Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (4,287)

Search Parameters:
Keywords = adversarial network

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 1405 KB  
Article
Trust-Aware and Energy-Efficient Federated Learning for Secure Sensor Networks at the Edge
by Manuel J. C. S. Reis
Sensors 2026, 26(8), 2307; https://doi.org/10.3390/s26082307 (registering DOI) - 9 Apr 2026
Abstract
The widespread adoption of large-scale sensor networks in privacy-sensitive and safety-critical applications has intensified the demand for secure, trustworthy, and energy-efficient learning mechanisms at the network edge. Federated learning has emerged as a promising paradigm for privacy preservation by enabling collaborative model training [...] Read more.
The widespread adoption of large-scale sensor networks in privacy-sensitive and safety-critical applications has intensified the demand for secure, trustworthy, and energy-efficient learning mechanisms at the network edge. Federated learning has emerged as a promising paradigm for privacy preservation by enabling collaborative model training without sharing raw sensor data. However, most existing federated approaches inadequately address trust management, communication efficiency, and energy constraints, which are critical in real-world sensor-based systems. This paper proposes a trust-aware and energy-efficient federated learning framework specifically designed for secure sensor networks operating in resource-constrained edge environments. The proposed approach integrates lightweight trust metrics, trust-driven model aggregation, and adaptive communication scheduling to mitigate the impact of unreliable or malicious nodes while reducing unnecessary energy expenditure. By dynamically weighting client contributions based on trust and participation efficiency, the framework enhances robustness and learning stability under heterogeneous sensing conditions. Experimental results show that the proposed method maintains significantly higher accuracy under adversarial participation while reducing communication overhead and cumulative energy consumption. In particular, the framework improves model accuracy by up to 3.2% under heterogeneous conditions, reduces communication overhead by 28%, and decreases cumulative energy consumption by 31% compared with conventional federated learning approaches. Full article
(This article belongs to the Special Issue Sensor Security and Beyond)
Show Figures

Figure 1

26 pages, 17314 KB  
Article
An AESRGAN Remote Sensing Super-Resolution Model for Accurate Water Extraction
by Hongjie Liu, Wenlong Song, Juan Lv, Yizhu Lu, Long Chen, Yutong Zhao, Shaobo Linghu, Yifan Duan, Pengyu Chen, Tianshi Feng and Rongjie Gui
Remote Sens. 2026, 18(8), 1108; https://doi.org/10.3390/rs18081108 - 8 Apr 2026
Abstract
Accurate monitoring of water spatiotemporal dynamics is critical for hydrological process analysis and climate impact assessment. While remote sensing enables effective water monitoring, public satellite imagery is limited by mixed-pixel effects that hinder small river detection, and high-resolution commercial data suffers from low [...] Read more.
Accurate monitoring of water spatiotemporal dynamics is critical for hydrological process analysis and climate impact assessment. While remote sensing enables effective water monitoring, public satellite imagery is limited by mixed-pixel effects that hinder small river detection, and high-resolution commercial data suffers from low temporal frequency and restricted coverage. To address these limitations, this study proposes a deep learning-based super-resolution (SR) framework for multispectral remote sensing imagery. This paper constructs a matched dataset for GF2 and Sentinel-2 imagery and develops an Attention Enhanced Super Resolution Generative Adversarial Network (AESRGAN). By integrating attention mechanisms and a spectral-structural loss design, the network is optimized to adapt to the characteristics of multispectral remote sensing imagery. Experimental results demonstrate that AESRGAN achieves strong reconstruction performance, with a Peak Signal-to-Noise Ratio (PSNR) of 33.83 dB and a Structural Similarity Index Measure (SSIM) of 0.882. Water extraction based on the reconstructed imagery using the U-Net++ model achieved an overall accuracy of 0.97 and a Kappa coefficient of 0.92. In addition, the reconstructed imagery improved the estimation accuracy of river length, width, and area by 0.34%, 3.28%, and 8.51%, respectively. The proposed framework provides an effective solution for multi-source remote sensing data fusion and high-precision surface water monitoring, offering new potential for long-term hydrological observation using medium-resolution satellite imagery. Full article
Show Figures

