Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,879)

Search Parameters:
Keywords = privacy requirements

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 1041 KB  
Article
Deep Feature–Based Detection of Chiari Malformation Type I from Sagittal T2-Weighted MRI Using a Hybrid CNN–Machine Learning Framework
by Zülküf Akdemir and Murat Canayaz
Diagnostics 2026, 16(11), 1583; https://doi.org/10.3390/diagnostics16111583 - 22 May 2026
Abstract
Objective: Chiari Type I Malformation (CM1) is a structural abnormality of the hindbrain that can cause a range of neurological symptoms and often requires radiological confirmation using magnetic resonance imaging (MRI). The aim of this study was to develop and evaluate a deep [...] Read more.
Objective: Chiari Type I Malformation (CM1) is a structural abnormality of the hindbrain that can cause a range of neurological symptoms and often requires radiological confirmation using magnetic resonance imaging (MRI). The aim of this study was to develop and evaluate a deep feature-based machine learning framework for the automated detection of CM1 from sagittal MRI images. Materials and Methods: The cohort comprised 550 adults: 250 patients with CM1 (168 women, 82 men; age range, 18–65 years) and 300 healthy control participants (210 women, 90 men; age range, 18–65 years). A total of 764 T2-weighted sagittal MR images (384 CM1, 380 healthy) acquired from two different 1.5T MRI scanners (Siemens Magnetom Altea and Symphony) between 2020 and 2024 were retrospectively analyzed. Deep features were extracted using ResNet-50 and MobileNetV2 architectures and subsequently classified using Support Vector Machines (SVM), Logistic Regression (LR), Random Forest (RF), XGBoost, and voting-based ensemble models. Model performance was assessed through patient-level 5-fold cross-validation using accuracy, sensitivity, specificity, F1-score, PPV, NPV, and AUC metrics. Code and trained models are available from the corresponding author upon reasonable request; imaging data are not publicly available due to patient privacy and institutional restrictions. Results: Across patient-level five-fold cross-validation, models built on ResNet-50 deep features demonstrated extremely high and stable diagnostic performance. The final soft-voting ensemble classifier based on ResNet-50 achieved perfect mean performance, with accuracy, balanced accuracy, sensitivity, specificity, F1-score, and AUC all equal to 1.000 ± 0.000 across folds. Other ResNet-based classifiers also achieved near-perfect results. MobileNetV2-based models also demonstrated strong performance but showed slightly lower stability compared with ResNet-based models, with mean accuracies ranging from 0.984 to 0.993 and mean AUC values between 0.99947 and 0.99984 across classifiers. Conclusion: The proposed deep feature-based machine learning framework demonstrated excellent performance for the automated detection of Chiari Type I Malformation from sagittal MRI images. In particular, the ResNet-50–based soft-voting ensemble model achieved perfect classification performance in cross-validation testing, suggesting that deep feature representations combined with machine learning classifiers may serve as a promising computer-aided diagnostic tool for supporting radiological evaluation of CM1. Full article
(This article belongs to the Section Machine Learning and Artificial Intelligence in Diagnostics)
32 pages, 2147 KB  
Review
Harnessing Machine Learning for Accelerated Drug Discovery: Opportunities and Unmet Challenges
by Mohamed El-Tanani, Syed Arman Rabbani, Adil Farooq Wali, Frezah Muhana, Yahia El-Tanani and Rakesh Kumar
Pharmaceuticals 2026, 19(6), 810; https://doi.org/10.3390/ph19060810 (registering DOI) - 22 May 2026
Abstract
The process of drug discovery is one of the most expensive, time-consuming, and high-risk endeavors in modern science. Translating initial scientific insights into safe and effective therapies, supported by genomics, structural biology, and computational chemistry, typically requires more than a decade and substantial [...] Read more.
The process of drug discovery is one of the most expensive, time-consuming, and high-risk endeavors in modern science. Translating initial scientific insights into safe and effective therapies, supported by genomics, structural biology, and computational chemistry, typically requires more than a decade and substantial financial investment. Machine learning (ML) has emerged as a powerful tool for improving efficiency across the drug discovery pipeline. By enabling the analysis of large and complex datasets, ML supports target identification, lead discovery, optimization, and prediction of preclinical and clinical outcomes. Its integration with experimental validation and automation is illustrated by recent advances such as protein structure prediction, AI-driven antifibrotic compound discovery, and antibiotic identification. Despite these advances, significant challenges remain. Model generalizability is limited by data scarcity, heterogeneity, and hidden biases. In addition, the translation of in silico predictions into clinically validated outcomes remains a major bottleneck, and regulatory acceptance is constrained by limited model interpretability. Ethical considerations, including data privacy, equitable representation, and the potential misuse of generative models, further complicate adoption. This review examines the applications of ML across the drug discovery pipeline, with a focus on translational and regulatory considerations. It also discusses emerging directions, including hybrid physics–AI approaches, multimodal foundation models, federated learning, and explainable AI. The effective integration of ML will depend on rigorous validation, interdisciplinary collaboration, responsible data governance, and alignment with regulatory frameworks. Full article
Show Figures

