Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (333)

Search Parameters:
Keywords = privacy safeguarding

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 18398 KB  
Article
Coordinated Optimization of Distribution Networks and Smart Buildings Based on Anderson-Accelerated ADMM
by Yiting Jin, Zhaoyan Wang, Da Xu, Zhenchong Wu and Shufeng Dong
Electronics 2026, 15(6), 1313; https://doi.org/10.3390/electronics15061313 - 20 Mar 2026
Viewed by 309
Abstract
With the widespread integration of smart buildings equipped with distributed photovoltaics (PV) and electric vehicles (EVs), distribution networks face significant challenges arising from source-load fluctuations. Conventional centralized dispatch approaches are constrained by communication bottlenecks and data privacy requirements. These limitations make it difficult [...] Read more.
With the widespread integration of smart buildings equipped with distributed photovoltaics (PV) and electric vehicles (EVs), distribution networks face significant challenges arising from source-load fluctuations. Conventional centralized dispatch approaches are constrained by communication bottlenecks and data privacy requirements. These limitations make it difficult to achieve global coordination while preserving the autonomy of individual entities. This paper proposes a hierarchical coordination framework for the coordinated operation of distribution networks and smart buildings. The distribution management system (DMS) and building energy management systems (BEMSs) perform independent optimization within their respective domains. Only aggregated boundary power information is exchanged to protect data privacy, enabling cross-entity coordination under information boundary constraints. Building-side models incorporating thermal dynamics, EV charging and discharging, and PV generation are developed, along with a distribution network power flow model. To solve the coordinated optimization problem, an Anderson-accelerated alternating direction method of multipliers (AA-ADMM) is introduced. A safeguarding mechanism based on combined residuals is incorporated to enhance convergence efficiency and stability. Case studies on the IEEE 33-bus test system demonstrate that compared with the uncoordinated baseline, the proposed method reduces network loss by 12.1% and lowers PV curtailment from 9.20% to 0.52%, while improving voltage profiles without significantly compromising occupant comfort or EV travel requirements. In addition, AA-ADMM achieves convergence with up to 66% fewer iterations than standard ADMM. Full article
(This article belongs to the Special Issue Renewable Energy Integration and Energy Management in Smart Grid)
Show Figures

Figure 1

15 pages, 453 KB  
Article
Healthcare Providers’ Perspectives on Generative Artificial Intelligence (GenAI) Adoption, Adaptation, Assimilation, and Use in the United States
by Obinna O. Oleribe, Marissa Brash, Adati Tarfa, Ricardo Izurieta and Simon D. Taylor-Robinson
Healthcare 2026, 14(6), 775; https://doi.org/10.3390/healthcare14060775 - 19 Mar 2026
Viewed by 599
Abstract
Background: Generative artificial intelligence (GenAI) is rapidly permeating healthcare; yet, U.S. clinicians still report mixed feelings about its reliability, impact on workflow, and ethical implications. Current data on provider sentiment are needed to guide safe, patient-centered AI implementation in healthcare. Objective: This study [...] Read more.
Background: Generative artificial intelligence (GenAI) is rapidly permeating healthcare; yet, U.S. clinicians still report mixed feelings about its reliability, impact on workflow, and ethical implications. Current data on provider sentiment are needed to guide safe, patient-centered AI implementation in healthcare. Objective: This study aimed to assess U.S. healthcare providers’ perceptions of generative AI adoption, perceived usefulness, training needs, barriers, and strategies for safe integration. Methods: A nationwide, IRB-approved, cross-sectional survey was administered to healthcare professionals using Qualtrics. A convenience sample of clinicians was recruited via professional listservs and e-mail invitations. The 20-page questionnaire captured demographics, GenAI exposure, organizational adoption status, perceived usefulness (5-point scale), barriers, and mitigation strategies. SPSS v27 and Microsoft Excel were used for statistical analysis. Results: Of 130 respondents, 109 completed the core survey (completion rate 83.8%). Participants were 38.5% physicians, 16.5% nurses, 12.8% allied professionals, and 32.2% other providers; 54.2% were women, and 64.8% were ≥50 years. Overall, 86.9% agreed that GenAI is useful in current patient care, rising to 92.9% when asked about future usefulness. Only 42.4% had received formal GenAI training, and just 23.2% reported that their organization had begun adopting AI. The top perceived benefits were improved documentation/clerking (57.0%) and error reduction (49.4%). Dominant barriers included limited AI knowledge (24.7%) and fear of job loss (16.9%). Despite concerns, 72% expressed willingness to support broader GenAI adoption, favoring human oversight (67.1%) and staff training (60.8%) as key safeguards. There were statistically significant findings in perceived AI usefulness by gender (χ2 = 29.2; p < 0.001); organizational adoption of AI (χ2 = 31.6.2; p = 0.047) and where AI is most useful (χ2 = 101.1; p < 0.001) by qualifications; and support for AI adoption by age (χ2 = 18.0; p = 0.02). Conclusions: U.S. clinicians in our survey viewed GenAI as useful but reported limited training and organizational infrastructure needed for confident use while also expressing concerns regarding data privacy and ethical risk. Education programs and transparent, provider-led implementation strategies may accelerate responsible GenAI assimilation while addressing ethical and workforce concerns. Also, health administrators should use the efficiency gains to improve provider–patient relationships and clinicians’ work–life balance while reducing clinician burnout rates. Full article
(This article belongs to the Section Artificial Intelligence in Healthcare)
Show Figures

