Advanced AI and Privacy-Preserving Techniques in Cybersecurity and Resource Optimization

The recent developments in the research area have significantly advanced the field, particularly in the domains of cybersecurity, privacy-preserving techniques, and efficient computational models. There is a notable shift towards leveraging advanced AI technologies, such as generative AI and transformer architectures, to enhance security and privacy in various systems, including smart grids, digital substations, and biometric systems. These innovations are not only improving the accuracy and efficiency of detection and authentication processes but also ensuring robust privacy protections against emerging threats. Additionally, there is a growing emphasis on game-theoretic models and multi-agent systems to optimize resource allocation and enhance collaborative optimization in complex networks. These advancements are paving the way for more secure, efficient, and resilient systems across multiple sectors, from energy management to package delivery. Notably, the integration of privacy-preserving techniques with cutting-edge AI models is proving to be a powerful combination for addressing contemporary challenges in cybersecurity and data privacy.

Sources

Unlocking the Future: A Cloud-Based Artificial Intelligence Access Control System

Privacy-Preserving Power Flow Analysis via Secure Multi-Party Computation

High-Bandwidth, Low-Computational Approach: Estimator-Based Control for Hybrid Flying Capacitor Multilevel Converters Using Multi-Cost Gradient Descent and State Feedforward

A Lightweight Edge-CNN-Transformer Model for Detecting Coordinated Cyber and Digital Twin Attacks in Cooperative Smart Farming

Leveraging Conversational Generative AI for Anomaly Detection in Digital Substations

Computation-power Coupled Modeling for IDCs and Collaborative Optimization in ADNs

A Framework for the Security and Privacy of Biometric System Constructions under Defined Computational Assumptions

PP-LEM: Efficient and Privacy-Preserving Clearance Mechanism for Local Energy Markets

Joint Resource Optimization, Computation Offloading and Resource Slicing for Multi-Edge Traffic-Cognitive Networks

Optimized Tradeoffs for Private Prediction with Majority Ensembling

Leveraging A New GAN-based Transformer with ECDH Crypto-system for Enhancing Energy Theft Detection in Smart Grid

Privacy-preserving Robotic-based Multi-factor Authentication Scheme for Secure Automated Delivery System

A Game-theoretic model of forex trading with stochastic strategies and information asymmetry

Graph-Based Orchestration of Service-Oriented Model-Based Control Systems

Statistic Maximal Leakage

Built with on top of