Figure 1

27 pages, 9477 KB  
Article
Frequency-Band-Aware Physics-Informed Generative Adversarial Network for EMI Prediction and Adaptive Suppression in SiC Power Converters
by Haoran Wang, Zhongmeng Zhang, Wenbang Long and Haitao Pu
Electronics 2026, 15(8), 1560; https://doi.org/10.3390/electronics15081560 - 8 Apr 2026
Abstract
Silicon carbide (SiC) power converters offer superior switching performance but generate severe broadband electromagnetic interference (EMI) that challenges regulatory compliance. Existing prediction methods face a fundamental trade-off between physical fidelity and computational efficiency, while conventional suppression strategies lack adaptability to varying operating conditions. [...] Read more.
Silicon carbide (SiC) power converters offer superior switching performance but generate severe broadband electromagnetic interference (EMI) that challenges regulatory compliance. Existing prediction methods face a fundamental trade-off between physical fidelity and computational efficiency, while conventional suppression strategies lack adaptability to varying operating conditions. This paper proposes a frequency-band-aware physics-informed generative adversarial network (FBA-PIGAN) that integrates electromagnetic domain knowledge into data-driven generative modeling for joint EMI prediction and adaptive suppression in SiC power converters. The framework employs a Wasserstein GAN with gradient penalty as the adversarial backbone and introduces feature-wise linear modulation (FiLM) to inject converter operating parameters into the generator through learned affine transformations. A hierarchical physics-informed loss function enforces three frequency-dependent constraints, namely, harmonic structure consistency, parasitic resonance characterization, and high-frequency envelope regularization, coordinated by a curriculum-based weight-scheduling strategy. An end-to-end differentiable suppression module maps predicted spectra to optimal passive filter parameters through an analytically embedded transfer function. Experimental validation on a 10 kW SiC inverter platform with 5120 measured spectra across 32 operating conditions demonstrates that FBA-PIGAN achieves a mean spectral error of 2.1 dB, 93.8% peak frequency accuracy, and a physical consistency score of 0.93, improving prediction accuracy by 56% over conventional conditional GANs while maintaining sub-millisecond inference latency. The integrated suppression pipeline attains 19.2 dB average attenuation with 98.5% CISPR 25 compliance, and the framework generalizes to unseen operating conditions with only 19% performance degradation, compared with 56% for data-driven baselines. Full article
23 pages, 3355 KB  
Article
Fracture Pressure Prediction for Tight Conglomerate Reservoirs with Analysis of Acid Pretreatment Influence
by Yue Wang, Qinghua Cheng, Jianchao Li, Yunwei Kang, Hui Liu, Qian Wei, Dali Guo and Zixi Guo
Processes 2026, 14(8), 1192; https://doi.org/10.3390/pr14081192 - 8 Apr 2026
Abstract
Tight conglomerate reservoirs are characterized by strong heterogeneity, significant in-situ stress differences, and unbalanced fracturing stimulation, which make fracture pressure prediction challenging and severely restrict the effectiveness of reservoir stimulation and ultimate recovery. Although acid pretreatment is an effective means to reduce fracture [...] Read more.
Tight conglomerate reservoirs are characterized by strong heterogeneity, significant in-situ stress differences, and unbalanced fracturing stimulation, which make fracture pressure prediction challenging and severely restrict the effectiveness of reservoir stimulation and ultimate recovery. Although acid pretreatment is an effective means to reduce fracture pressure, its quantitative relationship with fracture pressure remains unclear. There is an urgent need to establish a systematic method that integrates reservoir heterogeneity characterization, data augmentation, and intelligent prediction. Aiming at the tight conglomerate reservoir in the MH Block, this study proposes an intelligent fracture pressure prediction and acid pretreatment optimization method that integrates Self-Organizing Maps (SOMs), Generative Adversarial Networks (GANs), and Transformer models. First, SOM is used to perform unsupervised clustering of logging parameters to identify different geological feature categories and achieve fine-scale characterization of reservoir heterogeneity. Second, to address the issue of limited samples within each cluster, GAN is employed for high-quality data augmentation to expand the training sample set. Finally, a fracture pressure prediction model is constructed based on the Transformer architecture, and the influence of acid treatment parameters on fracture pressure is quantitatively analyzed using the SHAP method and laboratory experiments. The results show that the proposed model achieves a coefficient of determination (R2) of 0.93, a root mean square error (RMSE) of 2.38 MPa, and a mean absolute percentage error (MAPE) of 2.02% on the test set, with prediction accuracy significantly outperforming benchmark models such as BPNN, XGBoost, and LSTM. Ablation experiments verify that both the SOM clustering and GAN augmentation modules effectively enhance model performance. Analysis of acid treatment parameters indicates that hydrofluoric acid (HF) concentration is the dominant factor influencing fracture pressure reduction, and the mud acid system exhibits a stronger synergistic effect compared to the single hydrochloric acid system. Reasonable optimization of acid concentration and dosage can significantly reduce fracture pressure (3.14–5.28 MPa). This method provides a theoretical basis and engineering guidance for accurate fracture pressure prediction and optimal design of acid pretreatment in tight conglomerate reservoirs. Full article
(This article belongs to the Section Petroleum and Low-Carbon Energy Process Engineering)
Show Figures