Figure 1

18 pages, 820 KB  
Article
Pathways to Green AI: Information Disclosure of Artificial Intelligence Within the ESG Framework of Commercial Entities
by Junkai Chen
Sustainability 2026, 18(6), 2922; https://doi.org/10.3390/su18062922 - 17 Mar 2026
Viewed by 358
Abstract
Strengthening transparency has emerged as a pivotal issue in promoting the responsible development of artificial intelligence (AI). As the prevailing framework for corporate information disclosure, Environmental, Social, and Governance (ESG) reporting shares an inherent synergy with AI governance; both are rooted in the [...] Read more.
Strengthening transparency has emerged as a pivotal issue in promoting the responsible development of artificial intelligence (AI). As the prevailing framework for corporate information disclosure, Environmental, Social, and Governance (ESG) reporting shares an inherent synergy with AI governance; both are rooted in the pursuit of sustainable development and the disclosure of specific matters to investors and broader stakeholders. This study analyzes the status of artificial intelligence (AI) information disclosure in the ESG (Environmental, Social, and Governance) reports of listed companies across the United States, Europe, and China, finding that: (1) ESG reports have emerged as a primary channel for business organizations to disclose AI-related information; (2) significant disparities exist in disclosure levels across four key AI-related domains—development, application, manufacturing, and consumption; and (3) disclosure density varies considerably across E, S, and G dimensions, with the Governance (G) pillar exhibiting the most comprehensive information. Based on an empirical analysis of the ESG-AI disclosure framework, this study proposes an optimization scheme for ESG-AI reporting, clearly defining mandatory ESG-AI disclosure obligations for listed companies and employing the “comply or explain” mechanism to balance corporate transparency with operational efficiency while adhering to the “Double Materiality” principle by disclosing model training energy consumption and ecological impacts under Environmental (E) matters, addressing employment, employee training, marketing labeling, and customer privacy under Social (S) matters, and elaborating on corporate AI strategies, risk management protocols, and governance policies under Governance (G) matters. Regarding procedural safeguards, taking China as a case study, centralized disclosure could be implemented through the National Enterprise Credit Information Publicity System, complemented by an assurance system for listed company reports to enhance the accessibility and accuracy of information disclosure. Full article
Show Figures

