

Figure 1

24 pages, 1380 KiB  
Article
Critical Smart Functions for Smart Living Based on User Perspectives
by Benjamin Botchway, Frank Ato Ghansah, David John Edwards, Ebenezer Kumi-Amoah and Joshua Amo-Larbi
Buildings 2025, 15(15), 2727; https://doi.org/10.3390/buildings15152727 - 1 Aug 2025
Viewed by 268
Abstract
Smart living is strongly promoted to enhance the quality of life via the application of innovative solutions, and this is driven by domain specialists and policymakers, including designers, urban planners, computer engineers, and property developers. Nonetheless, the actual user, whose views ought to [...] Read more.
Smart living is strongly promoted to enhance the quality of life via the application of innovative solutions, and this is driven by domain specialists and policymakers, including designers, urban planners, computer engineers, and property developers. Nonetheless, the actual user, whose views ought to be considered during the design and development of smart living systems, has received little attention. Thus, this study aims to identify and examine the critical smart functions to achieve smart living in smart buildings based on occupants’ perceptions. The aim is achieved using a sequential quantitative research method involving a literature review and 221 valid survey data gathered from a case of a smart student residence in Hong Kong. The method is further integrated with descriptive statistics, the Kruskal–Walli’s test, and the criticality test. The results were validated via a post-survey with related experts. Twenty-six critical smart functions for smart living were revealed, with the top three including the ability to protect personal data and information privacy, provide real-time safety and security, and the ability to be responsive to users’ needs. A need was discovered to consider the context of buildings during the design of smart living systems, and the recommendation is for professionals to understand the kind of digital technology to be integrated into a building by strongly considering the context of the building and how smart living will be achieved within it based on users’ perceptions. The study provides valuable insights into the occupants’ perceptions of critical smart features/functions for policymakers and practitioners to consider in the construction of smart living systems, specifically students’ smart buildings. This study contributes to knowledge by identifying the critical smart functions to achieve smart living based on occupants’ perceptions of smart living by considering the specific context of a smart student building facility constructed in Hong Kong. Full article
Show Figures

Figure 1

24 pages, 1294 KiB  
Article
Confidential Smart Contracts and Blockchain to Implement a Watermarking Protocol
by Franco Frattolillo
Future Internet 2025, 17(8), 352; https://doi.org/10.3390/fi17080352 - 1 Aug 2025
Viewed by 137
Abstract
Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter in proposing secure, easy-to-use and, at the same time, [...] Read more.
Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter in proposing secure, easy-to-use and, at the same time, “trusted third parties” (TTPs)-free solutions. In this regard, implementations based on blockchain and smart contracts are among the most advanced and promising, even if they are affected by problems regarding the performance and privacy of the information exchanged and processed by smart contracts and managed by blockchains. This paper presents a watermarking protocol implemented by smart contracts and blockchain. The protocol uses a “layer-2” blockchain execution model and performs the computation in “trusted execution environments” (TEEs). Therefore, its implementation can guarantee efficient and confidential execution without compromising ease of use or resorting to TTPs. The protocol and its implementation can, thus, be considered a valid answer to the “trilemma” that afflicts the use of blockchains, managing to guarantee decentralization, security, and scalability. Full article
Show Figures

Figure 1

23 pages, 3580 KiB  
Article
Distributed Collaborative Data Processing Framework for Unmanned Platforms Based on Federated Edge Intelligence
by Siyang Liu, Nanliang Shan, Xianqiang Bao and Xinghua Xu
Sensors 2025, 25(15), 4752; https://doi.org/10.3390/s25154752 - 1 Aug 2025
Viewed by 306
Abstract
Unmanned platforms such as unmanned aerial vehicles, unmanned ground vehicles, and autonomous underwater vehicles often face challenges of data, device, and model heterogeneity when performing collaborative data processing tasks. Existing research does not simultaneously address issues from these three aspects. To address this [...] Read more.
Unmanned platforms such as unmanned aerial vehicles, unmanned ground vehicles, and autonomous underwater vehicles often face challenges of data, device, and model heterogeneity when performing collaborative data processing tasks. Existing research does not simultaneously address issues from these three aspects. To address this issue, this study designs an unmanned platform cluster architecture inspired by the cloud-edge-end model. This architecture integrates federated learning for privacy protection, leverages the advantages of distributed model training, and utilizes edge computing’s near-source data processing capabilities. Additionally, this paper proposes a federated edge intelligence method (DSIA-FEI), which comprises two key components. Based on traditional federated learning, a data sharing mechanism is introduced, in which data is extracted from edge-side platforms and placed into a data sharing platform to form a public dataset. At the beginning of model training, random sampling is conducted from the public dataset and distributed to each unmanned platform, so as to mitigate the impact of data distribution heterogeneity and class imbalance during collaborative data processing in unmanned platforms. Moreover, an intelligent model aggregation strategy based on similarity measurement and loss gradient is developed. This strategy maps heterogeneous model parameters to a unified space via hierarchical parameter alignment, and evaluates the similarity between local and global models of edge devices in real-time, along with the loss gradient, to select the optimal model for global aggregation, reducing the influence of device and model heterogeneity on cooperative learning of unmanned platform swarms. This study carried out extensive validation on multiple datasets, and the experimental results showed that the accuracy of the DSIA-FEI proposed in this paper reaches 0.91, 0.91, 0.88, and 0.87 on the FEMNIST, FEAIR, EuroSAT, and RSSCN7 datasets, respectively, which is more than 10% higher than the baseline method. In addition, the number of communication rounds is reduced by more than 40%, which is better than the existing mainstream methods, and the effectiveness of the proposed method is verified. Full article
Show Figures

