Results 211 to 220 of about 74,403 (290)

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Meta Reinforcement Learning for Automated Cyber Defence

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
ABSTRACT Reinforcement learning (RL) solutions have shown considerable promise for automating the defense of networks to cyber attacks. However, a limitation to their real world deployment is the sample efficiency and generalizability of RL agents. This means that even small changes to attack types require a new agent to be trained from scratch.
Andrew Thomas, Nick Tillyer
wiley   +1 more source

Multi‐Agent Reinforcement Learning for Cyber Defence Transferability and Scalability

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
A method for using mutli‐agent reinforcement learning that allows for zero shot transfer across network setups. Diagrams show the local observation construction, training and agent mapping process. The results for novel 15 and 30 node networks show effective transfer and improved scaling performance. ABSTRACT Reinforcement learning (RL) has shown to be
Andrew Thomas   +2 more
wiley   +1 more source

Unlocking IIoT Potential: A Systematic Review of AI Applications, Adoption Drivers, and Implementation Barriers

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
Unlocking IIoT Potential with AI. ABSTRACT Artificial Intelligence (AI) is playing an increasingly vital role in the Industrial Internet of Things (IIoT), enabling predictive analytics, real‐time monitoring, and autonomous operations across industries such as manufacturing, logistics, and energy.
Tinashe Magara, Mampilo Phahlane
wiley   +1 more source

Crossing the third‐level digital divide through digital literacy programs

open access: yesJournal of the Association for Information Science and Technology, Volume 77, Issue 2, Page 397-413, February 2026.
Abstract Digital literacy programs (DLPs) implemented by community‐anchored organizations have become a key focus toward achieving digital equity. However, there is a notable lack of quantitative empirical research that measures DLPs' effectiveness in supporting the achievement of tangible benefits of digital literacy (DL), beyond simply acquiring it ...
Yeweon Kim   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy