Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (482)

Search Parameters:
Keywords = thefts

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
35 pages, 3122 KiB  
Article
Blockchain-Driven Smart Contracts for Advanced Authorization and Authentication in Cloud Security
by Mohammed Naif Alatawi
Electronics 2025, 14(15), 3104; https://doi.org/10.3390/electronics14153104 - 4 Aug 2025
Viewed by 200
Abstract
The increasing reliance on cloud services demands advanced security mechanisms to protect sensitive data and ensure robust access control. This study addresses critical challenges in cloud security by proposing a novel framework that integrates blockchain-based smart contracts to enhance authorization and authentication processes. [...] Read more.
The increasing reliance on cloud services demands advanced security mechanisms to protect sensitive data and ensure robust access control. This study addresses critical challenges in cloud security by proposing a novel framework that integrates blockchain-based smart contracts to enhance authorization and authentication processes. Smart contracts, as self-executing agreements embedded with predefined rules, enable decentralized, transparent, and tamper-proof mechanisms for managing access control in cloud environments. The proposed system mitigates prevalent threats such as unauthorized access, data breaches, and identity theft through an immutable and auditable security framework. A prototype system, developed using Ethereum blockchain and Solidity programming, demonstrates the feasibility and effectiveness of the approach. Rigorous evaluations reveal significant improvements in key metrics: security, with a 0% success rate for unauthorized access attempts; scalability, maintaining low response times for up to 100 concurrent users; and usability, with an average user satisfaction rating of 4.4 out of 5. These findings establish the efficacy of smart contract-based solutions in addressing critical vulnerabilities in cloud services while maintaining operational efficiency. The study underscores the transformative potential of blockchain and smart contracts in revolutionizing cloud security practices. Future research will focus on optimizing the system’s scalability for higher user loads and integrating advanced features such as adaptive authentication and anomaly detection for enhanced resilience across diverse cloud platforms. Full article
Show Figures

Figure 1

36 pages, 1010 KiB  
Article
SIBERIA: A Self-Sovereign Identity and Multi-Factor Authentication Framework for Industrial Access
by Daniel Paredes-García, José Álvaro Fernández-Carrasco, Jon Ander Medina López, Juan Camilo Vasquez-Correa, Imanol Jericó Yoldi, Santiago Andrés Moreno-Acevedo, Ander González-Docasal, Haritz Arzelus Irazusta, Aitor Álvarez Muniain and Yeray de Diego Loinaz
Appl. Sci. 2025, 15(15), 8589; https://doi.org/10.3390/app15158589 (registering DOI) - 2 Aug 2025
Viewed by 258
Abstract
The growing need for secure and privacy-preserving identity management in industrial environments has exposed the limitations of traditional, centralized authentication systems. In this context, SIBERIA was developed as a modular solution that empowers users to control their own digital identities, while ensuring robust [...] Read more.
The growing need for secure and privacy-preserving identity management in industrial environments has exposed the limitations of traditional, centralized authentication systems. In this context, SIBERIA was developed as a modular solution that empowers users to control their own digital identities, while ensuring robust protection of critical services. The system is designed in alignment with European standards and regulations, including EBSI, eIDAS 2.0, and the GDPR. SIBERIA integrates a Self-Sovereign Identity (SSI) framework with a decentralized blockchain-based infrastructure for the issuance and verification of Verifiable Credentials (VCs). It incorporates multi-factor authentication by combining a voice biometric module, enhanced with spoofing-aware techniques to detect synthetic or replayed audio, and a behavioral biometrics module that provides continuous authentication by monitoring user interaction patterns. The system enables secure and user-centric identity management in industrial contexts, ensuring high resistance to impersonation and credential theft while maintaining regulatory compliance. SIBERIA demonstrates that it is possible to achieve both strong security and user autonomy in digital identity systems by leveraging decentralized technologies and advanced biometric verification methods. Full article
(This article belongs to the Special Issue Blockchain and Distributed Systems)
Show Figures