Figure 1

28 pages, 1328 KiB  
Review
Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions
by Dung T. Nguyen, Mien L. Trinh, Minh T. Nguyen, Thang C. Vu, Tao V. Nguyen, Long Q. Dinh and Mui D. Nguyen
Future Internet 2025, 17(8), 350; https://doi.org/10.3390/fi17080350 - 1 Aug 2025
Viewed by 205
Abstract
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to [...] Read more.
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to be important components of the IoT system (WSN-IoT) to create smart applications and automate processes. As the number of connected IoT devices increases, privacy and security issues become more complicated due to their external working environments and limited resources. Hence, solutions need to be updated to ensure that data and user privacy are protected from threats and attacks. To support the safety and reliability of such systems, in this paper, security issues in the WSN-IoT are addressed and classified as identifying security challenges and requirements for different kinds of attacks in either WSNs or IoT systems. In addition, security solutions corresponding to different types of attacks are provided, analyzed, and evaluated. We provide different comparisons and classifications based on specific goals and applications that hopefully can suggest suitable solutions for specific purposes in practical. We also suggest some research directions to support new security mechanisms. Full article
Show Figures

Figure 1

28 pages, 352 KiB  
Article
Algorithm Power and Legal Boundaries: Rights Conflicts and Governance Responses in the Era of Artificial Intelligence
by Jinghui He and Zhenyang Zhang
Laws 2025, 14(4), 54; https://doi.org/10.3390/laws14040054 - 31 Jul 2025
Viewed by 682
Abstract
This study explores the challenges and theoretical transformations that the widespread application of AI technology in social governance brings to the protection of citizens’ fundamental rights. By examining typical cases in judicial assistance, technology-enabled law enforcement, and welfare supervision, it explains how AI [...] Read more.
This study explores the challenges and theoretical transformations that the widespread application of AI technology in social governance brings to the protection of citizens’ fundamental rights. By examining typical cases in judicial assistance, technology-enabled law enforcement, and welfare supervision, it explains how AI characteristics such as algorithmic opacity, data bias, and automated decision-making affect fundamental rights including due process, equal protection, and privacy. The article traces the historical evolution of privacy theory from physical space protection to informational self-determination and further to modern data rights, pointing out the inadequacy of traditional rights-protection paradigms in addressing the characteristics of AI technology. Through analyzing AI-governance models in the European Union, the United States, Northeast Asia, and international organizations, it demonstrates diverse governance approaches ranging from systematic risk regulation to decentralized industry regulation. With a special focus on China, the article analyzes the special challenges faced in AI governance and proposes specific recommendations for improving AI-governance paths. The article argues that only within the track of the rule of law, through continuous theoretical innovation, institutional construction, and international cooperation, can AI technology development be ensured to serve human dignity, freedom, and fair justice. Full article
35 pages, 4050 KiB  
Article
Blockchain-Based Secure and Reliable High-Quality Data Risk Management Method
by Chuan He, Yunfan Wang, Tao Zhang, Fuzhong Hao and Yuanyuan Ma
Electronics 2025, 14(15), 3058; https://doi.org/10.3390/electronics14153058 - 30 Jul 2025
Viewed by 212
Abstract
The collaborative construction of large-scale, diverse datasets is crucial for developing high-performance machine learning models. However, this collaboration faces significant challenges, including ensuring data security, protecting participant privacy, maintaining high dataset quality, and aligning economic incentives among multiple stakeholders. Effective risk management strategies [...] Read more.
The collaborative construction of large-scale, diverse datasets is crucial for developing high-performance machine learning models. However, this collaboration faces significant challenges, including ensuring data security, protecting participant privacy, maintaining high dataset quality, and aligning economic incentives among multiple stakeholders. Effective risk management strategies are essential to systematically identify, assess, and mitigate potential risks associated with data collaboration. This study proposes a federated blockchain-based framework designed to manage multiparty dataset collaborations securely and transparently, explicitly incorporating comprehensive risk management practices. The proposed framework involves six core entities—key distribution center (KDC), researcher (RA), data owner (DO), consortium blockchain, dataset evaluation platform, and the orchestrating model itself—to ensure secure, privacy-preserving and high-quality dataset collaboration. In addition, the framework uses blockchain technology to guarantee the traceability and immutability of data transactions, integrating token-based incentives to encourage data contributors to provide high-quality datasets. To systematically mitigate dataset quality risks, we introduced an innovative categorical dataset quality assessment method leveraging label reordering to robustly evaluate datasets. We validated this quality assessment approach using both publicly available (UCI) and privately constructed datasets. Furthermore, our research implemented the proposed blockchain-based management system within a consortium blockchain infrastructure, benchmarking its performance against existing methods to demonstrate enhanced security, reliability, risk mitigation effectiveness, and incentive alignment in dataset collaboration. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

