{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T14:44:02Z","timestamp":1765464242573,"version":"3.48.0"},"reference-count":71,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T00:00:00Z","timestamp":1765411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>The Internet of Medical Things (IoMT) improves healthcare delivery through many medical applications. Because of medical data sensitivity and limited resources of wearable technology, privacy and security are significant challenges. Traditional encryption does not provide secure computation on encrypted data, and many blockchain-based IoMT solutions partially rely on centralized structures. IoMT with dynamic encryption is an innovative privacy-preserving system that combines sensitivity-based classification and advanced encryption to address these issues. The study proposes privacy-preserving IoMT framework that dynamically adapts its cryptographic strategy based on data sensitivity. The proposed approach uses a hybrid SDAIPA (SDAIA-HIPAA) classification model that integrates Saudi Data and Artificial Intelligence Authority (SDAIA) and Health Insurance Portability and Accountability Act (HIPAA) guidelines. This classification directly governs the selection of encryption mechanisms, where Advanced Encryption Standard (AES) is used for low-sensitivity data, and Fully Homomorphic Encryption (FHE) is used for high-sensitivity data. The Whale Optimization Algorithm (WOA) is used to maximize cryptographic entropy of FHE keys and improves security against attacks, resulting in an Optimized FHE that is conditionally used based on SDAIPA outputs. This proposed approach provides a novel scheme to dynamically align cryptographic intensity with data risk and avoids the overhead of uniform FHE use while ensuring strong privacy for critical records. Two datasets are used to assess the proposed approach with up to 806 samples. The results show that the hybrid OHE-WOA outperforms in the percentage of sensitivity of privacy index with dataset 1 by 78.3% and 12.5% and with dataset 2 by 89% and 19.7% compared to AES and RSA, respectively, which ensures its superior ability to preserve privacy.<\/jats:p>","DOI":"10.3390\/computers14120549","type":"journal-article","created":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T14:30:17Z","timestamp":1765463417000},"page":"549","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Theoretical Model for Privacy-Preserving IoMT Based on Hybrid SDAIPA Classification Approach and Optimized Homomorphic Encryption"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1161-939X","authenticated-orcid":false,"given":"Mohammed Ali R.","family":"Alzahrani","sequence":"first","affiliation":[{"name":"Information Technology Department, Computing and ICT Faculty, Taif University, Taif 21974, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2025,12,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"100904","DOI":"10.1016\/j.measen.2023.100904","article-title":"A blockchain-based secured system using the Internet of Medical Things (IOMT) network for e-healthcare monitoring","volume":"30","author":"Lodha","year":"2023","journal-title":"Meas. Sens."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1016\/j.jiph.2024.01.013","article-title":"Multirole of the internet of medical things (IoMT) in biomedical systems for managing smart healthcare systems: An overview of current and future innovative trends","volume":"17","author":"Mathkor","year":"2024","journal-title":"J. Infect. Public Health"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Zhang, H., Li, G., Zhang, Y., Gai, K., and Qiu, M. (2021). Blockchain-Based Privacy-Preserving Medical Data Sharing Scheme Using Federated Learning. Knowledge Science, Engineering and Management: 14th International Conference, KSEM 2021, Tokyo, Japan, 14\u201316 August 2021, Springer. Proceedings, Part III.","DOI":"10.1007\/978-3-030-82153-1_52"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1016\/j.jsps.2023.04.026","article-title":"Estimating the potential economic impact of the Wasfaty program on costs of antidiabetic treatment: An initiative for the digital transformation of health","volume":"31","author":"Alshammari","year":"2023","journal-title":"Saudi Pharm. J."