Figure 1

34 pages, 5784 KiB  
Article
A Method for Assessment of Power Consumption Change in Distribution Grid Branch After Consumer Load Change
by Marius Saunoris, Julius Šaltanis, Robertas Lukočius, Vytautas Daunoras, Kasparas Zulonas, Evaldas Vaičiukynas and Žilvinas Nakutis
Appl. Sci. 2025, 15(15), 8299; https://doi.org/10.3390/app15158299 - 25 Jul 2025
Viewed by 158
Abstract
This research targets prediction of power consumption change (PCC) in the branch of electrical distribution grid between a sum meter and consumer meter in response to consumer load change. The problem is relevant for power preservation law-based event-driven methods aiming for detection of [...] Read more.
This research targets prediction of power consumption change (PCC) in the branch of electrical distribution grid between a sum meter and consumer meter in response to consumer load change. The problem is relevant for power preservation law-based event-driven methods aiming for detection of anomalies like meter errors, electricity thefts, etc. The PCC in the branch is due to the change of technical (wiring) losses as well as change of power consumption of loads connected to the same distribution branch. Using synthesized dataset set a data-driven model is built to predict PCC in the branch. Model performance is assessed using root mean squared error (RMSE), mean absolute, and mean relative error, together with their standard deviations. The preliminary experimental verification using a test bed confirmed the potential of the method. The accuracy of the PCC in the branch prediction is influenced by the systematic error of the meters. Therefore, the error of the consumer meter and the PCC in the branch cannot be evaluated separately. It was observed that the absolute error of the estimate of power measurement gain error was observed to be within ±0.3% and the relative error of PCC in the branch prediction was within ±10%. Full article
Show Figures

Figure 1

21 pages, 2308 KiB  
Article
Forgery-Aware Guided Spatial–Frequency Feature Fusion for Face Image Forgery Detection
by Zhenxiang He, Zhihao Liu and Ziqi Zhao
Symmetry 2025, 17(7), 1148; https://doi.org/10.3390/sym17071148 - 18 Jul 2025
Viewed by 335
Abstract
The rapid development of deepfake technologies has led to the widespread proliferation of facial image forgeries, raising significant concerns over identity theft and the spread of misinformation. Although recent dual-domain detection approaches that integrate spatial and frequency features have achieved noticeable progress, they [...] Read more.
The rapid development of deepfake technologies has led to the widespread proliferation of facial image forgeries, raising significant concerns over identity theft and the spread of misinformation. Although recent dual-domain detection approaches that integrate spatial and frequency features have achieved noticeable progress, they still suffer from limited sensitivity to local forgery regions and inadequate interaction between spatial and frequency information in practical applications. To address these challenges, we propose a novel forgery-aware guided spatial–frequency feature fusion network. A lightweight U-Net is employed to generate pixel-level saliency maps by leveraging structural symmetry and semantic consistency, without relying on ground-truth masks. These maps dynamically guide the fusion of spatial features (from an improved Swin Transformer) and frequency features (via Haar wavelet transforms). Cross-domain attention, channel recalibration, and spatial gating are introduced to enhance feature complementarity and regional discrimination. Extensive experiments conducted on two benchmark face forgery datasets, FaceForensics++ and Celeb-DFv2, show that the proposed method consistently outperforms existing state-of-the-art techniques in terms of detection accuracy and generalization capability. The future work includes improving robustness under compression, incorporating temporal cues, extending to multimodal scenarios, and evaluating model efficiency for real-world deployment. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