31 pages, 1317 KiB  
Article
Privacy-Preserving Clinical Decision Support for Emergency Triage Using LLMs: System Architecture and Real-World Evaluation
by Alper Karamanlıoğlu, Berkan Demirel, Onur Tural, Osman Tufan Doğan and Ferda Nur Alpaslan
Appl. Sci. 2025, 15(15), 8412; https://doi.org/10.3390/app15158412 - 29 Jul 2025
Viewed by 346
Abstract
This study presents a next-generation clinical decision-support architecture for Clinical Decision Support Systems (CDSS) focused on emergency triage. By integrating Large Language Models (LLMs), Federated Learning (FL), and low-latency streaming analytics within a modular, privacy-preserving framework, the system addresses key deployment challenges in [...] Read more.
This study presents a next-generation clinical decision-support architecture for Clinical Decision Support Systems (CDSS) focused on emergency triage. By integrating Large Language Models (LLMs), Federated Learning (FL), and low-latency streaming analytics within a modular, privacy-preserving framework, the system addresses key deployment challenges in high-stakes clinical settings. Unlike traditional models, the architecture processes both structured (vitals, labs) and unstructured (clinical notes) data to enable context-aware reasoning with clinically acceptable latency at the point of care. It leverages big data infrastructure for large-scale EHR management and incorporates digital twin concepts for live patient monitoring. Federated training allows institutions to collaboratively improve models without sharing raw data, ensuring compliance with GDPR/HIPAA, and FAIR principles. Privacy is further protected through differential privacy, secure aggregation, and inference isolation. We evaluate the system through two studies: (1) a benchmark of 750+ USMLE-style questions validating the medical reasoning of fine-tuned LLMs; and (2) a real-world case study (n = 132, 75.8% first-pass agreement) using de-identified MIMIC-III data to assess triage accuracy and responsiveness. The system demonstrated clinically acceptable latency and promising alignment with expert judgment on reviewed cases. The infectious disease triage case demonstrates low-latency recognition of sepsis-like presentations in the ED. This work offers a scalable, audit-compliant, and clinician-validated blueprint for CDSS, enabling low-latency triage and extensibility across specialties. Full article
(This article belongs to the Special Issue Large Language Models: Transforming E-health)
Show Figures

Figure 1

12 pages, 759 KiB  
Article
Privacy-Preserving Byzantine-Tolerant Federated Learning Scheme in Vehicular Networks
by Shaohua Liu, Jiahui Hou and Gang Shen
Electronics 2025, 14(15), 3005; https://doi.org/10.3390/electronics14153005 - 28 Jul 2025
Viewed by 215
Abstract
With the rapid development of vehicular network technology, data sharing and collaborative training among vehicles have become key to enhancing the efficiency of intelligent transportation systems. However, the heterogeneity of data and potential Byzantine attacks cause the model to update in different directions [...] Read more.
With the rapid development of vehicular network technology, data sharing and collaborative training among vehicles have become key to enhancing the efficiency of intelligent transportation systems. However, the heterogeneity of data and potential Byzantine attacks cause the model to update in different directions during the iterative process, causing the boundary between benign and malicious gradients to shift continuously. To address these issues, this paper proposes a privacy-preserving Byzantine-tolerant federated learning scheme. Specifically, we design a gradient detection method based on median absolute deviation (MAD), which calculates MAD in each round to set a gradient anomaly detection threshold, thereby achieving precise identification and dynamic filtering of malicious gradients. Additionally, to protect vehicle privacy, we obfuscate uploaded parameters to prevent leakage during transmission. Finally, during the aggregation phase, malicious gradients are eliminated, and only benign gradients are selected to participate in the global model update, which improves the model accuracy. Experimental results on three datasets demonstrate that the proposed scheme effectively mitigates the impact of non-independent and identically distributed (non-IID) heterogeneity and Byzantine behaviors while maintaining low computational cost. Full article
(This article belongs to the Special Issue Cryptography in Internet of Things)
Show Figures

Figure 1

Back to TopTop