Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (40,440)

Search Parameters:
Keywords = Security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 3169 KiB  
Article
Comparative Analysis of Perturbation Techniques in LIME for Intrusion Detection Enhancement
by Mantas Bacevicius, Agne Paulauskaite-Taraseviciene, Gintare Zokaityte, Lukas Kersys and Agne Moleikaityte
Mach. Learn. Knowl. Extr. 2025, 7(1), 21; https://doi.org/10.3390/make7010021 (registering DOI) - 21 Feb 2025
Abstract
The growing sophistication of cyber threats necessitates robust and interpretable intrusion detection systems (IDS) to safeguard network security. While machine learning models such as Decision Tree (DT), Random Forest (RF), k-Nearest Neighbors (K-NN), and XGBoost demonstrate high effectiveness in detecting malicious activities, their [...] Read more.
The growing sophistication of cyber threats necessitates robust and interpretable intrusion detection systems (IDS) to safeguard network security. While machine learning models such as Decision Tree (DT), Random Forest (RF), k-Nearest Neighbors (K-NN), and XGBoost demonstrate high effectiveness in detecting malicious activities, their interpretability decreases as their complexity and accuracy increase, posing challenges for critical cybersecurity applications. Local Interpretable Model-agnostic Explanations (LIME) is widely used to address this limitation; however, its reliance on normal distribution for perturbations often fails to capture the non-linear and imbalanced characteristics of datasets like CIC-IDS-2018. To address these challenges, we propose a modified LIME perturbation strategy using Weibull, Gamma, Beta, and Pareto distributions to better capture the characteristics of network traffic data. Our methodology improves the stability of different ML models trained on CIC-IDS datasets, enabling more meaningful and reliable explanations of model predictions. The proposed modifications allow for an increase in explanation fidelity by up to 78% compared to the default Gaussian approach. Pareto-based perturbations provide the best results. Among all distributions tested, Pareto consistently yielded the highest explanation fidelity and stability, particularly for K-NN ( = 0.9971, S = 0.9907) and DT ( = 0.9267, S = 0.9797). This indicates that heavy-tailed distributions fit well with real-world network traffic patterns, reducing the variance in attribute importance explanations and making them more robust. Full article
(This article belongs to the Special Issue Advances in Explainable Artificial Intelligence (XAI): 3rd Edition)
20 pages, 28514 KiB  
Article
Enhancing Pear Tree Yield Estimation Accuracy by Assimilating LAI and SM into the WOFOST Model Based on Satellite Remote Sensing Data
by Zehua Fan, Yasen Qin, Jianan Chi and Ning Yan
Agriculture 2025, 15(5), 464; https://doi.org/10.3390/agriculture15050464 (registering DOI) - 21 Feb 2025
Abstract
In modern agriculture, timely and accurate crop yield information is crucial for optimising agricultural production management and resource allocation. This study focused on improving the prediction accuracy of pear yields. Taking Alar City, Xinjiang, China as the research area, a variety of data [...] Read more.
In modern agriculture, timely and accurate crop yield information is crucial for optimising agricultural production management and resource allocation. This study focused on improving the prediction accuracy of pear yields. Taking Alar City, Xinjiang, China as the research area, a variety of data including leaf area index (LAI), soil moisture (SM) and remote sensing data were collected, covering four key periods of pear growth. Three advanced algorithms, Partial Least Squares Regression (PLSR), Support Vector Regression (SVR) and Random Forest (RF), were used to construct the regression models of LAI and vegetation index in four key periods using Sentinel-2 satellite remote sensing data. The results showed that the RF algorithm provided the best results when inverting the LAI. The coefficients of determination (R2) were 0.73, 0.72, 0.76, and 0.77 for the four periods, respectively, and the root-mean-square errors (RMSE) were 0.21 m2/m2, 0.24 m2/m2, 0.18 m2/m2, and 0.16 m2/m2, respectively. Therefore, the RF algorithm was selected as the preferred method for LAI inversion in this study. Subsequently, the study further explored the potential of data assimilation techniques in enhancing the accuracy of pear yield simulation. LAI and SM were incorporated into the World Food Studies (WOFOST) crop growth model by four assimilation algorithms, namely, the Four-Dimensional Variational Approach (4D-Var), Particle Swarm Optimisation (PSO) algorithm, Ensemble Kalman Filter (EnKF), and Particle Filter (PF) in separate and joint assimilation, respectively. The experimental results showed that the assimilated model significantly improved the accuracy of yield prediction compared to the unassimilated model. In particular, the EnKF algorithm provided the highest accuracy in yield estimation with R2 of 0.82, 0.79 and RMSE of 1056 kg/ha and 1385 kg/ha when LAI alone and SM alone were assimilated, whereas 4D-Var performed the best when LAI and SM were jointly assimilated, with R2 as high as 0.88, and the RMSE reduced to 923 kg/ha. In addition, it was found that assimilating LAI outperformed assimilating SM when assimilating one variable, whereas joint assimilation of LAI and SM further enhanced the predictive performance beyond that of assimilating one variable alone. In summary, the present study demonstrated great potential to provide strong support for accurate prediction of pear yield by effectively integrating LAI and SM into crop growth models through data assimilation. Full article
(This article belongs to the Section Digital Agriculture)
Show Figures