21 pages, 1689 KiB  
Article
Exploring LLM Embedding Potential for Dementia Detection Using Audio Transcripts
by Brandon Alejandro Llaca-Sánchez, Luis Roberto García-Noguez, Marco Antonio Aceves-Fernández, Andras Takacs and Saúl Tovar-Arriaga
Eng 2025, 6(7), 163; https://doi.org/10.3390/eng6070163 - 17 Jul 2025
Viewed by 327
Abstract
Dementia is a neurodegenerative disorder characterized by progressive cognitive impairment that significantly affects daily living. Early detection of Alzheimer’s disease—the most common form of dementia—remains essential for prompt intervention and treatment, yet clinical diagnosis often requires extensive and resource-intensive procedures. This article explores [...] Read more.
Dementia is a neurodegenerative disorder characterized by progressive cognitive impairment that significantly affects daily living. Early detection of Alzheimer’s disease—the most common form of dementia—remains essential for prompt intervention and treatment, yet clinical diagnosis often requires extensive and resource-intensive procedures. This article explores the effectiveness of automated Natural Language Processing (NLP) methods for identifying Alzheimer’s indicators from audio transcriptions of the Cookie Theft picture description task in the PittCorpus dementia database. Five NLP approaches were compared: a classical Tf–Idf statistical representation and embeddings derived from large language models (GloVe, BERT, Gemma-2B, and Linq-Embed-Mistral), each integrated with a logistic regression classifier. Transcriptions were carefully preprocessed to preserve linguistically relevant features such as repetitions, self-corrections, and pauses. To compare the performance of the five approaches, a stratified 5-fold cross-validation was conducted; the best results were obtained with BERT embeddings (84.73% accuracy) closely followed by the simpler Tf–Idf approach (83.73% accuracy) and the state-of-the-art model Linq-Embed-Mistral (83.54% accuracy), while Gemma-2B and GloVe embeddings yielded slightly lower performances (80.91% and 78.11% accuracy, respectively). Contrary to initial expectations—that richer semantic and contextual embeddings would substantially outperform simpler frequency-based methods—the competitive accuracy of Tf–Idf suggests that the choice and frequency of the words used might be more important than semantic or contextual information in Alzheimer’s detection. This work represents an effort toward implementing user-friendly software capable of offering an initial indicator of Alzheimer’s risk, potentially reducing the need for an in-person clinical visit. Full article
Show Figures

Figure 1

14 pages, 462 KiB  
Article
The Role of Boredom in the Development of Risky Behaviours Among Adolescents
by Bruno Matijašević, Snježana Mališa and Antonija Vukašinović
Adolescents 2025, 5(3), 36; https://doi.org/10.3390/adolescents5030036 - 11 Jul 2025
Viewed by 360
Abstract
Background: Boredom is a common but insufficiently explored experience in adolescence, which has been increasingly linked to the development of risky behaviours. This study explores the extent to which boredom predicts engagement in various risky behaviours among adolescents aged 15 to 17. Methods: [...] Read more.
Background: Boredom is a common but insufficiently explored experience in adolescence, which has been increasingly linked to the development of risky behaviours. This study explores the extent to which boredom predicts engagement in various risky behaviours among adolescents aged 15 to 17. Methods: A cross-sectional study on a sample of 281 high-school students in Croatia was performed in 2024. The participants completed a structured online questionnaire, including validated scales measuring their proneness to boredom, substance use, disordered eating, theft, and cyberbullying. Data were analysed using non-parametric tests, correlation coefficients, and linear regression. Results: Boredom showed a significant association with all forms of risky behaviour, with the strongest association found for disordered eating. Moderate predictive ability was observed for alcohol, marijuana, and drug use, while weaker but significant associations with cyberbullying and theft were also found. Male adolescents reported higher involvement in certain risky behaviours, although no significant gender differences were observed in boredom levels. Conclusions: Boredom is a developmental risk factor, notably when leisure time lacks structure and meaning. While the cross-sectional design of this study limits causal conclusions, the findings highlight the importance of taking boredom into consideration regarding pedagogical prevention efforts. Pedagogical activities targeting quality leisure time, especially within schools and families, may reduce adolescents’ susceptibility to harmful behaviours. Full article
(This article belongs to the Special Issue Implicit Measures of Risky Behaviors in Adolescence)
Show Figures