Graphical abstract

33 pages, 8766 KB  
Article
Zero-Knowledge Proof-Based Privacy-Preserving Pharmaceutical Traceability and Recall Using Blockchain
by Ankit Sitaula, Md Ashraf Uddin, John Ayoade, Nam H. Chu and Reza Rafeh
Blockchains 2026, 4(2), 5; https://doi.org/10.3390/blockchains4020005 - 21 May 2026
Abstract
Counterfeit and unsafe medicines pose significant risks to patient safety and undermine trust in healthcare systems. This paper presents ACTMeds, a blockchain-supported pharmaceutical traceability and recall platform that considers pharmaceutical supply chain requirements and public health operational needs relevant to the Australian Capital [...] Read more.
Counterfeit and unsafe medicines pose significant risks to patient safety and undermine trust in healthcare systems. This paper presents ACTMeds, a blockchain-supported pharmaceutical traceability and recall platform that considers pharmaceutical supply chain requirements and public health operational needs relevant to the Australian Capital Territory (ACT). The system integrates Ethereum smart contracts, developed using Ganache, with a React-based web application providing regulator, operator, pharmacy, and auditor interfaces, alongside a public verification portal leveraging QR and GS1 barcodes. In addition, role-based access control is enforced across the medicine lifecycle, including manufacture, custody transfer, dispensing, and recall, with immutable on-chain events generated to support auditability and accountability. To balance transparency with confidentiality, the platform prototypes a zero-knowledge (ZK) recall mechanism in which regulators can cryptographically prove that recall conditions meet predefined policy requirements without disclosing sensitive incident details. Threat modeling was conducted using the STRIDE framework, and security evaluation combined static application security testing (Solhint and ESLint) and dynamic testing. The paper further discusses deployment options, cost considerations, ZK recall performance analysis, ethical implications, and future enhancements. Security testing validated the platform’s resilience, with no high-severity vulnerabilities identified and medium-severity issues related to HTTP security headers addressed. The results indicate that a regulator-led, privacy-preserving, tamper-evident ledger can improve medicine authenticity verification and recall responsiveness while maintaining compliance and data protection obligations. Full article
(This article belongs to the Special Issue Security and Privacy Challenges in Cross-Chain Systems)
Show Figures

Figure 1

21 pages, 3948 KB  
Article
Demonstrating Data-to-Knowledge Pipelines for Connecting Production Sites in the World Wide Lab
by Leon Gorissen, Jan-Niklas Schneider, Mohamed Behery, Philipp Brauner, Moritz Lennartz, David Kötter, Thomas Kaster, Oliver Petrovic, Christian Hinke, Thomas Gries, Gerhard Lakemeyer, Martina Ziefle, Christian Brecher and Constantin Häfner
Mach. Learn. Knowl. Extr. 2026, 8(5), 136; https://doi.org/10.3390/make8050136 - 20 May 2026
Viewed by 136
Abstract
The digital transformation of production requires methods for integrating, storing, and operationalizing data across organizational boundaries, yet most existing approaches remain siloed and unidirectional, lacking a systematic loop from raw data to actionable knowledge and back. We introduce Data-to-Knowledge (D2K) and Knowledge-to-Data (K2D) [...] Read more.
The digital transformation of production requires methods for integrating, storing, and operationalizing data across organizational boundaries, yet most existing approaches remain siloed and unidirectional, lacking a systematic loop from raw data to actionable knowledge and back. We introduce Data-to-Knowledge (D2K) and Knowledge-to-Data (K2D) pipelines as a universal production concept built on networks of Digital Shadows. The Data-to-Knowledge (D2K) pipeline is realized as a cross-organizational proof of concept that captures and semantically annotates robotic trajectory data from three independent research institutes and uses those data to train an inverse-dynamics foundation model for robot control. Centralized aggregation via an existing FAIR-compliant research data repository was chosen deliberately over federated alternatives to maximize semantic interoperability and reuse of shared infrastructure; federated and privacy-preserving extensions are identified as a promising future direction. Fine-tuning the cross-organizationally trained foundation model reduces training time by approximately 85% relative to end-to-end training from scratch, while achieving comparable accuracy on a standardized inverse-dynamics benchmark. These gains are attributable to the combination of cross-site data aggregation and transfer learning; isolating the contribution of semantic annotation alone remains a topic for future ablation work. The implementation demonstrates that semantically enriched, cross-organizational D2K pipelines can accelerate model development and reduce redundant data collection within a constrained but practically relevant class of robotics tasks. We further discuss limitations, governance challenges, and how these pipelines can contribute to a broader World Wide Lab for collaborative production research. Full article
(This article belongs to the Section Learning)
Show Figures