Figure 1

23 pages, 6260 KB  
Article
Ditto: An Adaptable and Highly Robust Invisible Backdoor Attack Towards Deep Neural Networks
by Wenhao Zhang, Lianheng Zou, Yingying Xiong, Peng Shi and Xiao He
Electronics 2026, 15(8), 1551; https://doi.org/10.3390/electronics15081551 - 8 Apr 2026
Abstract
With the widespread application of deep neural networks across various fields, issues related to model security have become increasingly prevalent. Backdoor attacks, as a covert method of attack, can implant malicious behavior during the model training process, causing the model to perform predetermined [...] Read more.
With the widespread application of deep neural networks across various fields, issues related to model security have become increasingly prevalent. Backdoor attacks, as a covert method of attack, can implant malicious behavior during the model training process, causing the model to perform predetermined tasks under specific trigger conditions. However, current backdoor attacks struggle to achieve a good balance between stealthiness and attack success rate, and there is an issue in which certain data transformation operations can negatively impact attack performance. To address these issues, this paper proposes a specialized backdoor attack method called Ditto. It first uses a boundary detection algorithm and a padding algorithm to determine the trigger’s insertion position. The trigger is then dynamically generated using a generative adversarial network, taking into account the texture features of the images. Subsequently, the trigger is applied to the images, and its level of stealthiness is adjusted. Compared to existing popular backdoor attack methods, the experimental results ensure a high level of stealthiness while also maintaining a high attack success rate and a high accuracy for clean data. Furthermore, our attack method exhibits considerable robustness and adaptability, demonstrating effective resistance against baseline backdoor defense techniques. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