Figure 1

31 pages, 974 KB  
Article
Model Procurement for Industrial Cyber-Physical Systems Using Cryptographic Performance Attestation
by Jay Bojič Burgos, Urban Sedlar and Matevž Pustišek
Future Internet 2026, 18(3), 146; https://doi.org/10.3390/fi18030146 - 13 Mar 2026
Viewed by 411
Abstract
Integrating third-party Machine Learning (ML) models into industrial Operational Technology (OT) creates a procurement deadlock: operators cannot verify vendor performance claims without sharing representative evaluation data with vendors, while vendors refuse to reveal proprietary model weights before purchase, rendering traditional safeguards such as [...] Read more.
Integrating third-party Machine Learning (ML) models into industrial Operational Technology (OT) creates a procurement deadlock: operators cannot verify vendor performance claims without sharing representative evaluation data with vendors, while vendors refuse to reveal proprietary model weights before purchase, rendering traditional safeguards such as Non-Disclosure Agreements technically unenforceable. This paper introduces a framework combining Zero-Knowledge Proofs (ZKPs) with smart contracts to enable trust-minimized, cryptographically verifiable competitive model procurement in Industrial Cyber-Physical Systems (ICPS). Vendors cryptographically prove that their model outperforms a legacy baseline without disclosing proprietary weights, a process we term cryptographic performance attestation, while the on-chain workflow automates escrow, proof verification, and best-vendor selection with arbiter-based dispute resolution. ZKP privacy is scoped to vendor model weights; operator-side evaluation-data confidentiality is managed separately via synthetic, de-identified, or public benchmark data. We analyze three ZKP workflow variations and evaluate them on consumer-grade hardware, achieving proving times of approximately three seconds and sub-dollar on-chain verification costs under Layer-2 fee assumptions for the recommended single-proof variation, while identifying computational trade-offs of recursive proof aggregation. The entire verification phase operates offline with no impact on real-time OT control paths, bridging the IT/OT pre-transaction trust gap while deferring artifact deployment to existing OT tooling. Full article
(This article belongs to the Special Issue Cyber-Physical Systems in Industrial Communication Systems)
Show Figures

Figure 1

33 pages, 637 KB  
Review
Cryptographic Foundations of Pseudonymisation for Personal Data Protection
by Konstantinos Limniotis
Cryptography 2026, 10(2), 18; https://doi.org/10.3390/cryptography10020018 - 11 Mar 2026
Viewed by 444
Abstract
Pseudonymisation constitutes an essential technical and organisational measure for implementing personal data-protection safeguards. Its main goal is to hide identities of individuals, thus reducing data protection and privacy risks through facilitating the fulfilment of several principles such as data minimisation and security. However, [...] Read more.
Pseudonymisation constitutes an essential technical and organisational measure for implementing personal data-protection safeguards. Its main goal is to hide identities of individuals, thus reducing data protection and privacy risks through facilitating the fulfilment of several principles such as data minimisation and security. However, selecting and deploying appropriate pseudonymisation mechanisms in a risk-based approach, tailored to the specific data processing context, remains a non-trivial task. This survey paper aims to present especially how cryptography can be used at the service of pseudonymisation, putting emphasis not only on traditional approaches but also on advanced cryptographic techniques that have been proposed to address special pseudonymisation challenges. To this end, we systematically classify existing approaches according to a taxonomy that captures key design dimensions that are relevant to specific data-protection challenges. Finally, since the notion of pseudonymisation adopted in this work is grounded in European data-protection law, we also discuss recent legal developments, in particular the CJEU’s latest judgment, which refined the interpretation of pseudonymous data. Full article
(This article belongs to the Collection Survey of Cryptographic Topics)
Show Figures