Graphical abstract

13 pages, 827 KB  
Review
Integrating Artificial Intelligence into Community Health Nursing Education and Practice: Opportunities, Ethical Challenges, and Future Directions
by Bandar Alhumaidi and Talal Ali F. Alharbi
Healthcare 2026, 14(10), 1407; https://doi.org/10.3390/healthcare14101407 - 20 May 2026
Viewed by 152
Abstract
Background/Objectives: Artificial intelligence (AI) is rapidly transforming healthcare. Its integration into community health nursing—a discipline centered on population-level prevention, health promotion, and primary care in community settings—remains insufficiently explored. This narrative review examines the opportunities, ethical challenges, and future directions for integrating [...] Read more.
Background/Objectives: Artificial intelligence (AI) is rapidly transforming healthcare. Its integration into community health nursing—a discipline centered on population-level prevention, health promotion, and primary care in community settings—remains insufficiently explored. This narrative review examines the opportunities, ethical challenges, and future directions for integrating AI into community health nursing education and practice. Methods: A literature search was conducted across PubMed, CINAHL, Scopus, Web of Science, and IEEE Xplore for publications between January 2017 and March 2026. The initial search yielded 612 records; after the removal of duplicates and screening of titles, abstracts, and full texts against predefined criteria, 58 sources were retained for thematic synthesis, comprising empirical studies, systematic and umbrella reviews, scoping reviews, meta-analyses, and authoritative policy documents. Screening and data extraction were performed by two reviewers, with disagreements resolved by discussion. Results: AI offers opportunities for community health nursing across four interconnected domains: clinical decision support for community-based assessments, predictive analytics for population health management, enhanced disease surveillance and outbreak detection, and personalized health education delivery. Significant challenges persist, including algorithmic bias, data privacy concerns, threats to the therapeutic nurse–client relationship, inadequate AI literacy among nursing faculty, and regulatory gaps. Most empirical evidence originates from hospital or general nursing settings; transferability to community contexts is therefore inferred rather than directly demonstrated. Conclusions: Responsible integration of AI into community health nursing requires curriculum reform, ethical governance frameworks, faculty development, equitable access, and interdisciplinary collaboration. AI should augment, not replace, the relational and culturally sensitive care that defines this discipline. Given the narrative nature of the review and the limited community-specific evidence, conclusions are framed as a vision of the AI–community health nursing interface rather than a definitive synthesis. Full article
Show Figures