18 pages, 894 KB  
Article
A Generative Approach to Enhancing Forums Through SVM-Based Spam Detection
by Jose Antonio Rivera-Hernandez, Liliana Ibeth Barbosa-Santillán and Juan Jaime Sánchez-Escobar
Data 2026, 11(4), 78; https://doi.org/10.3390/data11040078 - 8 Apr 2026
Abstract
Spam consists of unsolicited messages, and the posting of such irrelevant messages often presents significant challenges in technical forums. Two particular challenges are the dynamic nature of spamming tactics and the inadequacy of adaptable spam databases for automated classifiers. Our work addresses the [...] Read more.
Spam consists of unsolicited messages, and the posting of such irrelevant messages often presents significant challenges in technical forums. Two particular challenges are the dynamic nature of spamming tactics and the inadequacy of adaptable spam databases for automated classifiers. Our work addresses the need for a robust spam classification solution that can be seamlessly integrated with database, SQL, and APEX applications. We developed a labeled spam database by asking experts to categorize 1916 posts as spam or regular posts to ensure accurate classification and then created an SVM-based spam classification model that achieves an average validation accuracy of 90%. Our research enhances the current understanding of spam in technical forums and represents a solution for embedding spam classifiers into widely used platforms with an accuracy of 98.1%. Furthermore, we explore the incorporation of generative topics into our approach by integrating generative topic modeling techniques, such as latent Dirichlet allocation. In our work, the spam classifier is dynamically updated to account for emerging spam patterns and topics based on a generative approach that improves the robustness of the classifier against new spamming tactics and enables nuanced, context-aware filtering of messages. In addition, our experiments highlight the potential of text SVM classifiers for real-time applications through the fine-tuning of text features. Full article
Show Figures

Figure 1

22 pages, 2073 KB  
Article
TVAE-GAN: A Generative Model for Providing Early Warnings to High-Risk Students in Basic Education and Its Explanation
by Chao Duan, Yiqing Wang, Wenlong Zhang, Zhongtao Yu, Yu Pei, Mingyan Zhang and Qionghao Huang
Information 2026, 17(4), 356; https://doi.org/10.3390/info17040356 - 8 Apr 2026
Abstract
The rapid development of intelligent learning guidance systems has created a favorable environment for personalized learning. By accurately predicting students’ future performance, education can be tailored and teaching strategies optimized. However, traditional prediction algorithms seldom account for highly imbalanced datasets in basic education, [...] Read more.
The rapid development of intelligent learning guidance systems has created a favorable environment for personalized learning. By accurately predicting students’ future performance, education can be tailored and teaching strategies optimized. However, traditional prediction algorithms seldom account for highly imbalanced datasets in basic education, overlook temporal factors, and lack further interpretability of the prediction results. To address these shortcomings, we propose Temporal Variational Autoencoder-Generative Adversarial Network (TVAE-GAN), a temporal variational autoencoder-generative adversarial network model aimed at providing early warnings for high-risk students in basic education, with in-depth interpretability analysis of the prediction results to suit the unique context of basic education. TVAE-GAN extracts features from real samples and introduces a Long Short-Term Memory (LSTM) network to capture dynamic features in time series, helping the model better understand temporal dependencies in the data, remember the sequential causal information of students’ online learning, and achieve better data generation performance. Using these features, the generative model generates new samples, and the discriminator model evaluates their quality, producing outputs that closely resemble real samples through training. The effectiveness of the TVAE-GAN model is validated on a collected online basic education dataset while also advancing the timing of interventions in predictions. The performance differences between the proposed method and classic resampling methods, as well as their impact in the educational field, are analyzed, highlighting that misclassification increases teacher workload and affects students’ emotions. Key influencing factors are identified using a decision-tree surrogate model, providing teachers with multidimensional references for academic assessment. Full article
Show Figures

Figure 1

24 pages, 671 KB  
Article
Statistical Indistinguishability in Multi-User Covert Communications Without Secret Information
by Jinyoung Lee, Junguk Park and Sangseok Yun
Mathematics 2026, 14(7), 1227; https://doi.org/10.3390/math14071227 - 7 Apr 2026
Abstract
This paper proposes a novel covert communication paradigm in which covertness emerges from network-induced structural uncertainty, eliminating the traditional reliance on pre-shared secret pilots in multi-user cooperative networks. Unlike conventional schemes that create information asymmetry through secret training sequences, we show that structural [...] Read more.
This paper proposes a novel covert communication paradigm in which covertness emerges from network-induced structural uncertainty, eliminating the traditional reliance on pre-shared secret pilots in multi-user cooperative networks. Unlike conventional schemes that create information asymmetry through secret training sequences, we show that structural uncertainty naturally arises from user selection in spatially dispersed networks. Specifically, we consider a public pilot aided system under a worst-case adversarial assumption where Willie possesses full knowledge of all individual channel state information (CSI) but remains uncertain about the active subset of cooperative users. We prove that this selection-induced structural uncertainty renders different transmission states statistically indistinguishable from Willie’s perspective, thereby forcing the optimal detector to reduce to an energy-based test. The proposed framework demonstrates that robust covertness can be achieved without secrecy-based coordination, providing a scalable and practically viable alternative to secret pilot management in future wireless networks. Full article
(This article belongs to the Special Issue Computational Methods in Wireless Communications with Applications)
Show Figures