Figure 1

Figure 1
<p>Technical route of pear growth monitoring and yield prediction based on Remote Sensing Inversion and data assimilation.</p>
Full article ">Figure 2
<p>Study area and sample collection sites.</p>
Full article ">Figure 3
<p>Maximum and minimum temperature, irradiation, wind speed, precipitation in the study area.</p>
Full article ">Figure 4
<p>Time-series variation of satellite vegetation indices in four periods.</p>
Full article ">Figure 5
<p>Plot of simulation results of the calibrated WOFOST model.</p>
Full article ">Figure 6
<p>Plot of RF regression model results (<b>a</b>–<b>d</b>) are RF regression models for 17 June, 7 July, 2 August and 4 September 2023, respectively. R<sup>2</sup>-C denotes the training data coefficient of determination and RMSE-C denotes the training data root mean square error. R<sup>2</sup>-V denotes the validation data coefficient of determination and RMSE-V denotes the validation data root mean square error.).</p>
Full article ">Figure 7
<p>Classification of pear trees in Alar.</p>
Full article ">Figure 8
<p>LAI inversion results of pear orchards in June in Alar region.</p>
Full article ">Figure 9
<p>LAI inversion results of pear orchards in July in Alar region.</p>
Full article ">Figure 10
<p>LAI inversion results of pear orchards in August in Alar region.</p>
Full article ">Figure 11
<p>LAI inversion results of pear orchards in September in Alar region.</p>
Full article ">Figure 12
<p>Yield Forecast Results Chart. (<b>a</b>–<b>c</b>) are yield simulations of 4D-Var assimilating LAI and SM jointly, EnKF assimilating LAI alone, and EnKF assimilating SM alone.</p>
Full article ">
21 pages, 902 KiB  
Article
Efficient Top-k Spatial Dataset Search Processing
by Jie Sun, Hua Dai, Mingyue Zhang, Hao Zhou, Pengyue Li, Geng Yang and Lei Chen
Appl. Sci. 2025, 15(5), 2321; https://doi.org/10.3390/app15052321 (registering DOI) - 21 Feb 2025
Abstract
In this paper, we introduce two novel top-k spatial dataset search schemes, KSDS and KSDS+. The core innovation of these schemes lies in partitioning the spatial datasets into grids and assessing similarity based on the distribution of points within these grids. This [...] Read more.
In this paper, we introduce two novel top-k spatial dataset search schemes, KSDS and KSDS+. The core innovation of these schemes lies in partitioning the spatial datasets into grids and assessing similarity based on the distribution of points within these grids. This approach provides a robust foundation for spatial dataset search. To optimize search performance, we have developed an optimized scheme that incorporates two key strategies: a GMBR-based optimization strategy and a pooling-based optimization strategy. These strategies are designed to filter datasets to significantly improve search efficiency. Our experimental results demonstrate that KSDS and KSDS+ can perform top-k spatial dataset searches with both high effectiveness and efficiency, outpacing existing methods in terms of search speed. In the future, our research will explore other similarity-calculation models to further accelerate processing times. Additionally, we aim to integrate privacy-preserving techniques to ensure secure dataset searches. These advancements are intended to enhance the practicality and efficiency of spatial dataset searches in real-world applications. Full article
(This article belongs to the Special Issue Innovative Data Mining Techniques for Advanced Recommender Systems)
17 pages, 2653 KiB  
Article
Spatiotemporal Patterns in Production and Consumption of Major Foods in Qinghai, China
by Yexuan Liu, Lin Zhen, Quanqin Shao, Junzhi Ye and Siliang Xie
Foods 2025, 14(5), 736; https://doi.org/10.3390/foods14050736 (registering DOI) - 21 Feb 2025
Abstract
Food security is an important foundation of national security. Since China entered a new era in 2012, the supply of agricultural and animal husbandry products in Qinghai has continuously enhanced. However, the implementation of ecological policies such as Grain for Green and Grassland [...] Read more.
Food security is an important foundation of national security. Since China entered a new era in 2012, the supply of agricultural and animal husbandry products in Qinghai has continuously enhanced. However, the implementation of ecological policies such as Grain for Green and Grassland Ecological Compensation restricted the cultivation and grazing areas. At the same time, with the improvement in living standards and food consumption demand of local residents, the contradiction between human beings and land has become increasingly prominent. It is necessary to analyze the balance between food supply and demand to evaluate food security. This study used supply–demand analysis and spatial autocorrelation analysis based on county-level statistical data on production and consumption collected through random sampling surveys to reveal the characteristics of the production and consumption of the main food types in Qinghai during 2012–2022 as well as to analyze the food self-sufficiency changes and their spatial clustering features. The results showed that the regions with higher grain and meat production in Qinghai were concentrated in the northeast in the past decade, while the regions with higher consumption were mainly in the counties with larger populations. At the county level, grain could not achieve self-sufficiency, except in northeastern Qinghai; meat was self-sufficient in most counties. Through regional allocation, Qinghai had achieved grain and meat self-sufficiency at the provincial level. The self-sufficiency of grain and meat showed obvious clustering, with high-value clusters of grain self-sufficiency and low-value clusters of meat both distributed in the provincial capital and surrounding areas, which were related to the adjustment of urban residents’ dietary structure from staple foods to diversified foods. This study provides a scientific basis for decision makers when adjusting the agricultural and animal husbandry structure as well as the dietary structure of residents to ensure food security and the sustainable utilization of land resources. Full article
(This article belongs to the Section Food Security and Sustainability)
Show Figures