Figure 1

21 pages, 377 KB  
Review
A Review of Data Engineering in United States Healthcare Infrastructure
by Elizabeth A. Trader, Sahar Hooshmand, Paniz Abedin, Jaeyoung Park and Varadraj Gurupur
Healthcare 2026, 14(10), 1401; https://doi.org/10.3390/healthcare14101401 - 20 May 2026
Viewed by 152
Abstract
With the rapid advancements in artificial intelligence (AI) and machine learning (ML), the role of data engineering has become increasingly critical due to the growing demands for high-quality, large-scale, and well-structured datasets required to train reliable predictive models. Healthcare is one of the [...] Read more.
With the rapid advancements in artificial intelligence (AI) and machine learning (ML), the role of data engineering has become increasingly critical due to the growing demands for high-quality, large-scale, and well-structured datasets required to train reliable predictive models. Healthcare is one of the most data-intensive industries and has demonstrated strong potential for AI-driven automation in clinical decision support, diagnostics, and operational efficiency. However, healthcare data is often fragmented across multiple systems, inconsistently formatted, and constrained by privacy and regulatory requirements, creating significant barriers to scalable AI adoption. In this review, we examine recent research on healthcare data engineering and AI applications, focusing on how data pipelines, interoperability, and governance frameworks support or limit real-world deployment. This review examined 68 peer-reviewed studies published between 2018 and 2026 across multiple clinical domains, including oncology, cardiovascular disease, infectious disease, neurological disorders, medical imaging, and algorithmic frameworks for explainability and fairness. The reviewed literature shows that while AI models achieve promising performance across these domains, the lack of standardized data architectures and interoperable infrastructure remains a primary bottleneck. The purpose of this study is to highlight key challenges and emerging solutions in healthcare data engineering and outline the future directions needed to support safe, scalable, and trustworthy AI integration in the United States healthcare system. The intended core contributions of this article are to: (i) identify the need for reliable AI systems for healthcare, (ii) explore challenges associated with implementing AI systems in healthcare from a data engineer’s perspective, and (iii) analyze key limitations of data engineering as it applies to the implementation of AI systems in healthcare. It must be noted that one of the key limitations of this narrative review is that the authors mostly used citations from MDPI journals. Full article
Show Figures

Figure 1

19 pages, 4108 KB  
Article
Robust Federated Learning for Anomaly Detection in Connected Autonomous Vehicle Networks Under Adversarial Attacks
by Abu Zahid Md Jalal Uddin, Atahar Nayeem and Touhid Bhuiyan
Automation 2026, 7(3), 80; https://doi.org/10.3390/automation7030080 (registering DOI) - 20 May 2026
Viewed by 104
Abstract
Connected and autonomous vehicles (CAVs) increasingly rely on vehicle-to-everything (V2X) communication and distributed sensing infrastructures to support cooperative driving and intelligent transportation services. While these capabilities improve traffic efficiency and safety, they also expand the attack surface of vehicular networks and expose in-vehicle [...] Read more.
Connected and autonomous vehicles (CAVs) increasingly rely on vehicle-to-everything (V2X) communication and distributed sensing infrastructures to support cooperative driving and intelligent transportation services. While these capabilities improve traffic efficiency and safety, they also expand the attack surface of vehicular networks and expose in-vehicle communication systems such as the Controller Area Network (CAN) bus to a wide range of cyber threats. Machine learning-based anomaly detection has emerged as a promising approach for identifying malicious CAN traffic patterns; however, conventional centralized learning requires large-scale data aggregation from vehicles, which raises privacy and scalability concerns. Federated learning (FL) enables collaborative model training across distributed vehicles without requiring the exchange of raw in-vehicle data, making it attractive for privacy-preserving vehicular security applications. Nevertheless, FL systems remain vulnerable to adversarial participants that manipulate local training data or model updates to poison the global model during aggregation. In this work, we present a systematic robustness evaluation of federated anomaly detection in connected vehicular networks under adversarial conditions. The study compares six aggregation strategies, including Federated Averaging (FedAvg), coordinate-wise Median, Trimmed Mean, Krum, Multi-Krum, and Geometric Median (GeoMed), within a non-IID federated CAN bus anomaly detection setting. The evaluation covers label-flipping attacks, gradient-scaling attacks, and a feature-triggered backdoor attack. In addition, the analysis examines malicious client participation, attack-strength variation, learning-rate sensitivity, Trimmed Mean beta sensitivity, multi-seed reliability, and server-side aggregation time. The results show that FedAvg is vulnerable under strong adversarial manipulation, while Trimmed Mean is sensitive to the selected trimming fraction. Median and GeoMed provide strong robustness against gradient-scaling attacks, whereas Multi-Krum achieves the strongest resistance to label-flipping and backdoor attacks. These findings demonstrate that no single aggregation strategy is optimal across all threat models. Instead, robust aggregation for federated CAV anomaly detection should be selected according to the expected attack type, reliability requirement, and computational overhead. Full article
Show Figures