Figure 1

27 pages, 26065 KB  
Article
AEFOP: Adversarial Energy Field Optimization for Adversarial Example Purification
by Heqi Peng, Shengpeng Xiao and Yuanfang Guo
Appl. Sci. 2026, 16(7), 3588; https://doi.org/10.3390/app16073588 - 7 Apr 2026
Abstract
As AI-driven educational systems increasingly rely on deep neural networks, their vulnerability to adversarial perturbations raises concerns about assessment integrity, fairness, and reliability. Adversarial example purification is attractive for such deployments because it removes input perturbations without modifying the already deployed models. However, [...] Read more.
As AI-driven educational systems increasingly rely on deep neural networks, their vulnerability to adversarial perturbations raises concerns about assessment integrity, fairness, and reliability. Adversarial example purification is attractive for such deployments because it removes input perturbations without modifying the already deployed models. However, most existing purification methods are inherently goal-free: denoising-based approaches apply blind heuristic operators, while reconstruction-based methods rely on stochastic sampling guided by natural image priors. These methods typically suppress perturbations at the cost of weakening semantic details or inducing structural distortions. To address this limitation, we propose a novel goal-directed purification framework, termed adversarial energy field optimization for adversarial example purification (AEFOP). AEFOP formulates purification as a constrained optimization problem by defining a learnable adversarial energy which quantifies how far an input deviates from the benign region. This allows adversarial examples to be explicitly pushed from high-energy regions toward low-energy benign regions along an interpretable descent trajectory. Specifically, we build an adversarial energy network and optimize the energy field via a two-stage strategy: adversarial energy field shaping, which enforces distance-like energy behavior and correct gradient directions, and task-driven energy field calibration, which unrolls the descent process to calibrate the field with classification-consistency and semantic-preservation objectives. Extensive experiments across multiple attack scenarios demonstrate that AEFOP achieves superior purification accuracy and high visual quality while requiring only a few gradient steps during inference, offering a practical and efficient robustness layer for vision-based AI services in education. Full article
Show Figures

Figure 1

29 pages, 1206 KB  
Article
An Evidence-Based Architecture for Trustworthy Asset Discovery in Cybersecurity-Critical IT Environments
by Ivana Ogrizek Biškupić, Mislav Balković and Ivan Bencarić
J. Cybersecur. Priv. 2026, 6(2), 67; https://doi.org/10.3390/jcp6020067 - 7 Apr 2026
Abstract
Asset discovery is a fundamental but inherently flawed capability in cybersecurity, as current methodologies frequently confuse preliminary discovery observations with definitive asset inventories, thereby obscuring uncertainty, restricting auditability, and eroding trust in security-critical decision-making. This work addresses the issue of inconsistent asset identification [...] Read more.
Asset discovery is a fundamental but inherently flawed capability in cybersecurity, as current methodologies frequently confuse preliminary discovery observations with definitive asset inventories, thereby obscuring uncertainty, restricting auditability, and eroding trust in security-critical decision-making. This work addresses the issue of inconsistent asset identification in dynamic IT settings by presenting an evidence-based architectural paradigm that clearly distinguishes observation, identity resolution, and inventory representation. The principal research aim is to develop and authenticate an architecture that maintains discovery evidence, facilitates deterministic, verifiable identity resolution, and supports interpretable inventory derivation. In contrast to state-centric and model-driven methodologies, the proposed architecture enhances (i) traceability through the preservation of time-scoped, method-attributed observations, (ii) identity continuity amidst dynamic conditions such as IP reassignment and infrastructure modifications, and (iii) auditability by facilitating the reconstruction of inventory claims from foundational evidence. An examined proof-of-concept implementation in a controlled yet realistic network environment shows superior identity stability, greater discovery traceability, and retention of historical context relative to traditional inventory models. The results validate the practicality and architectural benefits of the strategy; nevertheless, the evaluation is constrained by a lack of formalised performance indicators and adversarial robustness, which are recognised as priorities for further investigation. Full article
(This article belongs to the Special Issue Building Community of Good Practice in Cybersecurity)
Show Figures