Figure 1

Figure 1
<p>Administrative divisions and land cover of Qinghai province.</p>
Full article ">Figure 2
<p>The distribution of and changes in grain and meat production at the county level in Qinghai from 2012 to 2022.</p>
Full article ">Figure 3
<p>The distribution of and changes in grain and meat consumption at the county level in Qinghai from 2012 to 2022.</p>
Full article ">Figure 4
<p>The distribution of and changes in self-sufficiency rate of grain and meat at the county level in Qinghai from 2012 to 2022.</p>
Full article ">Figure 5
<p>The annual changes in self-sufficiency of grain and meat at the provincial level in Qinghai.</p>
Full article ">Figure 6
<p>Moran scatter plot of the self-sufficiency for grain and meat at the provincial level in Qinghai.</p>
Full article ">Figure 7
<p>LISA cluster map of the grain and meat self-sufficiency at the county level in Qinghai.</p>
Full article ">
24 pages, 1439 KiB  
Article
IoTBenchSL: A Streamlined Framework for the Efficient Production of Standardized IoT Benchmarks with Automated Pipeline Validation
by Yixuan Cheng, Xiongfei Li, Zhikang Mao, Wenqing Fan, Wei Huang and Wen Liu
Electronics 2025, 14(5), 856; https://doi.org/10.3390/electronics14050856 (registering DOI) - 21 Feb 2025
Abstract
Security vulnerabilities in IoT firmware pose significant risks, and black-box protocol fuzzing offers a scalable and cost-effective solution for identifying these vulnerabilities. However, current fuzzing evaluation schemes are often beset by challenges such as limited benchmark dataset sizes, low benchmark production efficiency, insufficient [...] Read more.
Security vulnerabilities in IoT firmware pose significant risks, and black-box protocol fuzzing offers a scalable and cost-effective solution for identifying these vulnerabilities. However, current fuzzing evaluation schemes are often beset by challenges such as limited benchmark dataset sizes, low benchmark production efficiency, insufficient automation, and poor adaptability, which hinder cross-method comparisons. To address these challenges, we propose IoTBenchSL, a modular, pipeline-driven framework for constructing standardized, reproducible, and integrable vulnerability detection benchmark datasets. IoTBenchSL introduces a benchmark production workflow alongside a CI/CD-based automated validation pipeline, equipping each benchmark with a one-click emulation environment, automated validation mechanisms, and exploit verification scripts. This approach enhances the efficiency and accuracy of benchmark generation. Additionally, IoTBenchSL seamlessly integrates with existing fuzzing frameworks, enabling large-scale fuzzing evaluations and vulnerability discovery without modifying fuzzers. In our experiments, IoTBenchSL was used to generate 100 firmware benchmarks and 100 vulnerability benchmarks. We identified 32 previously unknown vulnerabilities through these benchmarks, 21 of which received CVE or CNVD identifiers. These results demonstrate IoTBenchSL’s capacity to generate large-scale IoT fuzzing benchmarks, improving evaluation efficiency and reducing costs for comparative studies, thereby advancing reproducible fuzzing research. Full article
Show Figures

Figure 1

Figure 1
<p>Overview of IoTBenchSL.</p>
Full article ">Figure 2
<p>Time Comparison for Benchmark Production and Validation.</p>
Full article ">Figure 3
<p>Time Comparison for Firmware and Vulnerability Benchmark Production.</p>
Full article ">
21 pages, 5285 KiB  
Article
Scenario Simulation and Scheme Optimization of Water Ecological Security in Hexi Corridor Based on System Dynamics Model
by Dongyuan Sun, Shiwei Wang, Zuirong Niu, Yanqiang Cui, Xingfan Wang, Lanzhen Wu, Yali Ma and Heping Shu
Sustainability 2025, 17(5), 1833; https://doi.org/10.3390/su17051833 - 21 Feb 2025
Abstract
Water ecological security is intricately connected to regional economic development and human survival, exerting a profound influence on regional sustainability. Water ecological security in the study area is a matter of urgency. In this study, the socio-economic, ecological, and water resource data of [...] Read more.
Water ecological security is intricately connected to regional economic development and human survival, exerting a profound influence on regional sustainability. Water ecological security in the study area is a matter of urgency. In this study, the socio-economic, ecological, and water resource data of five cities in the west of the river from 2006 to 2021 are used to construct a dynamic model of the regional water ecological security system and simulate the trend of the regional water ecological security from 2022 to 2035, and the results indicate the following: (1) From 2006 to 2021, Hexi Corridor’s economy exhibited a significant upward trend, while its total population experienced a marked decline. Indicators for the ecological environment system showed notable improvement, whereas those for the water resource system demonstrated a significant downward trend. (2) Spatially, the mean values of system indices in the southeast and northwest regions were higher than those in the central region. (3) Between 2022 and 2035, projections reveal that the total GDP, industrial added value, average sewage discharge, urban green space, and water consumption for ecological purposes will all trend upward. Concurrently, the total population, total water supply, and total water demand are expected to exhibit a continuous decline. (4) The comparative comprehensive scores of the scenario models are as follows: EPS (2.18) > RSS (1.57) > CDS (1.15) > EDS (1.08). This analysis provides valuable insights into the dynamics of water ecological security in the Hexi Corridor and offers critical guidance for sustainable regional development planning. Full article
Show Figures