Figure 1

24 pages, 1260 KB  
Review
Safety Mechanisms and Risk Mitigation in Generative AI Mental Health Chatbots: A Systematic Scoping Review
by Lotenna Olisaeloka, Chris G. Richardson, Angel Y. Wang, Richard J. Munthali and Daniel V. Vigo
Healthcare 2026, 14(10), 1395; https://doi.org/10.3390/healthcare14101395 - 20 May 2026
Viewed by 180
Abstract
Background: Generative AI (GenAI) mental health chatbots are increasingly being developed to help address persistent barriers to mental healthcare. Unlike earlier rule-based and retrieval-based systems, GenAI chatbots generate open-ended outputs that can be inaccurate and unsafe. Documented harms from general-purpose GenAI chatbots have [...] Read more.
Background: Generative AI (GenAI) mental health chatbots are increasingly being developed to help address persistent barriers to mental healthcare. Unlike earlier rule-based and retrieval-based systems, GenAI chatbots generate open-ended outputs that can be inaccurate and unsafe. Documented harms from general-purpose GenAI chatbots have highlighted the need for purpose-built interventions with dedicated safeguards, yet how safety is implemented in such interventions remains poorly understood. Methods: This scoping review followed the Joanna Briggs Institute methodology and PRISMA-ScR guidelines, with a prospectively registered and peer-reviewed protocol. A systematic search of seven academic databases and search engines including MEDLINE, Scopus, PsycINFO, ACM Digital Library, IEEE Xplore, Google Scholar and Consensus was conducted in July 2025. Two reviewers independently screened records and extracted data. Safety mechanisms and risk mitigation strategies were narratively synthesised across three pre-specified domains: technical safeguards, pre-deployment safety considerations, and delivery-phase risk mitigation strategies. Results: Twenty-one studies across 11 countries were included. Most interventions incorporated at least one technical safety mechanism, most commonly fine-tuning and prompt engineering. A smaller subset implemented layered safety architectures combining retrieval systems, content filters or risk classifiers, and rule-based algorithms. Pre-deployment safeguards included clinical expert and user co-design approaches, research ethics procedures, and data privacy measures. During intervention delivery, detailed onboarding with role clarification was common, but human oversight was limited. Crisis referral protocols varied in rigour but were mostly underdeveloped, and systematic adverse event monitoring was sparse. Documented safety failures included missed suicidal ideation and provision of inaccurate clinical information. Conclusions: GenAI chatbot interventions require a robust sociotechnical approach that integrates technical safeguards with user co-design, procedural controls, and human oversight. Future research is needed to evaluate efficacy, improve safeguards and standardise safety outcome measurement. Regulatory oversight proportional to the risks these systems carry is required to enable integration into stepped or blended mental healthcare. Full article
Show Figures

Figure 1

20 pages, 632 KB  
Article
Machine Learning Enhanced Quantum-Safe Encryption: A Novel Optimisation Framework
by Rizwan Ahmad, Md Akbar Hossain, Tajrian Mollick and Saifur Rahman Sabuj
Sensors 2026, 26(10), 3226; https://doi.org/10.3390/s26103226 - 20 May 2026
Viewed by 184
Abstract
The standardisation of post-quantum cryptography (PQC) by NIST marks a critical transition away from classical public-key schemes towards quantum-resistant successors. As machine learning (ML) applications proliferate, the demand for efficient cryptographic primitives intensifies, requiring implementations that are simultaneously quantum-safe and resource-aware. Recent surveys [...] Read more.
The standardisation of post-quantum cryptography (PQC) by NIST marks a critical transition away from classical public-key schemes towards quantum-resistant successors. As machine learning (ML) applications proliferate, the demand for efficient cryptographic primitives intensifies, requiring implementations that are simultaneously quantum-safe and resource-aware. Recent surveys have investigated the interplay between ML and PQC, with particular focus on ML-assisted parameter optimisation, privacy-preserving ML leveraging lattice-based cryptography, and neural-network implementations of quantum-resistant algorithms. Building on these findings, we propose QSafe-ML, a comprehensive four-stage framework that integrates hardware profiling, surrogate modelling via ML, constrained multi-objective optimisation, and continuous security validation to facilitate the tuning of PQC parameters and implementations. The framework targets NIST-standardised lattice-based schemes CRYSTALS-Kyber, CRYSTALS-Dilithium, Falcon, and NTRU across three heterogeneous hardware platforms. Experimental evaluation with n=30 repeated trials demonstrates mean latency reductions of 27.5–41.9% (95% CI ±1.1–1.7 pp), memory savings of 13.3–30.2%, and energy savings of 22.8–38.2% over NIST reference baselines, with all configurations maintaining ≥128-bit post-quantum security. An ablation study confirms that surrogate-guided search accounts for the dominant share of these gains. All code, data, and benchmark instructions are released at a public repository (available upon acceptance of this manuscript) to promote reproducibility in evaluating ML-assisted cryptographic systems. Full article
(This article belongs to the Special Issue Secure IoT: Cryptographic Solutions for Sensor Networks)
Show Figures