Figure 1

15 pages, 2566 KB  
Article
Custom Deep Learning Framework for Interpreting Diabetic Retinopathy in Healthcare Diagnostics
by Tamoor Aziz, Chalie Charoenlarpnopparut, Srijidtra Mahapakulchai, Babatunde Oluwaseun Ajayi and Mayowa Emmanuel Bamisaye
Signals 2026, 7(2), 34; https://doi.org/10.3390/signals7020034 - 7 Apr 2026
Viewed by 106
Abstract
Diabetic retinopathy is a prevalent condition and a major public health concern due to its detrimental impact on eyesight. Diabetes is a root cause of its development and damages small blood vessels caused by prolonged high blood sugar levels. The degenerative consequences of [...] Read more.
Diabetic retinopathy is a prevalent condition and a major public health concern due to its detrimental impact on eyesight. Diabetes is a root cause of its development and damages small blood vessels caused by prolonged high blood sugar levels. The degenerative consequences of diabetic retinopathy are irrevocable if not diagnosed in the early stages of its progression. This ailment triggers the development of retinal lesions, which can be identified for diagnosis and prognosis. However, lesion detection is challenging due to their similarity in intensity profiles to other retinal features, inconsistent sizes, and random locations. This research evaluates a custom deep learning network for classifying retinal images and compares it with the state-of-the-art classifiers. The novel preprocessing method is introduced to reduce the complexity of the diagnostic process and to enhance classification performance by adaptively enhancing images. Despite being a shallow network, the proposed model yields competitive results with an accuracy of 87.66% and an F1-score of 0.78. The evaluation metrics indicate that class imbalance affects the performance of the proposed model despite using the weighted cross-entropy loss. The future contribution will be the inclusion of generative adversarial networks for generating synthetic images to balance the dataset. This research aims to develop a robust computer-aided diagnostic system as a second interpreter for ophthalmologists during the diagnosis and prognosis stages. Full article
Show Figures