Figure 1

Figure 1
<p>Overview of the study areas.</p>
Full article ">Figure 2
<p>System dynamics modeling process.</p>
Full article ">Figure 3
<p>Interannual change trend of socio-economic system indicators.</p>
Full article ">Figure 3 Cont.
<p>Interannual change trend of socio-economic system indicators.</p>
Full article ">Figure 4
<p>Interannual trends of ecosystem indicators.</p>
Full article ">Figure 4 Cont.
<p>Interannual trends of ecosystem indicators.</p>
Full article ">Figure 5
<p>Interannual variation trend of water resource system indicators.</p>
Full article ">Figure 5 Cont.
<p>Interannual variation trend of water resource system indicators.</p>
Full article ">Figure 6
<p>Spatial change in socio-economic system indicators.</p>
Full article ">Figure 7
<p>Spatial change in ecosystem indicators.</p>
Full article ">Figure 8
<p>Spatial change in water resource system index.</p>
Full article ">Figure 9
<p>Dynamic model of water ecological security system in Hexi Corridor.</p>
Full article ">Figure 10
<p>Simulation results of each scenario index.</p>
Full article ">Figure 10 Cont.
<p>Simulation results of each scenario index.</p>
Full article ">
38 pages, 8651 KiB  
Review
A Systematic Literature Review of Current Research Trends in Operational and Related Technology Threats, Threat Detection, and Security Insurance
by Nikolaj Goranin, Dainius Čeponis and Antanas Čenys
Appl. Sci. 2025, 15(5), 2316; https://doi.org/10.3390/app15052316 - 21 Feb 2025
Abstract
The expansion of operation technology (OT) use and its tight integration with classical information and communication technologies have led not only to additional and improved possibilities in monitoring physical/manufacturing processes and the emergency of Industry 4.0 but also to a number of new [...] Read more.
The expansion of operation technology (OT) use and its tight integration with classical information and communication technologies have led not only to additional and improved possibilities in monitoring physical/manufacturing processes and the emergency of Industry 4.0 but also to a number of new threats, both related to the security of processed data and the safety of people, affected by physical processes and controlled by OT. Understanding potential threats has caused an increased demand for scientific research in the field, which is still relatively new and lacks established terminology. In this review paper, we aim to identify emerging trends and technologies in OT incident response, attack detection, applications of machine and deep learning for attack recognition, and security of OT protocols. An examination of research patterns from the Web of Science repository is performed to comprehend the panorama of publications and the present state of research in the area of OT security. The analysis shows a notable rise in publications concerning OT security, reflecting an increasing research interest. Proceeding articles and research articles were the predominant types of publications that were analyzed. The analysis further emphasizes the collaborative connections between researchers, academic institutions, and nations. Additionally, co-occurrence and citation analyses are carried out to offer an understanding of the associations between various keywords and/or research subjects. The study is finalized by suggesting future research directions on OT security. The uniqueness of this review lies in its focus on OT rather than the more commonly explored SCADA/ICS topics, attempting to cover a wider range of research topics instead of concentrating on a narrow area/method. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Progression of an annual publication count in operation technology from 2005 to 2024.</p>
Full article ">Figure 2
<p>Total number of citations received each year by publications on operation technology within the Web of Science.</p>
Full article ">Figure 3
<p>Publication categories in operation technology from the Web of Science database.</p>
Full article ">Figure 4
<p>Top 10 leading source titles from 1124 operation technology publications of the Web of Science database.</p>
Full article ">Figure 5
<p>Top 10 leading organizations from 1124 operation technology publications of the Web of Science database.</p>
Full article ">Figure 6
<p>Trends in publications of countries from 1124 operation technology publications from the Web of Science database.</p>
Full article ">Figure 7
<p>Leading research areas from 1124 operation technology publications from the Web of Science database.</p>
Full article ">Figure 8
<p>Trends in publication counts of research areas from 1124 operation technology publications from the Web of Science database.</p>
Full article ">Figure 9
<p>Web of Science categories from 1124 OT publications from the Web of Science database.</p>
Full article ">Figure 10
<p>Web of Science trend from 1124 OT security publications from the Web of Science database.</p>
Full article ">Figure 11
<p>A breakdown of document types within Web of Science categories of a total of 1124 OT security publications from the Web of Science database.</p>
Full article ">Figure 12
<p>Web of Science indexes from 1124 OT security publications from the Web of Science database.</p>
Full article ">Figure 13
<p>The top 10 funding agencies of a total of 1124 operation technology publications from the Web of Science database.</p>
Full article ">Figure 14
<p>Distribution according to access type of a total of 1124 OT security publications from the Web of Science database.</p>
Full article ">Figure 15
<p>A visual representation of the co-authorship network among researchers within the domain of OT security.</p>
Full article ">Figure 16
<p>A visual representation of the co-authorship network among organizations within the domain of OT security.</p>
Full article ">Figure 17
<p>A visual representation of the co-authorship network among countries within the domain of OT security.</p>
Full article ">Figure 18
<p>The co-occurrence network encompasses all keywords within the realm of OT security from the Web of Science.</p>
Full article ">Figure 19
<p>The co-occurrence network encompassing author keywords within the realm of OT security from the Web of Science.</p>
Full article ">Figure 20
<p>A visual representation of the citation network among documents within the domain of OT security.</p>
Full article ">Figure 21
<p>A visual representation of the citation network among sources within the domain of OT security.</p>
Full article ">Figure 22
<p>A visual representation of the citation network among authors within the domain of OT security.</p>
Full article ">Figure 23
<p>A visual representation of the citation network among organizations within the OT security.</p>
Full article ">Figure 24
<p>A visual representation of the citation network among countries within the domain of OT security.</p>
Full article ">
21 pages, 2466 KiB  
Article
Enhancing Performance of Credit Card Model by Utilizing LSTM Networks and XGBoost Algorithms
by Kianeh Kandi and Antonio García-Dopico
Mach. Learn. Knowl. Extr. 2025, 7(1), 20; https://doi.org/10.3390/make7010020 - 21 Feb 2025
Abstract
This research paper presents novel approaches for detecting credit card risk through the utilization of Long Short-Term Memory (LSTM) networks and XGBoost algorithms. Facing the challenge of securing credit card transactions, this study explores the potential of LSTM networks for their ability to [...] Read more.
This research paper presents novel approaches for detecting credit card risk through the utilization of Long Short-Term Memory (LSTM) networks and XGBoost algorithms. Facing the challenge of securing credit card transactions, this study explores the potential of LSTM networks for their ability to understand sequential dependencies in transaction data. This research sheds light on which model is more effective in addressing the challenges posed by imbalanced datasets in credit risk assessment. The methodology utilized for imbalanced datasets includes the use of the Synthetic Minority Oversampling Technique (SMOTE) to address any imbalance in class distribution. This paper conducts an extensive literature review, comparing various machine learning methods, and proposes an innovative framework that compares LSTM with XGBoost to improve fraud detection accuracy. LSTM, a recurrent neural network renowned for its ability to capture temporal dependencies within sequences of transactions, is compared with XGBoost, a formidable ensemble learning algorithm that enhances feature-based classification. By meticulously carrying out preprocessing tasks, constructing competent training models, and implementing ensemble techniques, our proposed framework demonstrates unwavering performance in accurately identifying fraudulent transactions. The comparison of LSTM and XGBoost shows that LSTM is more effective for our imbalanced dataset. Compared with XGBOOST’s 97% accuracy, LSTM’s accuracy is 99%. The final result emphasizes how crucial it is to select the optimal algorithm based on particular criteria within financial concerns, which will ultimately result in more reliable and knowledgeable credit score decisions. Full article
(This article belongs to the Section Network)
Show Figures

