Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,021)

Search Parameters:
Keywords = privacy-preserved

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 2071 KB  
Review
Power Control in Wireless Body Area Networks: A Review of Mechanisms, Challenges, and Future Directions
by Haoru Su, Zhiyi Zhao, Boxuan Gu and Shaofu Lin
Sensors 2026, 26(3), 765; https://doi.org/10.3390/s26030765 (registering DOI) - 23 Jan 2026
Abstract
Wireless Body Area Networks (WBANs) enable real-time data collection for medical monitoring, sports tracking, and environmental sensing, driven by Internet of Things advancements. Their layered architecture supports efficient sensing, aggregation, and analysis, but energy constraints from transmission (over 60% of consumption), idle listening, [...] Read more.
Wireless Body Area Networks (WBANs) enable real-time data collection for medical monitoring, sports tracking, and environmental sensing, driven by Internet of Things advancements. Their layered architecture supports efficient sensing, aggregation, and analysis, but energy constraints from transmission (over 60% of consumption), idle listening, and dynamic conditions like body motion hinder adoption. Challenges include minimizing energy waste while ensuring data reliability, Quality of Service (QoS), and adaptation to channel variations, alongside algorithm complexity and privacy concerns. This paper reviews recent power control mechanisms in WBANs, encompassing feedback control, dynamic and convex optimization, graph theory-based path optimization, game theory, reinforcement learning, deep reinforcement learning, hybrid frameworks, and emerging architectures such as federated learning and cell-free massive MIMO, adopting a systematic review approach with a focus on healthcare and IoT application scenarios. Achieving energy savings ranging from 6% (simple feedback control) to 50% (hybrid frameworks with emerging architectures), depending on method complexity and application scenario, with prolonged network lifetime and improved reliability while preserving QoS requirements in healthcare and IoT applications. Full article
(This article belongs to the Special Issue e-Health Systems and Technologies)
Show Figures

Figure 1

19 pages, 1193 KB  
Review
Tactical-Grade Wearables and Authentication Biometrics
by Fotios Agiomavritis and Irene Karanasiou
Sensors 2026, 26(3), 759; https://doi.org/10.3390/s26030759 (registering DOI) - 23 Jan 2026
Abstract
Modern battlefield operations require wearable technologies to operate reliably under harsh physical, environmental, and security conditions. This review looks at today and tomorrow’s potential for ready field-grade wearables embedded with biometric authentication systems. It details physiological, kinematic, and multimodal sensor platforms built to [...] Read more.
Modern battlefield operations require wearable technologies to operate reliably under harsh physical, environmental, and security conditions. This review looks at today and tomorrow’s potential for ready field-grade wearables embedded with biometric authentication systems. It details physiological, kinematic, and multimodal sensor platforms built to withstand rugged, high-stress environments, and reviews biometric modalities like ECG, PPG, EEG, gait, and voice for continuous or on-demand identity confirmation. Accuracy, latency, energy efficiency, and tolerance to motion artifacts, environmental extremes, and physiological variability are critical performance drivers. Security threats, such as spoofing and data tapping, and techniques for template protection, liveness assurance, and protected on-device processing also come under review. Emerging trends in low-power edge AI, multimodal integration, adaptive learning from field experience, and privacy-preserving analytics in terms of defense readiness, and ongoing challenges, such as gear interoperability, long-term stability of templates, and common stress-testing protocols, are assessed. In conclusion, an R&D plan to lead the development of rugged, trustworthy, and operationally validated wearable authentication systems for the current and future militaries is proposed. Full article
(This article belongs to the Special Issue Biomedical Electronics and Wearable Systems—2nd Edition)
Show Figures