Figure 1

19 pages, 10521 KB  
Article
GAT-LA: Graph Attention-Based Locality-Aware Sampling for Modeling the Dynamic Evolution of I2P Routing Topologies
by Runnan Tan, Haiyan Wang, Qingfeng Tan, Yushun Xie, Peng Zhang and Bo Hu
Technologies 2026, 14(3), 141; https://doi.org/10.3390/technologies14030141 - 26 Feb 2026
Viewed by 365
Abstract
Anonymous communication networks such as the Invisible Internet Project (I2P) are essential for safeguarding privacy and ensuring freedom of expression, necessitating robust performance and security evaluation in controlled environments. Network testbeds offer a reliable alternative to real-world testing. This paper proposes a dynamic [...] Read more.
Anonymous communication networks such as the Invisible Internet Project (I2P) are essential for safeguarding privacy and ensuring freedom of expression, necessitating robust performance and security evaluation in controlled environments. Network testbeds offer a reliable alternative to real-world testing. This paper proposes a dynamic modeling framework based on Graph Attention Network (GAT). We introduce a Region-Centric Initialization (RCI) strategy to establish an initial observation anchor, followed by a GAT-based Locality-Aware (GAT-LA) sampling mechanism that treats representative node selection as a dynamic learning task. Experimental results demonstrate that the GAT-LA mechanism significantly outperforms static methods in maintaining long-term similarity to real-world I2P performance metrics. The integrated stability penalty mechanism effectively suppresses excessive topological fluctuations, ensuring temporal smoothness across evolutionary cycles. Furthermore, the RCI strategy provides high engineering flexibility by supporting both automated scoring and target-oriented manual configuration. This paper presents a scalable methodology for dynamic network simulation with enhanced statistical alignment, providing a practical reference for security research within resource-constrained anonymous network ranges or testbeds. Full article
(This article belongs to the Topic Graph Neural Networks and Learning Systems)
Show Figures

Figure 1

19 pages, 1244 KB  
Article
Anomaly Detection as a Key Driver of Digital Forensic Resilience: Empirical Evidence from Critical Infrastructure Experts
by Marija Gombar, Darko Možnik and Mirjana Pejić Bach
Systems 2026, 14(2), 213; https://doi.org/10.3390/systems14020213 - 17 Feb 2026
Viewed by 643
Abstract
Ensuring strategic resilience in critical infrastructures supported with a machine learning approach requires moving beyond compliance checklists and post-incident analysis toward proactive, intelligence-based approaches. This study introduces the Forensic Resilience Operational Model (FROM), a systems thinking framework designed to embed forensic intelligence into [...] Read more.
Ensuring strategic resilience in critical infrastructures supported with a machine learning approach requires moving beyond compliance checklists and post-incident analysis toward proactive, intelligence-based approaches. This study introduces the Forensic Resilience Operational Model (FROM), a systems thinking framework designed to embed forensic intelligence into the resilience cycle of complex socio-technical systems. To quantify this integration, the study investigates the determinants of the extent to which four operational pillars (forensic readiness, anomaly detection, governance and privacy safeguards, and structured intelligence integration) affect forensic resilience, using empirical survey data from 212 cybersecurity professionals across critical infrastructure sectors. We deploy Partial Least Squares Structural Equation Modelling (PLS-SEM) to investigate these relationships, and the results confirm that anomaly detection is the strongest contributor to forensic resilience, followed by structured intelligence integration and forensic readiness. Governance safeguards, while comparatively weaker, provide the necessary legitimacy and assurance of compliance. Supported with sector-specific case studies in the maritime, financial, and CERT domains, the findings highlight both the adaptability of the proposed FROM and the operational constraints encountered in real-world contexts. The study contributes to the field of systems-oriented strategic management by demonstrating that, when systematically embedded, forensic intelligence enhances adaptive capacity, supports predictive decision-making, and strengthens resilience in environments characterized by uncertainty and high complexity. Full article
Show Figures