Figure 1

20 pages, 2883 KiB  
Article
Sustainable Daily Mobility and Bike Security
by Sergej Gričar, Christian Stipanović and Tea Baldigara
Sustainability 2025, 17(14), 6262; https://doi.org/10.3390/su17146262 - 8 Jul 2025
Viewed by 285
Abstract
As climate change concerns, urban congestion, and environmental degradation intensify, cities prioritise cycling as a sustainable transport option to reduce CO2 emissions and improve quality of life. However, rampant bicycle theft and poor security infrastructure often deter daily commuters and tourists from [...] Read more.
As climate change concerns, urban congestion, and environmental degradation intensify, cities prioritise cycling as a sustainable transport option to reduce CO2 emissions and improve quality of life. However, rampant bicycle theft and poor security infrastructure often deter daily commuters and tourists from cycling. This study explores how advanced security measures can bolster sustainable urban mobility and tourism by addressing these challenges. A mixed-methods approach is utilised, incorporating primary survey data from Slovenia and secondary data on bicycle sales, imports and thefts from 2015 to 2024. Findings indicate that access to secure parking substantially enhances users’ sense of safety when commuting by bike. Regression analysis shows that for every 1000 additional bicycles sold, approximately 280 more thefts occur—equivalent to a 0.28 rise in reported thefts—highlighting a systemic vulnerability associated with sustainability-oriented behaviour. To bridge this gap, the study advocates for an innovative security framework that combines blockchain technology and Non-Fungible Tokens (NFTs) with encrypted Quick Response (QR) codes. Each bicycle would receive a tamper-proof QR code connected to a blockchain-verified NFT documenting ownership and usage data. This system facilitates real-time authentication, enhances traceability, deters theft, and builds trust in cycling as a dependable transport alternative. The proposed solution merges sustainable transport, digital identity, and urban security, presenting a scalable model for individual users and shared mobility systems. Full article
(This article belongs to the Collection Reshaping Sustainable Tourism in the Horizon 2050)
Show Figures

Figure 1

25 pages, 668 KiB  
Article
Bridging the Energy Divide: An Analysis of the Socioeconomic and Technical Factors Influencing Electricity Theft in Kinshasa, DR Congo
by Patrick Kankonde and Pitshou Bokoro
Energies 2025, 18(13), 3566; https://doi.org/10.3390/en18133566 - 7 Jul 2025
Viewed by 387
Abstract
Electricity theft remains a persistent challenge, particularly in developing economies where infrastructure limitations and socioeconomic disparities contribute to illegal connections. This study analyzes the determinants influencing electricity theft in Kinshasa, the Democratic Republic of Congo, using a logistic regression model applied to 385 [...] Read more.
Electricity theft remains a persistent challenge, particularly in developing economies where infrastructure limitations and socioeconomic disparities contribute to illegal connections. This study analyzes the determinants influencing electricity theft in Kinshasa, the Democratic Republic of Congo, using a logistic regression model applied to 385 observations, which includes random bootstrapping sampling for enhanced stability and power analysis validation to confirm the adequacy of the sample size. The model achieved an AUC of 0.86, demonstrating strong discriminatory power, while the Hosmer–Lemeshow test (p = 0.471) confirmed its robust fit. Our findings indicate that electricity supply quality, financial stress, tampering awareness, and billing transparency are key predictors of theft likelihood. Households experiencing unreliable service and economic hardship showed higher theft probability, while those receiving regular invoices and alternative legal energy solutions exhibited lower risk. Lasso regression was implemented to refine predictor selection, ensuring model efficiency. Based on these insights, a multifaceted policy approach—including grid modernization, prepaid billing systems, awareness campaigns, and regulatory enforcement—is recommended to mitigate electricity theft and promote sustainable energy access in urban environments. Full article
(This article belongs to the Section F4: Critical Energy Infrastructure)
Show Figures