Graphical abstract

29 pages, 5329 KB  
Systematic Review
Connecting the Dots: A Systematic Literature Review of Explainable AI, Cybersecurity, Human-Centered Design and Edge Computing
by Gaia Cecchi, Fabrizio Benelli, Mario Caronna, Giulia Palma and Antonio Rizzo
J. Cybersecur. Priv. 2026, 6(3), 91; https://doi.org/10.3390/jcp6030091 (registering DOI) - 19 May 2026
Viewed by 174
Abstract
The incorporation of Artificial Intelligence (AI) into cybersecurity has become widespread, largely propelled by the emergence of Generative AI (GenAI) and Large Language Models (LLMs). While these technologies promise to revolutionize threat detection, they introduce profound challenges regarding explainability, trust, and deployment feasibility [...] Read more.
The incorporation of Artificial Intelligence (AI) into cybersecurity has become widespread, largely propelled by the emergence of Generative AI (GenAI) and Large Language Models (LLMs). While these technologies promise to revolutionize threat detection, they introduce profound challenges regarding explainability, trust, and deployment feasibility in resource-constrained environments. Current research often exhibits a form of technological determinism, prioritizing algorithmic performance over the operational realities of Security Operations Centers (SOCs). This paper presents a hybrid qualitative Systematic Literature Review (SLR) and Mapping Study, adhering to the Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) 2020 guidelines. Our research questions are narrowly focused, seeking to explore how four key domains intersect: (1) Explainable AI (XAI) methods; (2) cybersecurity operations; (3) human-centered design; and (4) the constraints inherent to edge computing. From an initial corpus of 385 records drawn from Scopus and OpenAlex (spanning a search window from 2014 to 2025, with relevant findings heavily clustered in the 2020–2025 period), included studies were evaluated using a quality assessment protocol adapted from Kitchenham’s guidelines, scoring each study on a 0–24 scale across four dimensions (Venue Quality, Methodological Rigor, Dataset Realism, and Depth of XAI/Human Validation). The results reveal a significant “validation gap”: while 63% of studies claim human-centric relevance, only ~22% incorporate empirical validation with human operators. Furthermore, we identify a critical trade-off between the reasoning power of cloud-based LLMs and the privacy requirements of Edge security. We conclude by proposing a research agenda for “Cognitive SOCs”, emphasizing the need for Small Language Models (SLMs), standardized human-centric metrics, and robust hallucination detection mechanisms. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1

27 pages, 967 KB  
Article
Statistical Privacy-Preserving Distributed Online Aggregative Games via Mirror Descent with Correlated Perturbations
by Meng Yuan and Rui Yu
Mathematics 2026, 14(10), 1731; https://doi.org/10.3390/math14101731 - 18 May 2026
Viewed by 78
Abstract
Distributed online aggregative games are widely used to model sequential decision-making problems in dynamic networked systems. However, the repeated information exchange required by distributed algorithms may disclose players’ sensitive local data. This paper investigates a privacy-preserving distributed online aggregative game over multi-agent networks. [...] Read more.
Distributed online aggregative games are widely used to model sequential decision-making problems in dynamic networked systems. However, the repeated information exchange required by distributed algorithms may disclose players’ sensitive local data. This paper investigates a privacy-preserving distributed online aggregative game over multi-agent networks. A distributed online mirror descent algorithm with correlated perturbations is developed to protect local private information. Under standard assumptions, an expected dynamic regret bound and a statistical privacy guarantee are established for the proposed algorithm. Numerical results demonstrate the effectiveness of the proposed algorithm and reveal the tradeoff between privacy protection and algorithmic performance. Full article
(This article belongs to the Special Issue AI in Game Theory: Theory and Applications)
Show Figures