Figure 1

Figure 1
<p>The structure of the LSTM.</p>
Full article ">Figure 2
<p>The LSTM model.</p>
Full article ">Figure 3
<p>The structure of XGBoost.</p>
Full article ">Figure 4
<p>Feature correlation heatmap.</p>
Full article ">Figure 5
<p>The distribution of the dataset.</p>
Full article ">Figure 6
<p>The LSTM plot.</p>
Full article ">Figure 7
<p>The XGBoost model plot.</p>
Full article ">
18 pages, 522 KiB  
Article
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature
by Yang Zhang, Pengxiao Duan, Chaoyang Li, Hua Zhang and Haseeb Ahmad
Sensors 2025, 25(5), 1321; https://doi.org/10.3390/s25051321 - 21 Feb 2025
Abstract
With the rapid development of quantum computers and quantum computing, Internet of Things (IoT) networks equipped with traditional cryptographic algorithms have become very weak against quantum attacks. This paper focuses on the privacy-preserving problem in IoT networks and proposes a certificateless ring signature [...] Read more.
With the rapid development of quantum computers and quantum computing, Internet of Things (IoT) networks equipped with traditional cryptographic algorithms have become very weak against quantum attacks. This paper focuses on the privacy-preserving problem in IoT networks and proposes a certificateless ring signature (CLRS) scheme. This CLRS is constructed with lattice theories, which show promising advantages in resisting quantum attacks. Meanwhile, the certificateless mechanism reduces the key control ability of the key generation center (KGC) by adding personal secret keys to the private key generated by the system. Meanwhile, the ring signature mechanism protects users’ privacy information through a non-central control mechanism. Next, the security proof in a random oracle model is given, which shows that this CLRS scheme can obtain unforgeability and ensure the signer’s anonymity. Its security properties include non-repudiation, traceability, and post-quantum security. Then, the efficiency comparison and performance results show that this CLRS scheme is more efficient and practical than similar schemes. Moreover, this work presents an exploration of the post-quantum cryptographic algorithm and its application in IoT networks. Full article
(This article belongs to the Special Issue IoT Network Security (Second Edition))
Show Figures

Figure 1

Figure 1
<p>Key size comparison.</p>
Full article ">Figure 2
<p>Signature size comparison.</p>
Full article ">Figure 3
<p>Time consumption.</p>
Full article ">Figure 4
<p>Example application in BCCLS.</p>
Full article ">Figure 5
<p>Transaction throughput comparison.</p>
Full article ">Figure 6
<p>Transaction latency comparison.</p>
Full article ">
30 pages, 3836 KiB  
Article
Optimizing Facilities Management Through Artificial Intelligence and Digital Twin Technology in Mega-Facilities
by Ahmed Mohammed Abdelalim, Ahmed Essawy, Alaa Sherif, Mohamed Salem, Manal Al-Adwani and Mohammad Sadeq Abdullah
Sustainability 2025, 17(5), 1826; https://doi.org/10.3390/su17051826 - 21 Feb 2025
Abstract
Mega-facility management has long been inefficient due to manual, reactive approaches. Current facility management systems face challenges such as fragmented data integration, limited predictive systems, use of traditional methods, and lack of knowledge of new technologies, such as Building Information Modeling and Artificial [...] Read more.
Mega-facility management has long been inefficient due to manual, reactive approaches. Current facility management systems face challenges such as fragmented data integration, limited predictive systems, use of traditional methods, and lack of knowledge of new technologies, such as Building Information Modeling and Artificial Intelligence. This study examines the transformative integration of Artificial Intelligence and Digital Twin technologies into Building Information Modeling (BIM) frameworks using IoT sensors for real-time data collection and predictive analytics. Unlike previous research, this study uses case studies and simulation models for dynamic data integration and scenario-based analyses. Key findings show a significant reduction in maintenance costs (25%) and energy consumption (20%), as well as increased asset utilization and operational efficiency. With an F1-score of more than 90%, the system shows excellent predictive accuracy for equipment failures and energy forecasting. Practical applications in hospitals and airports demonstrate the developed ability of the platform to integrate the Internet of Things and Building Information Modeling technologies, shifting facilities management from being reactive to proactive. This paper presents a demo platform that integrates BIM with Digital Twins to improve the predictive maintenance of HVAC systems, equipment, security systems, etc., by recording data from different assets, which helps streamline asset management, enhance energy efficiency, and support decision-making for the buildings’ critical systems. Full article
Show Figures