Figure 1

20 pages, 12090 KiB  
Article
Research on a Crime Spatiotemporal Prediction Method Integrating Informer and ST-GCN: A Case Study of Four Crime Types in Chicago
by Yuxiao Fan, Xiaofeng Hu and Jinming Hu
Big Data Cogn. Comput. 2025, 9(7), 179; https://doi.org/10.3390/bdcc9070179 - 3 Jul 2025
Viewed by 525
Abstract
As global urbanization accelerates, communities have emerged as key areas where social conflicts and public safety risks clash. Traditional crime prevention models experience difficulties handling dynamic crime hotspots due to data lags and poor spatiotemporal resolution. Therefore, this study proposes a hybrid model [...] Read more.
As global urbanization accelerates, communities have emerged as key areas where social conflicts and public safety risks clash. Traditional crime prevention models experience difficulties handling dynamic crime hotspots due to data lags and poor spatiotemporal resolution. Therefore, this study proposes a hybrid model combining Informer and Spatiotemporal Graph Convolutional Network (ST-GCN) to achieve precise crime prediction at the community level. By employing a community topology and incorporating historical crime, weather, and holiday data, ST-GCN captures spatiotemporal crime trends, while Informer identifies temporal dependencies. Moreover, the model leverages a fully connected layer to map features to predicted latitudes. The experimental results from 320,000 crime records from 22 police districts in Chicago, IL, USA, from 2015 to 2020 show that our model outperforms traditional and deep learning models in predicting assaults, robberies, property damage, and thefts. Specifically, the mean average error (MAE) is 0.73 for assaults, 1.36 for theft, 1.03 for robbery, and 1.05 for criminal damage. In addition, anomalous event fluctuations are effectively captured. The results indicate that our model furthers data-driven public safety governance through spatiotemporal dependency integration and long-sequence modeling, facilitating dynamic crime hotspot prediction and resource allocation optimization. Future research should integrate multisource socioeconomic data to further enhance model adaptability and cross-regional generalization capabilities. Full article
Show Figures

Figure 1

21 pages, 666 KiB  
Article
Efficient and Accurate Zero-Day Electricity Theft Detection from Smart Meter Sensor Data Using Prototype and Ensemble Learning
by Alyaman H. Massarani, Mahmoud M. Badr, Mohamed Baza, Hani Alshahrani and Ali Alshehri
Sensors 2025, 25(13), 4111; https://doi.org/10.3390/s25134111 - 1 Jul 2025
Viewed by 705
Abstract
Electricity theft remains a pressing challenge in modern smart grid systems, leading to significant economic losses and compromised grid stability. This paper presents a sensor-driven framework for electricity theft detection that leverages data collected from smart meter sensors, key components in smart grid [...] Read more.
Electricity theft remains a pressing challenge in modern smart grid systems, leading to significant economic losses and compromised grid stability. This paper presents a sensor-driven framework for electricity theft detection that leverages data collected from smart meter sensors, key components in smart grid monitoring infrastructure. The proposed approach combines prototype learning and meta-level ensemble learning to develop a scalable and accurate detection model, capable of identifying zero-day attacks that are not present in the training data. Smart meter data is compressed using Principal Component Analysis (PCA) and K-means clustering to extract representative consumption patterns, i.e., prototypes, achieving a 92% reduction in dataset size while preserving critical anomaly-relevant features. These prototypes are then used to train base-level one-class classifiers, specifically the One-Class Support Vector Machine (OCSVM) and the Gaussian Mixture Model (GMM). The outputs of these classifiers are normalized and fused in a meta-OCSVM layer, which learns decision boundaries in the transformed score space. Experimental results using the Irish CER Smart Metering Project (SMP) dataset show that the proposed sensor-based detection framework achieves superior performance, with an accuracy of 88.45% and a false alarm rate of just 13.85%, while reducing training time by over 75%. By efficiently processing high-frequency smart meter sensor data, this model contributes to developing real-time and energy-efficient anomaly detection systems in smart grid environments. Full article
Show Figures