Figure 1

29 pages, 1270 KB  
Systematic Review
Reactive to Predictive Mobility Management: A Systematic Review of ML-Driven Handover Optimization in 5G and Beyond
by Teresia Ankome and Eisuke Hanada
Mach. Learn. Knowl. Extr. 2026, 8(5), 133; https://doi.org/10.3390/make8050133 - 18 May 2026
Viewed by 166
Abstract
Handover optimization is essential for seamless connectivity in 5G and beyond networks. Existing approaches present fundamental challenges of centralized solutions achieving coordination and accuracy but creating privacy risks under the General Data Protection Regulation (GDPR), while distributed privacy-preserving approaches protect user data but [...] Read more.
Handover optimization is essential for seamless connectivity in 5G and beyond networks. Existing approaches present fundamental challenges of centralized solutions achieving coordination and accuracy but creating privacy risks under the General Data Protection Regulation (GDPR), while distributed privacy-preserving approaches protect user data but lack the network-wide visibility necessary for optimal mobility decisions. This systematic review synthesizes 49 peer-reviewed studies published between 2010 and 2025, identified through a PRISMA-compliant search across IEEE Xplore, ScienceDirect, SpringerLink, MDPI, ACM Digital Library, and Google Scholar. Eligible studies addressed cellular handover or mobility management using traditional signal-based, Machine Learning, Federated Learning, Software-Defined Networking strategies, and reported quantitative performance metrics. A structured quality assessment evaluated methodological rigor, dataset validation, benchmarking practices, handover-specific metrics, and scalability. Synthesis evidence shows that existing approaches do not simultaneously satisfy critical requirements for next-generation mobility management of accuracy, privacy, scalability, and real-time network-wide coordination. Machine learning achieves high accuracy (up to 97%) but depends on centralized data; Reinforcement Learning supports real-time adaptation but incurs high computational costs; federated learning preserve privacy but suffers from limited global coordination; and software-defined networking enables centralized control but requires continuous transmission of raw data. Evidence quality is further limited to simulation-based assessments and limited real-world datasets. Overall, the reviews identify a clear evolution from reactive threshold-based methods towards proactive prediction and highlights the need for unified, privacy-preserving and globally coordinated handover frameworks. The findings point toward integrating federated learning with Software-Defined Mobile Networking as promising architectural direction for 6G mobility management. Full article
Show Figures

Figure 1

39 pages, 1077 KB  
Article
UAV Mission Planning for Post-Disaster Victim Localisation via Federated Multi-Agent Reinforcement Learning
by Alparslan Güzey, Mehmet Akif Çifçi, Fazlı Yıldırım and Arda Yaşar Erdoğan
Drones 2026, 10(5), 385; https://doi.org/10.3390/drones10050385 - 18 May 2026
Viewed by 159
Abstract
Rapid localisation of trapped victims after urban disasters is essential but challenging because Bluetooth Low Energy (BLE) beacons are intermittent, radio propagation is obstructed by rubble, UAVs are energy-constrained, and real-world multi-UAV training is impractical in high-risk search-and-rescue (SAR) environments. This study formulates [...] Read more.
Rapid localisation of trapped victims after urban disasters is essential but challenging because Bluetooth Low Energy (BLE) beacons are intermittent, radio propagation is obstructed by rubble, UAVs are energy-constrained, and real-world multi-UAV training is impractical in high-risk search-and-rescue (SAR) environments. This study formulates post-disaster victim localisation as a cooperative Dec-POMDP and adapts a model-aided federated multi-agent reinforcement learning framework based on FedQMIX. The proposed pipeline combines a lightweight LoS/NLoS surrogate channel model, PSO-based victim-position estimation, return-to-base and map-feasibility safety checks, an SAR-aligned shaped reward, and a leakage-free centralised training state based on estimated rather than ground-truth victim locations. Each UAV trains locally inside a learned digital-twin simulator and periodically shares only QMIX network parameters, avoiding the exchange of raw trajectories or RSSI logs. The framework is evaluated on two synthetic post-earthquake urban maps representing a compact return-to-base scenario and a larger reach-to-destination scenario. Across five independent seeds per method and map, Model-Aided FedQMIX achieves the highest and most stable victim-localisation performance, with the clearest advantage observed in the larger long-horizon scenario. Additional diagnostic tests examine reward-weight sensitivity, RF channel-shift robustness, BLE/smartphone hardware heterogeneity, non-IID client-data variation, and partial-client FedAvg under missing client updates. The results indicate that combining model-aided localisation cues, decentralised value factorisation, SAR-aligned objective design, and federated parameter sharing can improve the robustness of UAV-based victim-localisation policies. The framework also clarifies deployment considerations for federated SAR coordination, including communication payload, privacy boundaries, heterogeneous client experience, device variability, and intermittent connectivity. This study remains simulation-based, and future validation with real UAVs, BLE devices, and rubble-inspired testbeds is required before operational deployment. Full article
Show Figures