Figure 1

31 pages, 1140 KB  
Review
A Survey of Multi-Layer IoT Security Using SDN, Blockchain, and Machine Learning
by Reorapetse Molose and Bassey Isong
Electronics 2026, 15(3), 494; https://doi.org/10.3390/electronics15030494 - 23 Jan 2026
Abstract
The integration of Software-Defined Networking (SDN), blockchain (BC), and machine learning (ML) has emerged as a promising approach to securing Internet of Things (IoT) and Industrial IoT (IIoT) networks. This paper conducted a comprehensive review of recent studies focusing on multi-layered security across [...] Read more.
The integration of Software-Defined Networking (SDN), blockchain (BC), and machine learning (ML) has emerged as a promising approach to securing Internet of Things (IoT) and Industrial IoT (IIoT) networks. This paper conducted a comprehensive review of recent studies focusing on multi-layered security across device, control, network, and application layers. The analysis reveals that BC technology ensures decentralised trust, immutability, and secure access validation, while SDN enables programmability, load balancing, and real-time monitoring. In addition, ML/deep learning (DL) techniques, including federated and hybrid learning, strengthen anomaly detection, predictive security, and adaptive mitigation. Reported evaluations show similar gains in detection accuracy, latency, throughput, and energy efficiency, with effective defence against threats, though differing experimental contexts limit direct comparison. It also shows that the solutions’ effectiveness depends on ecosystem factors such as SDN controllers, BC platforms, cryptographic protocols, and ML frameworks. However, most studies rely on simulations or small-scale testbeds, leaving large-scale and heterogeneous deployments unverified. Significant challenges include scalability, computational and energy overhead, dataset dependency, limited adversarial resilience, and the explainability of ML-driven decisions. Based on the findings, future research should focus on lightweight consensus mechanisms for constrained devices, privacy-preserving ML/DL, and cross-layer adversarial-resilient frameworks. Advancing these directions will be important in achieving scalable, interoperable, and trustworthy SDN-IoT/IIoT security solutions. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

30 pages, 30415 KB  
Article
Differentially Private Generative Modeling via Discrete Latent Projection
by Yinchi Ge, Hui Zhang and Haijun Yang
Mathematics 2026, 14(2), 388; https://doi.org/10.3390/math14020388 - 22 Jan 2026
Abstract
Deep generative models trained on sensitive data pose significant privacy risks, yet enforcing differential privacy (DP) in high-dimensional generators often leads to severe utility degradation. We propose Differentially Private Vector-Quantized Generation (DP-VQG), a three-stage generative framework that introduces a discrete latent bottleneck as [...] Read more.
Deep generative models trained on sensitive data pose significant privacy risks, yet enforcing differential privacy (DP) in high-dimensional generators often leads to severe utility degradation. We propose Differentially Private Vector-Quantized Generation (DP-VQG), a three-stage generative framework that introduces a discrete latent bottleneck as the interface for privacy preservation. DP-VQG separates geometric structure learning, differentially private discrete latent projection, and non-private prior modeling, ensuring that privacy-induced randomness operates on a finite codebook aligned with the decoder’s effective support. This design avoids off-support degradation while providing formal end-to-end DP guarantees through composition and post-processing. We provide a theoretical analysis of privacy and utility, including explicit bounds on privacy-induced distortion. Empirically, under the privacy budget of ε=10, DP-VQG attains Fréchet Inception Distance (FID) scores of 18.21 on MNIST and 77.09 on Fashion-MNIST, surpassing state-of-the-art differentially private generative models of comparable scale. Moreover, DP-VQG produces visually coherent samples on high-resolution datasets such as Flowers102, Food101, CelebA-HQ, and Cars, demonstrating scalability beyond prior end-to-end DP generative approaches. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
52 pages, 3528 KB  
Review
Advanced Fault Detection and Diagnosis Exploiting Machine Learning and Artificial Intelligence for Engineering Applications
by Davide Paolini, Pierpaolo Dini, Abdussalam Elhanashi and Sergio Saponara
Electronics 2026, 15(2), 476; https://doi.org/10.3390/electronics15020476 - 22 Jan 2026
Abstract
Modern engineering systems require reliable and timely Fault Detection and Diagnosis (FDD) to ensure operational safety and resilience. Traditional model-based and rule-based approaches, although interpretable, exhibit limited scalability and adaptability in complex, data-intensive environments. This survey provides a systematic overview of recent studies [...] Read more.
Modern engineering systems require reliable and timely Fault Detection and Diagnosis (FDD) to ensure operational safety and resilience. Traditional model-based and rule-based approaches, although interpretable, exhibit limited scalability and adaptability in complex, data-intensive environments. This survey provides a systematic overview of recent studies exploring Machine Learning (ML) and Artificial Intelligence (AI) techniques for FDD across industrial, energy, Cyber-Physical Systems (CPS)/Internet of Things (IoT), and cybersecurity domains. Deep architectures such as Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Transformers, and Graph Neural Networks (GNNs) are compared with unsupervised, hybrid, and physics-informed frameworks, emphasizing their respective strengths in adaptability, robustness, and interpretability. Quantitative synthesis and radar-based assessments suggest that AI-driven FDD approaches offer increased adaptability, scalability, and early fault detection capabilities compared to classical methods, while also introducing new challenges related to interpretability, robustness, and deployment. Emerging research directions include the development of foundation and multimodal models, federated learning (FL), and privacy-preserving learning, as well as physics-guided trustworthy AI. These trends indicate a paradigm shift toward self-adaptive, interpretable, and collaborative FDD systems capable of sustaining reliability, transparency, and autonomy across critical infrastructures. Full article
Show Figures