Figure 1

23 pages, 324 KiB  
Article
Forced Fraud: The Financial Exploitation of Human Trafficking Victims
by Michael Schidlow
Soc. Sci. 2025, 14(7), 398; https://doi.org/10.3390/socsci14070398 - 23 Jun 2025
Viewed by 1055
Abstract
Human trafficking, a grave violation of human rights, frequently intersects with financial crimes, notably identity theft and coercive debt accumulation. This creates complex challenges for victims, survivors, and law enforcement. Victims of human trafficking are often coerced and/or threatened into committing various forms [...] Read more.
Human trafficking, a grave violation of human rights, frequently intersects with financial crimes, notably identity theft and coercive debt accumulation. This creates complex challenges for victims, survivors, and law enforcement. Victims of human trafficking are often coerced and/or threatened into committing various forms of crime, referred to as “forced criminality.” In recent years, this trend of criminality has moved from violent crimes to financial crimes and fraud, including identity theft, synthetic identity fraud, and serving as money mules. This phenomenon, termed “forced fraud”, exacerbates the already severe trauma experienced by victims (referred to as both victims and survivors throughout, consistent with trauma-informed terminology) trapping them in a cycle of financial instability and legal complications. Traffickers often coerce their victims into opening credit lines, taking out loans, or committing fraud all in their own names, leading to ruined credit histories and insurmountable debt. These financial burdens make it extremely difficult for survivors to rebuild their lives post-trafficking. This paper explores the mechanisms of forced fraud, its impact on survivors, and the necessary legislative and financial interventions to support survivors. By examining first-hand accounts and social and policy efforts from a range of sources, this paper highlights the urgent need for comprehensive support systems that address both the immediate and long-term financial repercussions of human trafficking. Full article
14 pages, 1581 KiB  
Article
Multi-Party Controlled Semi-Quantum Dialogue Protocol Based on Hyperentangled Bell States
by Meng-Na Zhao, Ri-Gui Zhou and Yun-Hao Feng
Entropy 2025, 27(7), 666; https://doi.org/10.3390/e27070666 - 21 Jun 2025
Viewed by 300
Abstract
To solve the fundamental problem of excessive consumption of classical resources and the simultaneous security vulnerabilities in semi-quantum dialogue systems, a multi-party controlled semi-quantum dialogue protocol based on hyperentangled Bell states is proposed. A single controlling party is vulnerable to information compromise due [...] Read more.
To solve the fundamental problem of excessive consumption of classical resources and the simultaneous security vulnerabilities in semi-quantum dialogue systems, a multi-party controlled semi-quantum dialogue protocol based on hyperentangled Bell states is proposed. A single controlling party is vulnerable to information compromise due to tampering or betrayal; the multi-party controlled mechanism (Charlie1 to Charlien) in this protocol establishes a distributed trust model. It mandates collective authorization from all controlling parties, significantly enhancing its robust resilience against untrustworthy controllers or collusion attacks. The classical participant Bob uses an adaptive Huffman compression algorithm to provide a framework for information transmission. This encoding mechanism assigns values to each character by constructing a Huffman tree, generating optimal prefix codes that significantly optimize the storage space complexity for the classical participant. By integrating the “immediate measurement and transmission” mechanism into the multi-party controlled semi-quantum dialogue protocol and coupling it with Huffman compression coding technology, this framework enables classical parties to execute encoding and decoding operations. The security of this protocol is rigorously proven through information-theoretic analysis and shows that it is resistant to common attacks. Furthermore, even in the presence of malicious controlling parties, this protocol robustly safeguards secret information against theft. The efficiency analysis shows that the proposed protocol provides benefits such as high communication efficiency and lower resource consumption for classical participants. Full article
(This article belongs to the Section Quantum Information)
Show Figures

Figure 1

23 pages, 519 KiB  
Article
Food Insecurity During COVID-19 in Cameroon: Associated Factors and Adaptation Strategies
by Atanase Yene and Sophie Michelle Eke Balla
Economies 2025, 13(6), 172; https://doi.org/10.3390/economies13060172 - 14 Jun 2025
Viewed by 351
Abstract
This study seeks to identify the factors driving household food insecurity in Cameroon during the COVID-19 pandemic, examine the effects of coping strategies on household resilience, and explore complementarities among these strategies. We used data from the COVID-19 panel surveys conducted by the [...] Read more.
This study seeks to identify the factors driving household food insecurity in Cameroon during the COVID-19 pandemic, examine the effects of coping strategies on household resilience, and explore complementarities among these strategies. We used data from the COVID-19 panel surveys conducted by the National Institute of Statistics of Cameroon. Three models are estimated: an ordered logit model for food insecurity factors, a logit model for the impact of coping strategies, and a multivariate probit model for complementarities. The findings reveal that food insecurity is exacerbated by conflict, socio economic shocks (e.g., loss of employment, crop theft), and price hikes. About 28.59% of households are resilient, mainly due to past savings, cash transfers, free food, and in-kind transfers. The study emphasizes the importance of social and governmental support to mitigate food insecurity during crises, and underscores the need for monitoring socio-economic conditions during pandemics and other crises. Full article
Show Figures