Figure 1

18 pages, 890 KB  
Article
Physical Unclonable Function Based Privacy-Preserving Authentication Scheme for Autonomous Vehicles Using Hardware Acceleration
by Rabeea Fatima, Ujunwa Madububambachu, Ahmed Sherif, Muhammad Hataba, Nick Rahimi and Kasem Khalil
Sensors 2026, 26(4), 1088; https://doi.org/10.3390/s26041088 - 7 Feb 2026
Viewed by 352
Abstract
With the rise of smart cities, technology has enabled more efficient urban management. A key part of this is the Internet of Vehicles (IoVs), which connects vehicles to smart city systems to improve transportation safety and efficiency. This integrated system enables wireless connection [...] Read more.
With the rise of smart cities, technology has enabled more efficient urban management. A key part of this is the Internet of Vehicles (IoVs), which connects vehicles to smart city systems to improve transportation safety and efficiency. This integrated system enables wireless connection between vehicles, allowing for the sharing of essential traffic information. However, with all this connectivity, there are growing concerns about IoV security and privacy. This paper presents a new privacy-preserving authentication scheme for Autonomous Vehicles (AVs) in the IoV field using physical unclonable functions (PUFs). This scheme employs a bilinear pairing-based encryption technique that supports search over encrypted data. The primary aim of this scheme is to authenticate AVs inside the IoV architecture. A novel PUF design generates random keys for our authentication technique, hence boosting security. This dual-layer security strategy safeguards against a range of cyber threats, including identity fraud, man-in-the-middle attacks, and unauthorized access to personal user data. The PUF design will guarantee the true randomness of the AVs’ users’ secret keys. To handle the large amount of data involved, we use hardware acceleration with different Field-Programmable Gate Arrays (FPGAs). Our examination of privacy and security demonstrates the achievement of the defined design goals. The proposed authentication framework was fully implemented and validated on FPGA platforms to demonstrate its hardware feasibility and efficiency. The integrated heterogeneous PUF achieves an average reliability exceeding 98.5% across a wide temperature range, while maintaining near-ideal randomness with an average Hamming weight of 49.7% over multiple challenge sets. Furthermore, the uniqueness metric approaches 49.9%, confirming strong inter-device distinguishability among different PUF instances. The complete authentication architecture was synthesized on Nexys-100T, Zynq-104, and Kintex-116 devices, where the design utilizes less than 80% of slice Look-Up Tables (LUTs), under 27% of on-chip memory resources, and below 16% of DSP blocks, demonstrating low hardware overhead. Full article
(This article belongs to the Special Issue Privacy and Security in Sensor Networks)
Show Figures

Figure 1

25 pages, 384 KB  
Review
Governing Healthcare AI in the Real World: How Fairness, Transparency, and Human Oversight Can Coexist: A Narrative Review
by Paolo Bailo, Giulio Nittari, Giuliano Pesel, Emerenziana Basello, Tommaso Spasari and Giovanna Ricci
Sci 2026, 8(2), 36; https://doi.org/10.3390/sci8020036 - 6 Feb 2026
Cited by 1 | Viewed by 1944
Abstract
Artificial intelligence (AI) is rapidly shifting from experimental pilots to mainstream clinical infrastructure, redefining how evidence, accountability, and ethics intersect in healthcare. This narrative review integrates insights from peer-reviewed studies and policy frameworks to examine seven cross-cutting aspects: bias and fairness, explainability, safety [...] Read more.
Artificial intelligence (AI) is rapidly shifting from experimental pilots to mainstream clinical infrastructure, redefining how evidence, accountability, and ethics intersect in healthcare. This narrative review integrates insights from peer-reviewed studies and policy frameworks to examine seven cross-cutting aspects: bias and fairness, explainability, safety and quality, privacy and data protection, accountability and liability, human oversight, and procurement and deployment. Findings reveal persistent inequities driven by dataset bias and opaque design; the need for explainability tools that are validated, task-specific, and usable by clinicians; and the centrality of post-market surveillance for sustaining patient safety. Privacy-preserving methods such as federated learning and differential privacy show promise but demand rigorous validation and regulatory coherence. Emerging liability models advocate shared enterprise responsibility, while governance-by-design—embedding transparency, auditability, and equity across the AI lifecycle—appears most effective in balancing innovation with public trust. Ethical, legal, and technical safeguards must evolve together to ensure that AI augments, rather than replaces, clinical judgment and institutional accountability. Full article
29 pages, 2816 KB  
Article
Library Systems and Digital-Rights Management: Towards a Blockchain-Based Solution for Enhanced Privacy and Security
by Patrick Laboso, Martin Aruldoss, P. Thiyagarajan, T. Miranda Lakshmi and Martin Wynn
Information 2026, 17(2), 137; https://doi.org/10.3390/info17020137 - 1 Feb 2026
Viewed by 861
Abstract
The rapid digitization of library resources has intensified the need for robust digital-rights management (DRM) mechanisms to safeguard copyright, control access, and preserve user privacy. Conventional DRM approaches are often centralized, prone to single-point-of-failure, and are limited in transparency and interoperability. To address [...] Read more.
The rapid digitization of library resources has intensified the need for robust digital-rights management (DRM) mechanisms to safeguard copyright, control access, and preserve user privacy. Conventional DRM approaches are often centralized, prone to single-point-of-failure, and are limited in transparency and interoperability. To address these challenges, this article puts forward a decentralized DRM framework for library systems by leveraging blockchain technology and decentralized DRM-key mechanisms. An integrative review of the available research literature provides an analysis of current blockchain-based DRM library systems, their limitations, and associated challenges. To address these issues, a controlled experiment is set up to implement and evaluate a possible solution. In the proposed model, digital content is encrypted and stored in the Inter-Planetary File System (IPFS), while blockchain smart contracts manage the generation, distribution, and validation of DRM-keys that regulate user-access rights. This approach ensures immutability, transparency, and fine-grained access control without reliance on centralized authorities. Security is enhanced through cryptographic techniques for authentication. The model not only mitigates issues of piracy, unauthorized redistribution, and vendor lock-in, but also provides a scalable and interoperable solution for modern digital libraries. The findings demonstrate how blockchain-enabled DRM-keys can enhance trust, accountability, and efficiency through the development of secure, decentralized, and user-centric digital library systems, which will be of interest to practitioners charged with library IT technology management and to researchers in the wider field of blockchain applications in organizations. Full article
Show Figures