Figure 1

22 pages, 1469 KB  
Article
RBCrowd: A Reliable Blockchain-Based Reputation Management Framework for Privacy Preservation in Mobile Crowdsensing
by Zaina Maqour, Hanan El Bakkali, Driss Benhaddou and Houda Benbrahim
Future Internet 2026, 18(1), 65; https://doi.org/10.3390/fi18010065 - 21 Jan 2026
Abstract
Mobile crowdsensing (MCS) is an emerging paradigm that enables cost-effective, large-scale, and participatory data collection through mobile devices. However, the open nature of MCS raises significant privacy and trust challenges. Existing reputation models have made progress in assessing the quality of contributions, but [...] Read more.
Mobile crowdsensing (MCS) is an emerging paradigm that enables cost-effective, large-scale, and participatory data collection through mobile devices. However, the open nature of MCS raises significant privacy and trust challenges. Existing reputation models have made progress in assessing the quality of contributions, but they still struggle to manage prolonged inactivity, which can lead to outdated scores that no longer reflect current engagement. To address these issues, this paper presents RBCrowd, a dynamic reputation management system based on a dual blockchain architecture. It consists of the Sensing Chain (SC), a public blockchain recording sensing tasks and results, and the Reputation Chain (RC), a consortium blockchain managing user reputation scores. To guarantee privacy, the framework limits identity verification to the RC, ensuring that data on the SC is stored without direct links to the worker. We paired this privacy mechanism with a reputation model that rewards consistent, high-quality contributions. The system updates reputation scores by first validating the specific task and then adjusting for historical engagement, specifically penalizing prolonged inactivity. We evaluate RBCrowd through simulations in realistic MCS scenarios, and the results show that our framework provides more effective dynamic trust management than existing models. It also achieves increased reliability and fairness while managing prolonged inactivity through adaptive penalties. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