Figure 1

29 pages, 1412 KiB  
Review
Cryptography-Based Secure Underwater Acoustic Communication for UUVs: A Review
by Qian Zhou, Qing Ye, Chengzhe Lai and Guangyue Kou
Electronics 2025, 14(12), 2415; https://doi.org/10.3390/electronics14122415 - 13 Jun 2025
Viewed by 811
Abstract
Unmanned Underwater Vehicles (UUVs) play an irreplaceable role in marine exploration, environmental monitoring, and national defense. The UUV depends on underwater acoustic communication (UAC) technology to enable reliable data transmission and support efficient collaboration. As the complexity of UUV missions has increased, secure [...] Read more.
Unmanned Underwater Vehicles (UUVs) play an irreplaceable role in marine exploration, environmental monitoring, and national defense. The UUV depends on underwater acoustic communication (UAC) technology to enable reliable data transmission and support efficient collaboration. As the complexity of UUV missions has increased, secure UAC has become a critical element in ensuring successful mission execution. However, underwater channels are inherently characterized by high error rates, limited bandwidth, and signal interference. These problems severely limit the efficacy of traditional security methods and expose UUVs to the risk of data theft and signaling attacks. Cryptography-based security methods are important means to protect data, effectively balancing security requirements and resource constraints. They provide technical support for UUVs to build secure communication. This paper systematically reviews key advances in cryptography-based secure UAC technologies, focusing on three main areas: (1) efficient authentication protocols, (2) lightweight cryptographic algorithms, and (3) fast cryptographic synchronization algorithms. By comparing the performance boundaries and application scenarios of various technologies, we discuss the current challenges and critical issues in underwater secure communication. Finally, we explore future research directions, aiming to provide theoretical references and technical insights for the further development of secure UAC technologies for UUVs. Full article
Show Figures

Figure 1

21 pages, 4215 KiB  
Article
Real-Time Classification of Distributed Fiber Optic Monitoring Signals Using a 1D-CNN-SVM Framework for Pipeline Safety
by Rui Sima, Baikang Zhu, Fubin Wang, Yi Wang, Zhiyuan Zhang, Cuicui Li, Ziwen Wu and Bingyuan Hong
Processes 2025, 13(6), 1825; https://doi.org/10.3390/pr13061825 - 9 Jun 2025
Viewed by 562
Abstract
The growing reliance on natural gas in urban China has heightened the urgency of maintaining pipeline integrity, particularly in environments prone to disruption by nearby construction activities. In this study, we present a practical approach for the real-time classification of distributed fiber optic [...] Read more.
The growing reliance on natural gas in urban China has heightened the urgency of maintaining pipeline integrity, particularly in environments prone to disruption by nearby construction activities. In this study, we present a practical approach for the real-time classification of distributed fiber optic monitoring signals, leveraging a hybrid framework that combines the feature learning capacity of a one-dimensional convolutional neural network (1D-CNN) with the classification robustness of a support vector machine (SVM). The proposed method effectively distinguishes various pipeline-related events—such as minor leakage, theft attempts, and human movement—by automatically extracting their vibration patterns. Notably, it addresses the common shortcomings of softmax-based classifiers in small-sample scenarios. When tested on a real-world dataset collected via the DAS3000 system from Hangzhou Optosensing Co., Ltd., the model achieved a high classification accuracy of 99.92% across six event types, with an average inference latency of just 0.819 milliseconds per signal. These results demonstrate its strong potential for rapid anomaly detection in pipeline systems. Beyond technical performance, the method offers three practical benefits: it integrates well with current monitoring infrastructures, significantly reduces manual inspection workloads, and provides early warnings for potential pipeline threats. Overall, this work lays the groundwork for a scalable, machine learning-enhanced solution aimed at ensuring the operational safety of critical energy assets. Full article
(This article belongs to the Section Process Control and Monitoring)
Show Figures

Figure 1

Back to TopTop