Graphical abstract

28 pages, 14020 KB  
Article
Multi-Objective Optimization and Federated Learning for Agri-Food Supply Chains via Dynamic Heterogeneous Graph Neural Networks
by Lin Xuan, Baidong Zhao, Dingkun Zheng, Madina Mansurova, Baurzhan Belgibaev, Gulshat Amirkhanova, Alikhan Amirkhanov and Chenghan Yang
Sustainability 2026, 18(3), 1426; https://doi.org/10.3390/su18031426 - 31 Jan 2026
Cited by 1 | Viewed by 481
Abstract
The intricate and dynamic nature of agricultural supply chains imposes stringent demands on optimization methodologies, necessitating multi-objective considerations, privacy safeguards, and decision transparency to address pivotal challenges in ensuring food security and sustainable development. This study introduces a Dynamic Heterogeneous Multi-Objective Graph Neural [...] Read more.
The intricate and dynamic nature of agricultural supply chains imposes stringent demands on optimization methodologies, necessitating multi-objective considerations, privacy safeguards, and decision transparency to address pivotal challenges in ensuring food security and sustainable development. This study introduces a Dynamic Heterogeneous Multi-Objective Graph Neural Network (DHMO-GNN) model, meticulously tailored for optimizing agricultural supply chains. It integrates five core modules: data preprocessing and heterogeneous graph construction, dynamic graph neural networks, multi-objective optimization, interpretability enhancement, and federated learning collaboration. The model adeptly captures temporal dynamics through sequential attention mechanisms and incremental updates, harmonizes cost, delivery time, and carbon emissions via multi-task learning and Pareto optimization, augments decision transparency with GNNExplainer and SHAP, and surmounts data silos by leveraging federated learning alongside differential privacy. Empirical evaluations on the Chengdu Hongguang Town Farmers’ Market dataset demonstrate that the centralized DHMO-GNN variant achieves a hypervolume indicator (HV) of 0.849, surpassing baseline models; the federated variant exhibits only a 2.6% decline under privacy constraints, underscoring its robustness. Ablation studies further corroborate the synergistic contributions of each module. This research furnishes an efficacious and trustworthy framework for the intelligent management of agricultural supply chains, holding profound implications for advancing digital transformation and green development. Full article
(This article belongs to the Section Sustainable Management)
Show Figures