Figure 1

20 pages, 2528 KB  
Article
Utilizing Multi-Source Remote Sensing Data and the CGAN to Identify Key Drought Factors Influencing Maize Across Distinct Phenological Stages
by Hui Zhao, Jifu Guo, Jing Jiang, Funian Zhao and Xiaoyang Yang
Remote Sens. 2026, 18(7), 1085; https://doi.org/10.3390/rs18071085 - 3 Apr 2026
Viewed by 200
Abstract
Drought is one of the major disasters constraining crop production. The accurate identification of the dominant environmental factors that drive drought stress at different growth stages of maize is essential for developing stage-specific and precise water management strategies, enhancing drought resistance, and ensuring [...] Read more.
Drought is one of the major disasters constraining crop production. The accurate identification of the dominant environmental factors that drive drought stress at different growth stages of maize is essential for developing stage-specific and precise water management strategies, enhancing drought resistance, and ensuring food security. However, a key challenge is quantifying the nonlinear interactions among multiple environmental factors. This study focuses on the rain-fed agricultural region of Northwest China. To address the limited availability of drought event samples in this region and the inadequacy of traditional statistical methods in capturing complex inter-factor relationships, we integrate a small-sample modeling framework based on an improved Conditional Generative Adversarial Network (CGAN) with an attribution framework that employs SHapley Additive exPlanations (SHAP) for interpretability analysis. We incorporate ten environmental factors derived from multi-source remote sensing: temperature (Tmax, Tmin, Tmean), precipitation (P), evapotranspiration (ET), soil moisture at 0–10 cm (SM0–10) and at 10–40 cm (SM10–40), and solar-induced chlorophyll fluorescence (SIFmax, SIFmin, SIFmean). Sample sets were established for different maize phenological stages. The CGAN model was employed to achieve high-precision estimation of maize drought severity levels, while the SHAP method was used to quantitatively analyze the dominant factors and their contributions at each phenological stage. The results show that the CGAN model achieved coefficients of determination (R2) of 0.963, 0.972, and 0.979 for the seedling, jointing–tasseling, and maturity stages, respectively, demonstrating excellent nonlinear modeling capability under small samples. SHAP analysis reveals a clear dynamic evolution of dominant factors across phenological stages. Evapotranspiration (ET) dominated in the seedling stage, reflecting the primary role of surface water–heat balance, while the jointing–tasseling stage transitioned to a co-dominance of ET, topsoil moisture (SM0–10), and minimum SIF, indicating intensified crop transpiration and physiological stress under the meteorological drought framework, and the maturity stage shifted to an absolute dominance centered on mean temperature (Tmean), highlighting the critical impact of heat stress. This study provides a data-driven quantitative perspective for understanding maize drought mechanisms and offers a scientific basis for formulating differentiated drought management strategies for different growth stages. Furthermore, it demonstrates the potential of integrating CGAN with SHAP for agricultural remote sensing and drought attribution research in data-scarce regions. Full article
Show Figures

Figure 1

43 pages, 1881 KB  
Article
Cognitive ZTNA: A Neuro-Symbolic AI Approach for Adaptive and Explainable Zero Trust Access Control
by Ahmed Alzahrani
Mathematics 2026, 14(7), 1211; https://doi.org/10.3390/math14071211 - 3 Apr 2026
Viewed by 164
Abstract
Zero Trust Network Access (ZTNA) has emerged as a fundamental paradigm for securing cloud-native and distributed computing environments. However, existing ZTNA implementations remain largely limited by static policy enforcement and opaque machine-learning-based anomaly detection mechanisms, which often lack contextual adaptability, policy awareness, and [...] Read more.
Zero Trust Network Access (ZTNA) has emerged as a fundamental paradigm for securing cloud-native and distributed computing environments. However, existing ZTNA implementations remain largely limited by static policy enforcement and opaque machine-learning-based anomaly detection mechanisms, which often lack contextual adaptability, policy awareness, and interpretable decision-making capabilities. These limitations create significant challenges in dynamic multi-cloud environments where access behavior continuously evolves and security decisions must be both accurate and explainable. To address these challenges, this study proposes Cognitive ZTNA framework, a unified neuro-symbolic trust enforcement framework that integrates transformer-based behavioral trust modeling with ontology-guided symbolic reasoning. The proposed architecture enables continuous trust evaluation by combining behavioral access patterns with explicit policy semantics through a hybrid trust fusion mechanism. This design allows the system to capture long-range behavioral dependencies while maintaining policy-compliant and interpretable access control decisions. The framework is evaluated using the CloudZT-Bench-2025 dataset, comprising 4.2 million cross-platform access events derived from enterprise security telemetry, AWS CloudTrail logs, and simulated adversarial scenarios. Experimental results demonstrate that Cognitive ZTNA achieves Precision = 0.96, Recall = 0.93, and F1-score = 0.95, significantly outperforming rule-based and machine-learning baselines while reducing the false positive rate to 0.03. In addition, the system maintains real-time feasibility with an average decision latency of 24 ms and explanation latency below 5 ms, while achieving 92% analyst-rated explanation sufficiency. These findings demonstrate that integrating behavioral intelligence with symbolic policy reasoning enables adaptive, interpretable, and policy-aware Zero Trust enforcement. The proposed framework therefore provides a practical foundation for next-generation ZTNA systems capable of supporting secure, transparent, and context-aware access control in modern cloud environments. Full article
(This article belongs to the Special Issue New Advances in Network Security and Data Privacy)
Show Figures