33 pages, 32306 KB  
Article
A Reward-and-Punishment-Aware Incentive Mechanism for Directed Acyclic Graph Blockchain-Based Federated Learning in Unmanned Aerial Vehicle Networks
by Xiaofeng Xue, Qiong Li and Haokun Mao
Drones 2026, 10(1), 70; https://doi.org/10.3390/drones10010070 (registering DOI) - 21 Jan 2026
Abstract
The integration of unmanned aerial vehicles (UAVs) and Federated Learning (FL) enables distributed model training while preserving data privacy. To overcome the challenges caused by centralized and synchronous model updates, we integrate Directed Acyclic Graph (DAG) blockchain-based FL into UAV networks. In this [...] Read more.
The integration of unmanned aerial vehicles (UAVs) and Federated Learning (FL) enables distributed model training while preserving data privacy. To overcome the challenges caused by centralized and synchronous model updates, we integrate Directed Acyclic Graph (DAG) blockchain-based FL into UAV networks. In this decentralized and asynchronous framework, UAVs can independently and autonomously participate in the FL process according to their own requirement. To achieve the high FL performance, it is essential for UAVs to actively contribute their computational and data resources to the FL process. However, it is challenging to ensure that UAVs consistently contribute their resources, as they may have a propensity to prioritize their own self-interest. Therefore, it is crucial to design effective incentive mechanisms that encourage UAVs to actively participate in the FL process and contribute their computational and data resources. Currently, research on effective incentive mechanisms for DAG blockchain-based FL framework in UAV networks remains limited. To address these challenges, this paper proposes a novel incentive mechanism that integrates both rewards and punishments to encourage UAVs to actively contribute to FL and to deter free riding under incomplete information. We formulate the interactions among UAVs as an evolutionary game, and the aspiration-driven rule is employed to imitate the UAV’s decision-making processes. We evaluate the proposed mechanism for UAVs within a DAG blockchain-based FL framework. Experimental results show that the proposed incentive mechanism substantially increases the average UAV contribution rate from 77.04±0.84% (without incentive mechanism) to 97.48±1.29%. Furthermore, the higher contribution rate results in an approximate 2.23% improvement in FL performance. Additionally, we evaluate the impact of different parameter configurations to analyze how they affect the performance and efficiency of the FL system. Full article
(This article belongs to the Section Drone Communications)
Show Figures

Figure 1

18 pages, 635 KB  
Article
A Federated Deep Learning Framework for Sleep-Stage Monitoring Using the ISRUC-Sleep Dataset
by Alba Amato
Appl. Sci. 2026, 16(2), 1073; https://doi.org/10.3390/app16021073 - 21 Jan 2026
Abstract
Automatic sleep-stage classification is a key component of long-term sleep monitoring and digital health applications. Although deep learning models trained on centralized datasets have achieved strong performance, their deployment in real-world healthcare settings is constrained by privacy, data-governance, and regulatory requirements. Federated learning [...] Read more.
Automatic sleep-stage classification is a key component of long-term sleep monitoring and digital health applications. Although deep learning models trained on centralized datasets have achieved strong performance, their deployment in real-world healthcare settings is constrained by privacy, data-governance, and regulatory requirements. Federated learning (FL) addresses these issues by enabling decentralized training in which raw data remain local and only model parameters are exchanged; however, its effectiveness under realistic physiological heterogeneity remains insufficiently understood. In this work, we investigate a subject-level federated deep learning framework for sleep-stage classification using polysomnography data from the ISRUC-Sleep dataset. We adopt a realistic one subject = one client setting spanning three clinically distinct subgroups and evaluate a lightweight one-dimensional convolutional neural network (1D-CNN) under four training regimes: a centralized baseline and three federated strategies (FedAvg, FedProx, and FedBN), all sharing identical architecture and preprocessing. The centralized model, trained on a cohort with regular sleep architecture, achieves stable performance (accuracy 69.65%, macro-F1 0.6537). In contrast, naive FedAvg fails to converge under subject-level non-IID data (accuracy 14.21%, macro-F1 0.0601), with minority stages such as N1 and REM largely lost. FedProx yields only marginal improvement, while FedBN—by preserving client-specific batch-normalization statistics—achieves the best federated performance (accuracy 26.04%, macro-F1 0.1732) and greater stability across clients. These findings indicate that the main limitation of FL for sleep staging lies in physiological heterogeneity rather than model capacity, highlighting the need for heterogeneity-aware strategies in privacy-preserving sleep analytics. Full article
Show Figures