Figure 1

38 pages, 649 KB  
Review
From Biosignals to Bedside: A Review of Real-Time Edge Machine Learning for Wearable Health Monitoring
by Mustapha Oloko-Oba, Ebenezer Esenogho and Kehinde Aruleba
Bioengineering 2026, 13(5), 559; https://doi.org/10.3390/bioengineering13050559 - 15 May 2026
Viewed by 240
Abstract
Wearable devices increasingly capture biosignals such as electrocardiograms, photoplethysmograms, inertial signals, and electrodermal activity during daily life, enabling earlier detection and continuous monitoring outside the clinic. Real-time edge machine learning can convert these streams into timely, privacy-preserving inference by placing computation on a [...] Read more.
Wearable devices increasingly capture biosignals such as electrocardiograms, photoplethysmograms, inertial signals, and electrodermal activity during daily life, enabling earlier detection and continuous monitoring outside the clinic. Real-time edge machine learning can convert these streams into timely, privacy-preserving inference by placing computation on a wearable (device-only) or a paired phone, with intermittent cloud assist used selectively for dashboards, summarisation, and lifecycle management. Clinical adoption remains uneven because free-living data are noisy, labels are often delayed, and device ecosystems evolve over time. This narrative review organises the literature as an end-to-end deployment pathway: sensing and artefact management, streaming windowing and multimodal alignment, and model families suited to on-device inference. We compare classical feature-based pipelines with learned representations, including compact CNN/TCN and recurrent and efficient attention-based models, and discuss when self-supervised pretraining and distillation are most useful in low-label settings. We then synthesise deployment engineering levers (quantisation, pruning, and distillation) and benchmarking requirements, emphasising runtime constraints that determine feasibility: latency per update, peak RAM, energy per inference, duty cycle, and thermal behaviour. Applications are grouped across cardiovascular monitoring, blood pressure and haemodynamics, sleep and respiration, and movement and stress, with explicit attention to false-alert burden, adherence, and workflow integration. To support translation, we provide a validation ladder and a reliability toolkit covering calibration, uncertainty-aware thresholds and deferral, drift monitoring triggers, and safe update governance. The novelty of this review is a deployment-oriented synthesis that ties modelling choices to edge tiers and resource budgets and provides reusable reporting templates, including an edge-cost card and comparative tables spanning modalities, models, deployment levers, applications, and reliability requirements. Full article
Show Figures

Figure 1

27 pages, 1814 KB  
Article
Towards Sustainable Urban Mobility: An ESG-Based Decision Framework for Urban Air Integration
by Ziying Wen, Wansong Liu, Caimiao Zheng and Jian Li Hao
Sustainability 2026, 18(10), 4904; https://doi.org/10.3390/su18104904 - 13 May 2026
Viewed by 343
Abstract
Urban Air Mobility (UAM) has emerged as a promising solution to alleviate urban congestion and support low-carbon transportation by utilizing low-altitude airspace. However, its large-scale deployment requires governance mechanisms that simultaneously address environmental impacts, social acceptance, and institutional coordination. Existing studies have not [...] Read more.
Urban Air Mobility (UAM) has emerged as a promising solution to alleviate urban congestion and support low-carbon transportation by utilizing low-altitude airspace. However, its large-scale deployment requires governance mechanisms that simultaneously address environmental impacts, social acceptance, and institutional coordination. Existing studies have not yet provided an operational Environmental, Social, and Governance (ESG)-based decision framework for UAM governance. This study develops and empirically validates an ESG-oriented governance model for UAM integration into urban development. A mixed-method approach was adopted, including literature and policy analysis to identify 22 execution-level factors, a questionnaire survey of industry practitioners and experts (N = 307), and the Analytic Hierarchy Process (AHP) combined with expert consultation to determine priority weights. The results show that the Governance dimension has the highest importance (38.72%), followed by Social (32.15%) and Environmental (29.13%). Laws and regulations, standard certification, and digital management constitute the core institutional foundations for UAM deployment. Privacy protection and social acceptance are the dominant social concerns, while noise pollution represents the most critical environmental constraint. Across all dimensions, standard certification, privacy, noise control, management framework, and digital management are the highest-weighted factors. The proposed framework provides a practical ESG-based decision tool to support policy prioritization and sustainable UAM implementation in rapidly urbanizing regions. Full article
Show Figures

Figure 1

Back to TopTop