Figure 1

29 pages, 473 KB  
Article
FedHGPrompt: Privacy-Preserving Federated Prompt Learning for Few-Shot Heterogeneous Graph Learning
by Xijun Wu, Jianjun Shi and Xinming Zhang
Entropy 2026, 28(2), 143; https://doi.org/10.3390/e28020143 - 27 Jan 2026
Viewed by 460
Abstract
Learning from heterogeneous graphs under the constraints of both data scarcity and data privacy presents a significant challenge. While graph prompt learning offers a pathway for efficient few-shot adaptation, and federated learning provides a paradigm for decentralized training, their direct integration for heterogeneous [...] Read more.
Learning from heterogeneous graphs under the constraints of both data scarcity and data privacy presents a significant challenge. While graph prompt learning offers a pathway for efficient few-shot adaptation, and federated learning provides a paradigm for decentralized training, their direct integration for heterogeneous graphs is non-trivial due to structural complexity and the need for rigorous privacy guarantees. This paper proposes FedHGPrompt, a novel federated framework that bridges this gap through a cohesive architectural design. Our approach introduces a three-layer model: a unification layer employing dual templates to standardize heterogeneous graphs and tasks, an adaptation layer utilizing trainable dual prompts to steer a frozen pre-trained model for few-shot learning, and a privacy layer integrating a cryptographic secure aggregation protocol. This design ensures that the central server only accesses aggregated updates, thereby cryptographically safeguarding individual client data. Extensive evaluations on three real-world heterogeneous graph datasets (ACM, DBLP, and Freebase) demonstrate that FedHGPrompt achieves superior few-shot learning performance compared to existing federated graph learning baselines (including FedGCN, FedGAT, FedHAN, and FedGPL) while maintaining strong privacy assurances and practical communication efficiency. The framework establishes an effective approach for collaborative learning on distributed, heterogeneous graph data where privacy is paramount. Full article
Show Figures

Figure 1

25 pages, 4969 KB  
Article
Energy–Latency–Accuracy Trade-Off in UAV-Assisted VECNs: A Robust Optimization Approach Under Channel Uncertainty
by Tiannuo Liu, Menghan Wu, Hanjun Yu, Yixin He, Dawei Wang, Li Li and Hongbo Zhao
Drones 2026, 10(2), 86; https://doi.org/10.3390/drones10020086 - 26 Jan 2026
Viewed by 516
Abstract
Federated learning (FL)-based vehicular edge computing networks (VECNs) are emerging as a key enabler of intelligent transportation systems, as their privacy-preserving and distributed architecture can safeguard vehicle data while reducing latency and energy consumption. However, conventional roadside units face processing bottlenecks in dense [...] Read more.
Federated learning (FL)-based vehicular edge computing networks (VECNs) are emerging as a key enabler of intelligent transportation systems, as their privacy-preserving and distributed architecture can safeguard vehicle data while reducing latency and energy consumption. However, conventional roadside units face processing bottlenecks in dense traffic and at the network edge, motivating the adoption of unmanned aerial vehicle (UAV)-assisted VECNs. To address this challenge, this paper proposes a UAV-assisted VECN framework with FL, aiming to improve model accuracy while minimizing latency and energy consumption during computation and transmission. Specifically, a reputation-based client selection mechanism is introduced to enhance the accuracy and reliability of federated aggregation. Furthermore, to address the channel dynamics induced by high vehicle mobility, we design a robust reinforcement learning-based resource allocation scheme. In particular, an asynchronous parallel deep deterministic policy gradient (APDDPG) algorithm is developed to adaptively allocate computation and communication resources in response to real-time channel states and task demands. To ensure consistency with real vehicular communication environments, field experiments were conducted and the obtained measurements were used as simulation parameters to analyze the proposed algorithm. Compared with state-of-the-art algorithms, the developed APDDPG algorithm achieves 20% faster convergence, 9% lower energy consumption, a FL accuracy of 95.8%, and the most robust standard deviation under varying channel conditions. Full article
(This article belongs to the Special Issue Low-Latency Communication for Real-Time UAV Applications)
Show Figures