Figure 1

28 pages, 14788 KB  
Article
A Practical Case of Monitoring Older Adults Using mmWave Radar and UWB
by Gabriel García-Gutiérrez, Elena Aparicio-Esteve, Jesús Ureña, José Manuel Villadangos-Carrizo, Ana Jiménez-Martín and Juan Jesús García-Domínguez
Sensors 2026, 26(2), 681; https://doi.org/10.3390/s26020681 - 20 Jan 2026
Abstract
Population aging is driving the need for unobtrusive, continuous monitoring solutions in residential care environments. Radio-frequency (RF)-based technologies such as Ultra-Wideband (UWB) and millimeter-wave (mmWave) radar are particularly attractive for providing detailed information on presence and movement while preserving privacy. Building on a [...] Read more.
Population aging is driving the need for unobtrusive, continuous monitoring solutions in residential care environments. Radio-frequency (RF)-based technologies such as Ultra-Wideband (UWB) and millimeter-wave (mmWave) radar are particularly attractive for providing detailed information on presence and movement while preserving privacy. Building on a UWB–mmWave localization system deployed in a senior living residence, this paper focuses on the data-processing methodology for extracting quantitative mobility indicators from long-term indoor monitoring data. The system combines a device-free mmWave radar setup in bedrooms and bathrooms with a tag-based UWB positioning system in common areas. For mmWave data, an adaptive short-term average/long-term average (STA/LTA) detector operating on an aggregated, normalized radar energy signal is used to classify micro- and macromovements into bedroom occupancy and non-sedentary activity episodes. For UWB data, a partially constrained Kalman filter with a nearly constant velocity dynamics model and floor-plan information yields smoothed trajectories, from which daily gait- and mobility-related metrics are derived. The approach is illustrated using one-day samples from three users as a proof of concept. The proposed methodology provides individualized indicators of bedroom occupancy, sedentary behavior, and mobility in shared spaces, supporting the feasibility of combined UWB and mmWave radar sensing for longitudinal routine analysis in real-world elderly care environments. Full article
(This article belongs to the Special Issue Development and Challenges of Indoor Positioning and Localization)
Show Figures

Figure 1

32 pages, 1775 KB  
Article
Smartphone-Based Sensing Network for Emergency Detection: A Privacy-Preserving Framework for Trustworthy Digital Governance
by Yusaku Fujii
Appl. Sci. 2026, 16(2), 1032; https://doi.org/10.3390/app16021032 - 20 Jan 2026
Abstract
Smartphones are ubiquitous and continuously carried high-performance devices equipped with speech recognition capabilities that enable the analysis of surrounding conversations. When leveraged for public purposes, networks of smartphones can function as a large-scale sensing infrastructure capable of detecting and reporting early signs of [...] Read more.
Smartphones are ubiquitous and continuously carried high-performance devices equipped with speech recognition capabilities that enable the analysis of surrounding conversations. When leveraged for public purposes, networks of smartphones can function as a large-scale sensing infrastructure capable of detecting and reporting early signs of serious crimes or terrorist activities. This paper proposes the concept of “Smartphone as Societal Safety Guard” as an approach to substantially enhancing public safety through relatively low additional cost and the combination of existing technologies (first pillar). At the same time, this concept entails serious risks of privacy infringement, as exemplified by the potential introduction of always-on eavesdropping through operating system updates. The originality of this study lies in redefining smartphones not merely as personal tools but as public safety infrastructure within democratic societies, and in systematizing the conditions for their social acceptability from the perspective of institutional design. This research presents a reference architecture and a regulatory framework, and organizes six key challenges that must be addressed to reconcile public safety with privacy protection: external attacks, mitigation of privacy information, false positives, expansion of the scope of application, discriminatory use, and misuse by authorized insiders. In particular, misuse by authorized insiders is positioned as the core challenge. As a necessary condition for acceptance in democratic societies (second pillar), this paper proposes a privacy-protective infrastructure centered on the Verifiable Record of AI Output (VRAIO). By combining on-device two-stage urgency classification with the review and recording of AI outputs by independent third-party entities, the proposed framework aims to provide a mechanism that can ensure, as a design requirement, that information unrelated to emergencies is not released outside the device. In summary, this paper presents a design framework for reconciling enhanced public safety with the protection of privacy. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