Figure 1

Figure 1
<p>Flowchart for implementing AI-BIM-IoT in an existing building.</p>
Full article ">Figure 2
<p>Implementing a Digital Twin for any building.</p>
Full article ">Figure 3
<p>User registration.</p>
Full article ">Figure 4
<p>User interface of the platform.</p>
Full article ">Figure 5
<p>Uploading the IFC file to the platform.</p>
Full article ">Figure 6
<p>Specifying the geographical location of the building.</p>
Full article ">Figure 7
<p>Geometry of the building in 3D view.</p>
Full article ">Figure 8
<p>Real-time sensor data.</p>
Full article ">Figure 9
<p>Alarm message.</p>
Full article ">Figure 10
<p>Applying AI scenarios.</p>
Full article ">Figure 11
<p>Program mapping for all sensors.</p>
Full article ">Figure 12
<p>Framework for DT platform.</p>
Full article ">
19 pages, 274 KiB  
Article
Digital Competences of Digital Natives: Measuring Skills in the Modern Technology Environment
by Danijela Pongrac, Marta Alić and Brigitta Cafuta
Informatics 2025, 12(1), 23; https://doi.org/10.3390/informatics12010023 - 21 Feb 2025
Abstract
The fourth industrial revolution has ushered in a new era in which technology is seamlessly integrated into daily life. The digital transformation has created new media formats that require the development of robust digital skills to navigate this landscape. By utilising the Youth [...] Read more.
The fourth industrial revolution has ushered in a new era in which technology is seamlessly integrated into daily life. The digital transformation has created new media formats that require the development of robust digital skills to navigate this landscape. By utilising the Youth Digital Skills Indicator (yDSI) and integrating it with the Digital Competence Framework for Citizens (DigComp 2.2), this research examines media habits and digital competences among Croatian youth aged 10–24, corresponding to Generations Alpha and Z. A sample of 231 participants across three competence domains—information literacy, security and communication—revealed statistically significant generational differences in the first two areas of digital skills. Furthermore, gender-based analyses, conducted using the Mann–Whitney U-test and Spearman correlations for Likert scale responses, showed no significant differences. These findings deepen our understanding of digital natives, how media habits evolve and influence their digital skills, highlighting the need for more tailored strategies to enhance their competences and bridge generational gaps. Full article
20 pages, 450 KiB  
Article
Faster Spiral: Low-Communication, High-Rate Private Information Retrieval
by Ming Luo and Mingsheng Wang
Cryptography 2025, 9(1), 13; https://doi.org/10.3390/cryptography9010013 - 21 Feb 2025
Abstract
Private information retrieval (PIR) enables a client to retrieve a specific element from a server’s database without disclosing the index that was queried. This work introduces three improvements to the efficient single-server PIR protocol Spiral. We found that performing a modulus switching towards [...] Read more.
Private information retrieval (PIR) enables a client to retrieve a specific element from a server’s database without disclosing the index that was queried. This work introduces three improvements to the efficient single-server PIR protocol Spiral. We found that performing a modulus switching towards expanded ciphertexts can improve the server throughput. Secondly, we apply two techniques called the composite NTT algorithm and approximate decomposition to Spiral to further improve it. We conduct comprehensive experiments to evaluate the concrete performance of our protocol, and the results confirm an approximately 1.7 times faster overall throughput than Spiral. Full article
(This article belongs to the Special Issue Privacy-Enhancing Technologies for the Digital Age)
Show Figures

Figure 1

Figure 1
<p>A sketch of Spiral protocol. The server in Spiral performs query expansion, a first dimension folding and a subsequent dimension folding to fetch the desired record.</p>
Full article ">
20 pages, 12240 KiB  
Article
Character Can Speak Directly: An End-to-End Character Region Excavation Network for Scene Text Spotting
by Yan Li, Yan Shu, Binyang Li and Ruifeng Xu
Electronics 2025, 14(5), 851; https://doi.org/10.3390/electronics14050851 (registering DOI) - 21 Feb 2025
Abstract
End-to-end scene text spotting methods have garnered significant research attention due to their promising results. However, most existing approaches are not well suited for real-world applications because of their inherently complex pipelines. In this paper, we propose an end-to-end Character Region Excavation Network [...] Read more.
End-to-end scene text spotting methods have garnered significant research attention due to their promising results. However, most existing approaches are not well suited for real-world applications because of their inherently complex pipelines. In this paper, we propose an end-to-end Character Region Excavation Network (CRENet) to streamline the text spotting pipeline. Our contributions are threefold: (i) Pipeline simplification: For the first time, we eliminate the text region retrieval step, allowing characters to be directly spotted from scene images. (ii) ROA layer: We introduce a novel RoI (Region of Interest) feature sampling layer for multi-oriented character region feature sampling, significantly enhancing the recognizer’s performance. (iii) Progressive learning strategy: We propose a progressive learning strategy to gradually bridge the gap between synthetic data and real-world images, addressing the challenge posed by the high cost of character-level annotations required during training. Extensive experiments demonstrate that our proposed method is robust and effective across horizontal, oriented, and curved text, achieving results comparable to state-of-the-art methods on ICDAR 2013, ICDAR 2015, Total-Text and ReCTS. Full article
Show Figures