Figure 1

20 pages, 3439 KB  
Article
GRIP-Lung: Generative Model of Response to Drug-Induced Perturbation in Lung Cancer
by Zhijin Fu, Yanjiao Li, Zhenshun Du, Denan Zhang, Lei Liu, Qing Jin, Xiujie Chen and Hongbo Xie
Int. J. Mol. Sci. 2026, 27(7), 3264; https://doi.org/10.3390/ijms27073264 - 3 Apr 2026
Viewed by 225
Abstract
The prediction of drug response would significantly improve the treatment of lung cancer. Tumor heterogeneity and complex signal transduction pathways lead to varied treatment effects among patients, but traditional computational approaches struggle to model the nonlinear, high-dimensional relationship between genes and drug responses. [...] Read more.
The prediction of drug response would significantly improve the treatment of lung cancer. Tumor heterogeneity and complex signal transduction pathways lead to varied treatment effects among patients, but traditional computational approaches struggle to model the nonlinear, high-dimensional relationship between genes and drug responses. In order to develop a Generative Adversarial Network (GAN)-based model that can predict drug-induced gene expression profiles from lung cancer cell lines, we developed GRIP-Lung (Generative Model of Response to Drug-Induced Perturbation in Lung Cancer). By making use of biologically informed embeddings of cell line identity as well as drug treatment conditions, this model is able to gain a fairly good understanding of cell types and their transcriptional perturbations induced by different drugs. The GRIP-Lung model displayed reasonably good prediction ability in terms of predictive accuracy and showed high concordance between the predicted and experimental expression profiles. We not only predicted transcriptional changes induced by drug therapy but also used single-sample Gene Set Enrichment Analysis (ssGSEA) to classify post-treatment response states based on characteristic molecular biomarkers, offering a means for selecting effective drugs to target specific heterogeneity within lung tumors. The proposed GRIP-Lung framework faithfully reproduces drug-induced transcriptional perturbations in lung cell line models. By integrating biologically informed embeddings and adversarial learning, the model advances drug response prediction. This makes it a flexible computational tool for drug repositioning. Full article
(This article belongs to the Section Molecular Informatics)
Show Figures

Figure 1

10 pages, 375 KB  
Entry
Deepfakes
by Sean William Maher
Encyclopedia 2026, 6(4), 80; https://doi.org/10.3390/encyclopedia6040080 - 2 Apr 2026
Viewed by 2497
Definition
Deepfakes have emerged as one of the most significant developments in contemporary computational media, representing a sophisticated convergence of machine learning, computer vision, and audiovisual synthesis. Enabled primarily by deep neural networks such as generative adversarial networks (GANs) and transformer-based architectures, Deepfakes are [...] Read more.
Deepfakes have emerged as one of the most significant developments in contemporary computational media, representing a sophisticated convergence of machine learning, computer vision, and audiovisual synthesis. Enabled primarily by deep neural networks such as generative adversarial networks (GANs) and transformer-based architectures, Deepfakes are realistic video fabrications through sound and image alteration and substitution that synthesises human likeness, speech, and behaviours. Deepfakes function simultaneously as creative tools, political instruments, security risks, and epistemic disruptors. They have generated widespread scholarly, regulatory, and public concern by contributing to the reshaping of visual communication and posing significant challenges to established norms of authenticity. This entry defines Deepfakes, outlines their technological foundations, synthesises insights from current research and assesses implications for media industries, journalism, documentary, disinformation, governance, and digital culture. Full article
(This article belongs to the Section Social Sciences)
Show Figures

Figure 1

Back to TopTop