33 pages, 2214 KB  
Article
Research on Microgrid Resilience in Highway Service Areas Based on Federated Multi-Agent Deep Reinforcement Learning
by Jiyong Li, Zhiliang Cheng, Yide Peng, Hao Huang and Chen Ye
Sustainability 2026, 18(2), 1027; https://doi.org/10.3390/su18021027 - 19 Jan 2026
Viewed by 5
Abstract
This paper proposes a Federated Multi-Agent Deep Reinforcement Learning (FMADRL) framework to enhance the resilience of highway service area microgrids against extreme weather events. The method integrates Generative Adversarial Networks with Monte Carlo simulations to generate high-fidelity weather scenarios, enabling privacy-preserving collaborative optimization [...] Read more.
This paper proposes a Federated Multi-Agent Deep Reinforcement Learning (FMADRL) framework to enhance the resilience of highway service area microgrids against extreme weather events. The method integrates Generative Adversarial Networks with Monte Carlo simulations to generate high-fidelity weather scenarios, enabling privacy-preserving collaborative optimization across distributed microgrids. A multi-objective approach using the Ripple-Spreading Algorithm yields balanced solutions for economic efficiency, reliability, and response speed. Large-scale simulations demonstrate significant improvements: the proposed method achieves an 88.3 score on the comprehensive system resilience metric, reduces the average fault recovery time from 46.6 min to 8.4 min, lowers annual operating costs by 69.3%, equivalent to 536,945.1 USD, and achieves annual carbon emissions reductions of 285 Mg. This approach provides an innovative solution for enhancing the resilience of distributed microgrids during extreme weather events. Full article
(This article belongs to the Section Hazards and Sustainability)
Show Figures

Figure 1

18 pages, 3397 KB  
Article
Privacy-Preserving State Estimation with Application to Target Tracking
by Yulong Wang, Yuman Li, Sen Wang and Hong Lin
Machines 2026, 14(1), 116; https://doi.org/10.3390/machines14010116 - 19 Jan 2026
Viewed by 25
Abstract
This paper studies the design of a privacy-preserving optimal state estimator for discrete-time linear systems.Insome traditional methods, such as noise injection, privacy is protected by adding noise to observations and the resulting data is deceptive information. The features of the proposed privacy protection [...] Read more.
This paper studies the design of a privacy-preserving optimal state estimator for discrete-time linear systems.Insome traditional methods, such as noise injection, privacy is protected by adding noise to observations and the resulting data is deceptive information. The features of the proposed privacy protection in this paper are twofold. (i) Privacy is protected without providing deceptive information, that is, the information of the resulting protected observations is authentic. The privacy protection consists of two steps. First, the direction deviation of the observations, rather than the raw observation, is computed. Then, this deviation is random and is not always transmitted to the estimator. (ii) An optimal estimator is designed with desired privacy-preserving degree. By tuning a privacy-protection parameter, a given privacy-preserving degree and an estimation accuracy upper bound can be achieved simultaneously. Finally, drone-tracking experiments are provided to demonstrate the effectiveness of the proposed method, and some comparisons with the existing methods are presented. Full article
(This article belongs to the Section Automation and Control Systems)
Show Figures

Figure 1

25 pages, 3590 KB  
Article
Unlocking Innovation in Tourism: A Bibliometric Analysis of Blockchain and Distributed Ledger Technology Trends, Hotspots, and Future Pathways
by Roberto A. Pava-Díaz, Juan M. Sánchez-Céspedes and Oscar Danilo Montoya
Digital 2026, 6(1), 7; https://doi.org/10.3390/digital6010007 - 19 Jan 2026
Viewed by 41
Abstract
This article presents a comprehensive bibliometric analysis of the indexed academic literature on the application of distributed ledger technology (DLT) and blockchain in the tourism industry. Using the bibliometrix library within the RStudio environment, key bibliometric indicators were examined in order to characterize [...] Read more.
This article presents a comprehensive bibliometric analysis of the indexed academic literature on the application of distributed ledger technology (DLT) and blockchain in the tourism industry. Using the bibliometrix library within the RStudio environment, key bibliometric indicators were examined in order to characterize the evolution, structure, and thematic focus of this emerging field of research. The systematic literature review, which adhered to PRISMA guidelines, involved retrieving publications from the Web of Science and Scopus databases. A curated dataset of 100 relevant documents was identified and analyzed in terms of annual scientific production, leading journals, influential authors, and highly cited publications. The results indicate that blockchain technology dominates the literature, with a strong emphasis on its potential to enhance trust, transparency, and efficiency in tourism-related processes. In particular, identity management, secure transactions, and disintermediation emerge as central research themes, reflecting blockchain’s capacity to support decentralized, immutable, and privacy-preserving interactions between tourists and service providers. Overall, the findings reveal a rapidly growing and increasingly structured body of knowledge, highlighting emerging research directions and technological challenges for future studies on DLT applications in tourism. Full article
Show Figures

Figure 1

13 pages, 994 KB  
Article
Privacy-Preserving Average-Tracking Control for Multi-Agent Systems with Constant Reference Signals
by Wei Jiang and Cheng-Lin Liu
Entropy 2026, 28(1), 120; https://doi.org/10.3390/e28010120 - 19 Jan 2026
Viewed by 35
Abstract
This paper addresses the average-tracking control problem for multi-agent systems subject to constant reference signals. By introducing auxiliary signals generated from the states and delayed states of agents, a novel privacy-preserving integral-type average-tracking algorithm is proposed. Leveraging the frequency-domain analysis approach, delay-dependent sufficient [...] Read more.
This paper addresses the average-tracking control problem for multi-agent systems subject to constant reference signals. By introducing auxiliary signals generated from the states and delayed states of agents, a novel privacy-preserving integral-type average-tracking algorithm is proposed. Leveraging the frequency-domain analysis approach, delay-dependent sufficient and necessary conditions for ensuring asymptotic average-tracking convergence are derived. Furthermore, the proposed algorithm is extended to tackle the average-tracking control problem with mismatched reference signals, and a corresponding delay-dependent sufficient condition is established to guarantee privacy-preserving average-tracking convergence. Numerical simulations are conducted to verify the effectiveness of the developed algorithms. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

40 pages, 3201 KB  
Article
Scalable Satellite-Assisted Adaptive Federated Learning for Robust Precision Farming
by Sai Puppala and Koushik Sinha
Agronomy 2026, 16(2), 229; https://doi.org/10.3390/agronomy16020229 - 18 Jan 2026
Viewed by 92
Abstract
Dynamic network conditions in precision agriculture motivate a scalable, privacypreserving federated learning architecture that tightly integrates ground-based edge intelligence with a space-assisted hierarchical aggregation layer. In Phase 1, heterogeneous tractors act as intelligent farm nodes that train local models, form capability- and task-aware [...] Read more.
Dynamic network conditions in precision agriculture motivate a scalable, privacypreserving federated learning architecture that tightly integrates ground-based edge intelligence with a space-assisted hierarchical aggregation layer. In Phase 1, heterogeneous tractors act as intelligent farm nodes that train local models, form capability- and task-aware clusters, and employ Network Quality Index (NQI)-driven scheduling, similarity-based checkpointing, and compressed transmissions to cope with highly variable 3G/4G/5G connectivity. In Phase 2, cluster drivers synchronize with Low Earth Orbit (LEO) and Geostationary Earth Orbit (GEO) satellites that perform regional and global aggregation using staleness- and fairness-aware weighting, while end-to-end Salsa20 + MAC encryption preserves the confidentiality and integrity of all model updates. Across two representative tasks—nutrient prediction and crop health assessment—our full hierarchical system matches or exceeds centralized performance (e.g., AUC 0.92 vs. 0.91 for crop health) while reducing uplink traffic by ∼90% relative to vanilla FedAvg and cutting the communication energy proxy by more than 4×. The proposed fairness-aware GEO aggregation substantially narrows regional performance gaps (standard deviation of AUC across regions reduced from 0.058 to 0.017) and delivers the largest gains in low-connectivity areas (AUC 0.74 → 0.88). These results demonstrate that coupling on-farm intelligence with multi-orbit federated aggregation enables near-centralized model quality, strong privacy guarantees, and communication efficiency suitable for large-scale, connectivity-challenged agricultural deployments. Full article
(This article belongs to the Collection AI, Sensors and Robotics for Smart Agriculture)
Show Figures

Figure 1

Back to TopTop