Figure 1

Figure 1
<p>Overview of end-to-end scene text spotting frameworks that are most relevant to ours. Compared to RNN/segmentation-based methods, ours remove text region generation step and spot characters directly from original images.</p>
Full article ">Figure 2
<p>Visualization results of our proposed CRENet in ICDAR 2013 (horizontal texts), ICDAR 2015 (oriented texts), and Total-Text (curved texts), respectively.</p>
Full article ">Figure 3
<p>The overall architecture of CRENet. The framework comprises three key steps: (1) a backbone network (VGG or ResNet) extracts feature representations from scene images; (2) characters are directly spotted using the excavation mechanism; and (3) detected characters are aggregated into complete text instances based on both detection and recognition results.</p>
Full article ">Figure 4
<p>Schematic of the CRENet backbone, which adopts an “SE-FPN-VGG16” architecture for robust feature extraction from input images.</p>
Full article ">Figure 5
<p>The generation processing of character bounding box from character region map.</p>
Full article ">Figure 6
<p>Compared to RoI Align (top), our proposed ROA layer can extract accurate character features. Note that we use original images for better visualization.</p>
Full article ">Figure 7
<p>Some visualization samples of synthetic data we generated to supervise progressive learning. The <b>left</b> column is images with synthetic texts, the <b>middle</b> and the <b>right</b> columns are the region score map and affinity score map, respectively.</p>
Full article ">Figure 8
<p>Some visualization results, including the ICDAR 2013 (<b>the top line</b>), ICDAR 2015 (<b>the second line</b>), Total-Text (<b>the third line</b>), and ReCTS (<b>the bottom line</b>).</p>
Full article ">Figure 9
<p>Limitations of CRENet. Yellow circles denote the negative samples generated by CRENet.</p>
Full article ">
17 pages, 7444 KiB  
Article
Ultrastructure of the Sensilla on Antennae and Mouthparts of Larval and Adult Cylas formicarius (Coleoptera: Brentidae)
by Yuanchang Xu, Pengbo He, Faxu Lu, Mengjiao Li, Shahzad Munir, Mingfu Zhao, Yixin Wu, Yueqiu He and Guowen Tang
Insects 2025, 16(3), 235; https://doi.org/10.3390/insects16030235 - 21 Feb 2025
Abstract
The quarantine pest, Cylas formicarius, is a key pest of sweet potatoes during both production and storage, posing a major threat to food security in various countries. To investigate behavioral mechanisms, the ultrastructure of the heads of larval and adult stages was [...] Read more.
The quarantine pest, Cylas formicarius, is a key pest of sweet potatoes during both production and storage, posing a major threat to food security in various countries. To investigate behavioral mechanisms, the ultrastructure of the heads of larval and adult stages was analyzed using scanning electron microscopy, with an emphasis on the sensilla of the mouthparts and antennae. The results reveal degeneration of the antennae and ocelli in larvae. The larval mouthparts are equipped with three types and six subtypes of sensilla. Both male and female adults have four types and six subtypes of sensilla on their mouthparts. Compared to larvae, the adult mouthparts display a greater diversity of sensilla types and higher numbers of sensilla basicaonica (SB), sensilla chaetica (SC), and sensilla digitiformia (SD). Adult antennae consist of a scape, a pedicel, and eight flagellomeres (F1–F8), with F8 showing sexual dimorphism. Seven types of sensilla, excluding SB and sensilla ligulate (SL), each with two subtypes, were identified on the antennae of adults of both sexes. SC, sensilla furcatea, Böhm bristles, and SL were newly observed in the antennae of C. formicarius adults. Additionally, one type and seven subtypes of sensilla on the adult antennae exhibit distinct sexual dimorphism in terms of structure or number. The relationship between the head structure and adaptability of C. formicarius was examined, and the functions of each sensilla were discussed, providing a theoretical basis for future studies on the behavior of this pest. Full article
(This article belongs to the Section Insect Physiology, Reproduction and Development)
Show Figures

