Defensa y seguridad
A CRDNet‐Based Watermarking Algorithm for Fused Visible–Infrared Images
02/12/2025 -
CRDnet includes encoders and decoders based on residual and dense structures, a fusion network robust to 12 visible and infrared image fusion algorithms, and predictors for predicting watermarked...
Dual Entropy Source Physical Unclonable Functions of Reconfigurable Feedback Field‐Effect Transistors with Polycrystalline Silicon Channels
16/11/2025 -
Physically unclonable functions (PUFs) of reconfigurable feedback field‐effect transistors (R‐FBFETs) with polycrystalline silicon channels are designed for dual entropy sources. The uniqueness...
CAGE challenge 4: A scalable multi‐agent reinforcement learning gym for autonomous cyber defence
21/10/2025 -
As cyber threats become increasingly automated and sophisticated, novel solutions must be introduced to improve defense of enterprise networks. Deep reinforcement learning (DRL) has demonstrated...
Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness
13/10/2025 -
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that...
Evaluación automatizada de vulnerabilidades con LLM y ontologías de ciberseguridad
15/09/2025 -
The National Vulnerability Database (NVD) publishes over a thousand new vulnerabilities monthly, with a projected 25 percent increase in 2024, highlighting the crucial need for rapid vulnerability...
Introduction to the special issue on innovative applications of artificial intelligence (IAAI 2025)
08/09/2025 -
This year's innovative applications of AI special issue features AI systems deployed in real‐world settings, from enterprise platforms to public services, demonstrating both technical rigor and...
Semi‐Markovian planning to coordinate aerial and maritime medical evacuation platforms
26/08/2025 -
The transfer of patients between two aircraft using an underway watercraft increases medical evacuation reach and flexibility in maritime environments. The selection of any one of multiple underway...
Feeling heard: Can AI really understand human's feeling?
22/08/2025 -
The rapid advancement of generative artificial intelligence (AI) poses significant challenges to traditional copyright frameworks, intensifying debates over the copyrightability of AI‐generated...
A Literature Survey on Potential Private User Information Leakage in Metaverse Applications
12/08/2025 -
This survey explores potential privacy risks in the Metaverse, focusing on personal data inferred from virtual reality headsets embedded with passive brain‐computer interfaces (BCI). It reviews how...
Exploiting Multitask Deep Learning to Identify Multiple Heavy Metal Contamination at Large Scales
07/07/2025 -
A multitask deep learning framework evaluates manganese, chromium, and cobalt concentrations in European soils, achieving an average R2 of 0.75. From 2009 to 2015, soil concentrations increase...
Dynamic Distribution‐Based Multiagent Cooperative Defense: An Enhanced Resource Allocation and Defense Efficiency Strategy
25/06/2025 -
This study addresses multiagent defense challenges against low‐cost swarm attacks through a hierarchical framework combining resource allocation and PPO optimization. The three‐layer architecture...
Liveness‐Verified Dynamic Time Warping‐Based Authentication and Hybrid Adaptive Neuro‐Fuzzy Inference System Identification for Single‐Channel Diaphragmatic Breathing Surface Electromyography Biometrics
22/06/2025 -
The first biometric framework to harness dynamic time warping (DTW) for single‐channel diaphragmatic surface electromyography authentication via post‐hoc alignment is presented. By optimally...
Challenges and Opportunities in Combining Ultrasound and Inductive Coupling for Energy Supply and Bidirectional Data Exchange in Bioelectronics Medicine Implant Networks
16/06/2025 -
In this contribution, it is shown that miniaturized nerve stimulation implants can be used in collaborative networks. Inductive links and ultrasound are combined to supply these implants with energy...
In‐Sensor Reservoir Computing Using Ferroelectric Optoelectronic Synapse for Near‐Infrared Face Recognition
12/06/2025 -
Near‐infrared reservoir computing system has been realized by using α‐In2Se3 optoelectronic device with concise device and algorithm architecture, achieving high accuracy near 100% and noise...
Building trust: Foundations of security, safety, and transparency in AI
20/05/2025 -
This paper explores the rapidly evolving ecosystem of publicly available AI models and their potential implications on the security and safety landscape. Understanding their potential risks and...
R‐APEX: A Knowledge Graph–Based Platform for the Elucidation of the Toxicological Mechanisms of Ambient Particulate Matter
11/05/2025 -
R‐APEX is a knowledge graph platform developed to investigate how air pollutants such as particularly fine particulate matter (PM2.5) affect human health. By integrating large‐scale biomedical...
Bioinspired and Sustainable Physical Unclonable Functions with Antibacterial Microstructures
06/05/2025 -
An eco‐friendly physical unclonable function (PUF), named HECTA, is developed through spontaneous self‐assembly of hydroxyethyl cellulose (HEC) and tannic acid (TA), forming unique...
Reproducibility in machine‐learning‐based research: Overview, barriers, and drivers
14/04/2025 -
Many research fields are currently reckoning with issues of poor levels of reproducibility. Some label it a “crisis,” and research employing or building machine learning (ML) models is no...
A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption
27/03/2025 -
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and...
In Situ XOR Encryption for Lightweight Security Using Nanoelectromechanical Physically Unclonable Functions
26/03/2025 -
A novel in situ XOR encryption/decryption method using a nanoelectromechanical physically unclonable function (NEM‐PUF) is introduced, enhancing security in data transfers between servers/clouds...
INCIBE presenta su balance de ciberseguridad 2024 con más de 97,000 incidentes
20/03/2025 -
El informe de INCIBE revela un aumento en los incidentes de ciberseguridad en 2024, destacando la creciente amenaza a nivel global y la necesidad de reforzar las medidas de protección...
Actividades asistenciales
Agroalimentación
Automoción y nueva movilidad
Energía sostenible y eficiente
Materiales avanzados
Medio ambiente y sostenibilidad
Patrimonio natural y cultural
Procesos productivos e industria 4.0
Química y biotecnología
Salud y calidad de vida
Transformación digital