Figure 1

31 pages, 2717 KB  
Perspective
Artificial Intelligence in Local Energy Systems: A Perspective on Emerging Trends and Sustainable Innovation
by Sára Ferenci, Florina-Ambrozia Coteț, Elena Simina Lakatos, Radu Adrian Munteanu and Loránd Szabó
Energies 2026, 19(2), 476; https://doi.org/10.3390/en19020476 - 17 Jan 2026
Cited by 1 | Viewed by 864
Abstract
Local energy systems (LESs) are becoming larger and more heterogeneous as distributed energy resources, electrified loads, and active prosumers proliferate, increasing the need for reliable coordination of operation, markets, and community governance. This Perspective synthesizes recent literature to map how artificial intelligence (AI) [...] Read more.
Local energy systems (LESs) are becoming larger and more heterogeneous as distributed energy resources, electrified loads, and active prosumers proliferate, increasing the need for reliable coordination of operation, markets, and community governance. This Perspective synthesizes recent literature to map how artificial intelligence (AI) supports forecasting and situational awareness, optimization, and real-time control of distributed assets, and community-oriented markets and engagement, while arguing that adoption is limited by system-level credibility rather than model accuracy alone. The analysis highlights interlocking deployment barriers, such as governance-integrated explainability, distributional equity, privacy and data governance, robustness under non-stationarity, and the computational footprint of AI. Building on this diagnosis, the paper proposes principles-as-constraints for sustainable, trustworthy LES AI and a deployment-oriented validation and reporting framework. It recommends evaluating LES AI with deployment-ready evidence, including stress testing under shift and rare events, calibrated uncertainty, constraint-violation and safe-fallback behavior, distributional impact metrics, audit-ready documentation, edge feasibility, and transparent energy/carbon accounting. Progress should be judged by measurable system benefits delivered under verifiable safeguards. Full article
(This article belongs to the Section A1: Smart Grids and Microgrids)
Show Figures

Graphical abstract

27 pages, 1134 KB  
Article
A Cryptocurrency Dual-Offline Payment Method for Payment Capacity Privacy Protection
by Huayou Si, Yaqian Huang, Guozheng Li, Yun Zhao, Yuanyuan Qi, Wei Chen and Zhigang Gao
Electronics 2026, 15(2), 400; https://doi.org/10.3390/electronics15020400 - 16 Jan 2026
Viewed by 827
Abstract
Current research on cryptocurrency dual-offline payment systems has garnered significant attention from both academia and industry, owing to its potential payment feasibility and application scalability in extreme environments and network-constrained scenarios. However, existing dual-offline payment schemes exhibit technical limitations in privacy preservation, failing [...] Read more.
Current research on cryptocurrency dual-offline payment systems has garnered significant attention from both academia and industry, owing to its potential payment feasibility and application scalability in extreme environments and network-constrained scenarios. However, existing dual-offline payment schemes exhibit technical limitations in privacy preservation, failing to adequately safeguard sensitive data such as payment amounts and participant identities. To address this, this paper proposes a privacy-preserving dual-offline payment method utilizing a cryptographic challenge-response mechanism. The method employs zero-knowledge proof technology to cryptographically protect sensitive information, such as the payer’s wallet balance, during identity verification and payment authorization. This provides a technical solution that balances verification reliability with privacy protection in dual-offline transactions. The method adopts the payment credential generation and credential verification mechanism, combined with elliptic curve cryptography (ECC), to construct the verification protocol. These components enable dual-offline functionality while concealing sensitive information, including counterparty identities and wallet balances. Theoretical analysis and experimental verification on 100 simulated transactions show that this method achieves an average payment generation latency of 29.13 ms and verification latency of 25.09 ms, significantly outperforming existing technology in privacy protection, computational efficiency, and security robustness. The research provides an innovative technical solution for cryptocurrency dual-offline payment, advancing both theoretical foundations and practical applications in the field. Full article
(This article belongs to the Special Issue Data Privacy Protection in Blockchain Systems)
Show Figures

Figure 1

Back to TopTop