Figure 1

Figure 1
<p>Head and sensilla morphology of <span class="html-italic">C. formicarius</span> larvae. (<b>A</b>) Dorsal view of the head. (<b>B</b>) Dorsal magnified view of the head. (<b>C</b>) Front view of the mouthparts. (<b>D</b>) Magnified view of the antennae. (<b>E</b>) Front view of the labrum. (<b>F</b>) Front view of the mandible. (<b>G</b>) Front view of the maxilla. (<b>H</b>) Front view of the labium. (<b>I</b>) Ventral view of the maxillary palp. An, antennae; Lp, labial palp; Lr, labrum; Li, labium; Md: mandible; Mp, maxillary palp; Mx, maxilla; Sp: Spicule; SB (1~2), sensilla basicaonica (1~2), SC (1~4); sensilla chaetica (1~4); SD, sensilla digitiformia.</p>
Full article ">Figure 2
<p>Morphology of the head and sensilla of adult <span class="html-italic">C. formicarius</span> beetles. (<b>A</b>) Dorsal view of the female head. (<b>B</b>) Ventral view of the male head. (<b>C</b>) Front view of the mouthparts. (<b>D</b>) Lateral view of the mouthparts. (<b>E</b>) Sensilla trichodea 3. (<b>F</b>) Lateral view of the maxilla. (<b>G</b>) Close-up view of the maxillary palp. (<b>H</b>) Overall view of the labium. (<b>I</b>) Anterior view of the apical labial palp. Ce, compound eye; An, antennae; Hy, hypopharynx; Li, labium; Lp, labial palp; Lr, labrum; Md, mandible; Mp, maxillary palp; Mx, maxilla; ST (1~2), sensilla trichodea (1~2); SB, sensilla basicaonica; SC (1~3), sensilla chaetica (1~3); SD: sensilla digitiformia.</p>
Full article ">Figure 3
<p>Distribution patterns of mouthpart sensilla in <span class="html-italic">C. formicarius</span> larvae and adults. (<b>A</b>) Larval mouthparts. (<b>B</b>) Adult mouthparts.</p>
Full article ">Figure 4
<p>Morphological features of the antennae and sensilla in male and female adult <span class="html-italic">C. formicarius</span>. (<b>A</b>): female antennae; (<b>B</b>): male antennae; (<b>C</b>–<b>L</b>): antennae sensilla. Sc: scape; Pe: pedicel; F1~F8: first flagellum~eighth flagellum; ST (1~2): sensilla trichodea (1~2); SC1~2: sensilla chaetica (1~2); SB: sensilla basicaonica; CP: cuticular pore; SR (1~2): sensilla rod-like (1~2); BB (1~2): Böhm bristles 1~2; SF (1~2): sensilla furcatea (1~2); SL: sensilla ligulate.</p>
Full article ">Figure 5
<p>Measurements of antenna segment length and width in adult <span class="html-italic">C. formicarius</span>. (<b>A</b>) Antenna length. (<b>B</b>) Antenna width. Sc: scape; Pe: pedicel; F1~F8: first to eighth flagellum. Asterisks “*” denote significant differences between male and female adults for the same antenna subsegments (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">
27 pages, 1081 KiB  
Article
ConBOOM: A Configurable CPU Microarchitecture for Speculative Covert Channel Mitigation
by Zhewen Zhang, Yao Liu, Yuhan She, Abdurrashid Ibrahim Sanka, Patrick S. Y. Hung and Ray C. C. Cheung
Electronics 2025, 14(5), 850; https://doi.org/10.3390/electronics14050850 (registering DOI) - 21 Feb 2025
Abstract
Speculative execution attacks are serious security problems that cause information leakage in computer systems by building speculative covert channels. Hardware defenses mitigate speculative covert channels through microarchitectural changes. However, two main limitations become the major bottleneck in existing hardware defenses. High-security hardware defenses, [...] Read more.
Speculative execution attacks are serious security problems that cause information leakage in computer systems by building speculative covert channels. Hardware defenses mitigate speculative covert channels through microarchitectural changes. However, two main limitations become the major bottleneck in existing hardware defenses. High-security hardware defenses, such as eager delay, can effectively mitigate both known and unknown covert channels. However, these defenses incur high performance overhead due to the long-fixed delayed execution applied in all potential attack scenarios. In contrast, hardware defenses with low performance overhead are faster and can mitigate known covert channels, but lack sufficient security to mitigate unknown covert channels. The limitations indicate that it is difficult to achieve better security and performance of a processor against speculative execution attacks using a single defense method. In this paper, we propose ConBOOM, a configurable central processing unit (CPU) microarchitecture that provides optimized switchable hardware defensive modes, including the high-security eager delay mode and two proposed performance-optimized modes based on the anticipated attack scenarios. The defensive modes allow for flexibility in mitigating different speculative execution attacks with better performance, unlike the existing defenses having fixed performance overhead for all attack scenarios. The ConBOOM modes can be switched without modifying the hardware, and switching ConBOOM to the suitable mode for the anticipated attack scenario is achieved through the provided software configuration interface. We implemented ConBOOM on Berkeley’s RISC-V out-of-order processor core (SonicBOOM). Furthermore, we evaluated ConBOOM on the VCU118 FPGA platform. Compared to the existing representative work with the fixed performance overhead of 39.1%, ConBOOM has the lower performance overhead ranging between 15.1% and 39.1% to mitigate different attack scenarios. ConBOOM provides more defensive flexibility with negligible hardware resource overhead about 2.0% and good security. Full article
Show Figures

Figure 1

Figure 1
<p>The block diagram of an out-of-order CPU microarchitecture [<a href="#B8-electronics-14-00850" class="html-bibr">8</a>,<a href="#B31-electronics-14-00850" class="html-bibr">31</a>].</p>
Full article ">Figure 2
<p>Attack schema of forming speculative covert channels [<a href="#B33-electronics-14-00850" class="html-bibr">33</a>].</p>
Full article ">Figure 3
<p>Speculative authorization bypass in the attack example of Spectre Variant 1.</p>
Full article ">Figure 4
<p>ConBOOM overview. ConBOOM provides three defensive modes (i.e., eager delay, delay-taken, and delay-not-taken) and an unprotected mode (i.e., no protection). Each ConBOOM mode is selected based by the software potentially containing the anticipated attack scenario which is associated with the code vulnerability to an attack. Software instructions are executed under the ConBOOM mode corresponding to their same color. The concept of speculative shadow is explained in <a href="#sec2dot3-electronics-14-00850" class="html-sec">Section 2.3</a>.</p>
Full article ">Figure 5
<p>Workflow and comparison of four ConBOOM modes in mitigating the attack scenario through delaying the execution of speculative load instructions.</p>
Full article ">Figure 6
<p>The relation of threat models (i.e., attack scenarios). The descriptions of <span class="html-italic">A</span>, <math display="inline"><semantics> <msub> <mi>A</mi> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>A</mi> <mn>2</mn> </msub> </semantics></math>, and <span class="html-italic">S</span> are presented in <a href="#electronics-14-00850-t003" class="html-table">Table 3</a>.</p>
Full article ">Figure 7
<p>Mitigation principle of ConBOOM with defensive modes.</p>
Full article ">Figure 8
<p>ConBOOM microarchitecture. The br_mask/not_taken_br_mask/taken_br_mask signal is the speculative mask recording the speculative shadow of an instruction. The taken_fire/not_taken_fire signal identifies a selected instruction that can lead to a misprediction, but not including a conditional branch instruction with the not-taken/taken prediction. The uses_ldq signal is the identification tag of a load. The cannot_load_allocate signal is the signal for instruction delay. The enableED/enableDT/enableDNT signal is used to enable or disable the ConBOOM mode.</p>
Full article ">Figure 9
<p>Detailed performance overheads of ConBOOM on SPEC2017 benchmarks.</p>
Full article ">
Back to TopTop