},{"key":"ref_5","first-page":"731","article-title":"Security, Privacy and Trust in IoMT Enabled Smart Healthcare System: A Systematic Review of Current and Future Trends","volume":"12","author":"Vaiyapuri","year":"2021","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Alsadhan, A., Alhogail, A., and Alsalamah, H. (2024). Blockchain-Based Privacy Preservation for the Internet of Medical Things: A Literature Review. Electronics, 13.","DOI":"10.3390\/electronics13193832"},{"key":"ref_7","first-page":"1b","article-title":"Blockchain Revolutionizing Healthcare Industry: A Systematic Review of Blockchain Technology Benefits and Threats","volume":"20","author":"AbdelSalam","year":"2023","journal-title":"Perspect. Health Inf. Manag."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Gallo, G.D., and Micucci, D. (2025). Internet of Medical Things Systems Review: Insights into Non-Functional Factors. Sensors, 25.","DOI":"10.3390\/s25092795"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"e1493","DOI":"10.7717\/peerj-cs.1493","article-title":"IoMT based smart healthcare system to control outbreaks of the COVID-19 pandemic","volume":"9","author":"Almujally","year":"2023","journal-title":"PeerJ Comput. Sci."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Matthew, P., Mchale, S., Deng, X., Nakhla, G., Trovati, M., Nnamoko, N., Pereira, E., Zhang, H., and Raza, M. (2025). A Review of the State of the Art for the Internet of Medical Things. Sci, 7.","DOI":"10.3390\/sci7020036"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"29","DOI":"10.36922\/aih.2580","article-title":"Enhancing health-care security: The role of blockchain and consensus mechanisms","volume":"1","author":"Hosna","year":"2024","journal-title":"Artif. Intell. Health"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Andriulo, F.C., Fiore, M., Mongiello, M., Traversa, E., and Zizzo, V. (2024). Edge Computing and Cloud Computing for Internet of Things: A Review. Informatics, 11.","DOI":"10.3390\/informatics11040071"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1957","DOI":"10.1007\/s11277-023-10528-8","article-title":"Survey on Sensors and Smart Devices for IoT Enabled Intelligent Healthcare System","volume":"131","author":"Chopade","year":"2023","journal-title":"Wirel. Pers. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Szabo, D.A., Neagu, N., Teodorescu, S., Apostu, M., Predescu, C., P\u00e2rvu, C., and Veres, C. (2023). The Role and Importance of Using Sensor-Based Devices in Medical Rehabilitation: A Literature Review on the New Therapeutic Approaches. Sensors, 23.","DOI":"10.3390\/s23218950"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"e70010","DOI":"10.1111\/exsy.70010","article-title":"A Survey on Internet of Medical Things (IoMT): Enabling Technologies, Security and Explainability Issues, Challenges, and Future Directions","volume":"42","author":"Ozcelik","year":"2025","journal-title":"Expert Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1049\/cmu2.12327","article-title":"A comprehensive review on the users\u2019 identity privacy for 5G networks","volume":"16","author":"Saeed","year":"2022","journal-title":"IET Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/s43926-025-00123-7","article-title":"A comprehensive survey on 6G-security: Physical connection and service layers","volume":"5","author":"Saeed","year":"2025","journal-title":"Discov. Internet Things"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Hamad, L.I.S., Ahmed, E.S.A., and Saeed, R.A. (2022). Machine Learning in Healthcare: Theory, Applications, and Future Trends. AI Applications for Disease Diagnosis and Treatment, IGI-Globa.","DOI":"10.4018\/978-1-6684-2304-2.ch001"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hazber, M.A.G., Albarrak, A., Altamimi, M., Muniasamy, A., Islam, A., Ahmed, M.A., Alalayah, K.M., Hussain, S., and Irshad, R.R. (2024). Securing IoMT-Based Healthcare Systems with Meta-Heuristic Quantum Cryptography and Honeybee Optimization. Res. Square, 1\u201341.","DOI":"10.21203\/rs.3.rs-5447617\/v1"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/s10791-025-09686-z","article-title":"Cyber threats in mobile healthcare applications: Systematic review of enabling technologies, threat models, detection approaches, and future directions","volume":"28","author":"Ikegwu","year":"2025","journal-title":"Discov. Comput."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"115","DOI":"10.9734\/ajrcos\/2025\/v18i10768","article-title":"Data Sovereignty and Digital Health Transformation in Saudi Arabia: A Review with Policy Implications for Vision 2030","volume":"18","author":"Albaroudi","year":"2025","journal-title":"Asian J. Res. Comput. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Prescott, D.E. (2025). Health Insurance Portability and Accountability Act (HIPAA). Encyclopedia of Social Work, Oxford University Press.","DOI":"10.1093\/acrefore\/9780199975839.013.937"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1109\/TC.2013.154","article-title":"Exploring the Feasibility of Fully Homomorphic Encryption","volume":"64","author":"Wang","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/3569955","article-title":"MemFHE: End-to-end Computing with Fully Homomorphic Encryption in Memory","volume":"23","author":"Gupta","year":"2024","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1007\/s10586-021-03520-z","article-title":"AI-assisted bio-inspired algorithm for secure IoT communication networks","volume":"25","author":"Alroobaea","year":"2022","journal-title":"Clust. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s10922-025-09899-z","article-title":"A Hybrid Biologically-Inspired Optimization Algorithm for Data Gathering in IoT Sensor Networks","volume":"33","author":"Kponhinto","year":"2025","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"12358","DOI":"10.1038\/s41598-025-95531-8","article-title":"Leveraging blockchain and IoMT for secure and interoperable electronic health records","volume":"15","author":"Getahun","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"23876","DOI":"10.1038\/s41598-025-05910-4","article-title":"A lightweight and secure authentication and privacy protection scheme for internet of medical things","volume":"15","author":"Kumar","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"13223","DOI":"10.1038\/s41598-025-97065-5","article-title":"Improved security for IoT-based remote healthcare systems using deep learning with jellyfish search optimization algorithm","volume":"15","author":"Kateb","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Alsadhan, A., Alhogail, A., and Alsalamah, H.A. (2025). Toward Efficient Health Data Identification and Classification in IoMT-Based Systems. Sensors, 25.","DOI":"10.3390\/s25195966"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Jothi, K.R., and Vaithiyanathan, B. (2024). Developing a Hybrid Approach with Whale Optimization and Deep Convolutional Neural Networks for Enhancing Security in Smart Home Environments\u2019 Sustainability Through IoT Devices. Sustainability, 16.","DOI":"10.3390\/su162411040"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Irshad, R.R., Alattab, A.A., Alsaiari, O.A.S., Sohail, S.S., Aziz, A., Madsen, D.\u00d8., and Alalayah, K.M. (2023). An Optimization-Linked Intelligent Security Algorithm for Smart Healthcare Organizations. Healthcare, 11.","DOI":"10.3390\/healthcare11040580"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/3511898","article-title":"BACKM-EHA: A novel blockchain-enabled security solution for IoMT-based e-healthcare applications","volume":"23","author":"Wazid","year":"2023","journal-title":"ACM Trans. Internet Technol."},{"key":"ref_34","first-page":"102845","article-title":"A privacy protection scheme for telemedicine diagnosis based on double blockchain","volume":"61","author":"Wang","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Mani, V., Manickam, P., Alotaibi, Y., Alghamdi, S., and Khalaf, O.I. (2021). Hyperledger Healthchain: Patient-Centric IPFS-Based Storage of Health Records. Electronics, 10.","DOI":"10.3390\/electronics10233003"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Mudassar, B., Tahir, S., Khan, F., Shah, S.A., Shah, S.I., and Abbasi, Q.H. (2024). Privacy-Preserving Data Analytics in Internet of Medical Things. Future Internet, 16.","DOI":"10.3390\/fi16110407"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/s10586-025-05308-x","article-title":"Blockchain-based access control and privacy preservation in healthcare: A comprehensive survey","volume":"28","author":"Tawfik","year":"2025","journal-title":"Clust. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Zhang, R., Li, Y., and Fang, L. (2025). PBTMS: A Blockchain-Based Privacy-Preserving System for Reliable and Efficient E-Commerce. Electronics, 14.","DOI":"10.3390\/electronics14061177"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Salim, M.M., Kim, I., Doniyor, U., Lee, C., and Park, J.H. (2021). Homomorphic Encryption Based Privacy-Preservation for IoMT. Appl. Sci., 11.","DOI":"10.3390\/app11188757"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"e70271","DOI":"10.1002\/ett.70271","article-title":"A Blockchain Framework for Ensuring Medical Data Security in Internet of Medical Things","volume":"36","author":"Chhinal","year":"2025","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"8091","DOI":"10.1109\/JIOT.2021.3138104","article-title":"Blockchain-Enabled Privacy-Preserving Access Control for Data Publishing and Sharing in the Internet of Medical Things","volume":"9","author":"Wu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Dhasaratha, C., Hasan, M.K., Islam, S., Khapre, S., Abdullah, S., Ghazal, T.M., Alzahrani, A.I., Alalwan, N., Vo, N., and Akhtaruzzaman, M. (2024). Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things. CAAI Trans. Intell. Technol., 1\u201316.","DOI":"10.1049\/cit2.12287"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Jorge, H., Wanzeller, C., and Henriques, J. (2025). Evaluating Homomorphic Encryption Schemes for Privacy and Security in Healthcare Data Management. J. Cybersecur. Priv., 5.","DOI":"10.3390\/jcp5030074"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Adnan, A., Kausar, F., Shoaib, M., Iqbal, F., Altaf, A., and Asif, H.M. (2025). A Secure and Privacy-Preserving Approach to Healthcare Data Collaboration. Symmetry, 17.","DOI":"10.3390\/sym17071139"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"121071","DOI":"10.1016\/j.eswa.2023.121071","article-title":"No more privacy Concern: A privacy-chain based homomorphic encryption scheme and statistical method for privacy preservation of user\u2019s private and sensitive data","volume":"234","author":"Kumar","year":"2023","journal-title":"Expert Syst. Appl."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"140","DOI":"10.2991\/jegh.k.210405.001","article-title":"The Saudi Data & Artificial Intelligence Authority (SDAIA) Vision: Leading the Kingdom\u2019s Journey toward Global Leadership","volume":"11","author":"Memish","year":"2021","journal-title":"J. Epidemiol. Glob. Health"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Chakraborty, C., Nagarajan, S.M., Devarajan, G.G., Ramana, T.V., and Mohanty, R. (2023). Intelligent AI-based Healthcare Cyber Security System using Multi-Source Transfer Learning Method. ACM Trans. Sens. Netw., 1\u201316.","DOI":"10.1145\/3597210"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.iotcps.2022.05.006","article-title":"Convergence of Blockchain, k-medoids and homomorphic encryption for privacy preserving biomedical data classification","volume":"2","author":"Akter","year":"2022","journal-title":"Internet Things Cyber-Phys. Syst."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"29682","DOI":"10.1038\/s41598-025-14930-z","article-title":"Enhancing privacy in IoT-based healthcare using provable partitioned secure blockchain principle and encryption","volume":"15","author":"Madhumathi","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"3759","DOI":"10.1007\/s40747-022-00756-z","article-title":"A systematic review of homomorphic encryption and its contributions in healthcare industry","volume":"9","author":"Munjal","year":"2022","journal-title":"Complex Intell. Syst."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Chen, W., Zhang, Y., and Kumar, R. (2025). Zero-Trust Medical Image Sharing: A Secure and Decentralized Approach Using Blockchain and the IPFS. Symmetry, 17.","DOI":"10.3390\/sym17040551"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Kasruddin Nasir, A.N., Ahmad, M.A., Najib, M.S., Wahab, Y.A., Othman, N.A., Abd Ghani, N.M., Irawan, A., Khatun, S., Raja Ismail, R.M.T., and Saari, M.M. (2020). Review and Analysis of Risk Factor of Maternal Health in Remote Area Using the Internet of Things (IoT). InECCE2019, Springer. Lecture Notes in Electrical Engineering.","DOI":"10.1007\/978-981-15-2317-5"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/TCE.2020.3043683","article-title":"SaYoPillow: Blockchain-Integrated Privacy-Assured IoMT Framework for Stress Management Considering Sleeping Habits","volume":"67","author":"Rachakonda","year":"2021","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Mani, Z.A., and Goniewicz, K. (2024). Transforming Healthcare in Saudi Arabia: A Comprehensive Evaluation of Vision 2030\u2019s Impact. Sustainability, 16.","DOI":"10.3390\/su16083277"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"1066547","DOI":"10.1155\/2023\/1066547","article-title":"An IoMT-Based Approach for Real-Time Monitoring Using Wearable Neuro-Sensors","volume":"2023","author":"Bhatt","year":"2023","journal-title":"J. Healthc. Eng."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s10462-024-10884-2","article-title":"Handling imbalanced medical datasets: Review of a decade of research","volume":"57","author":"Salmi","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"11654","DOI":"10.1038\/s41598-025-92245-9","article-title":"A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing","volume":"15","author":"Kumar","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"4113","DOI":"10.1007\/s11831-023-09928-7","article-title":"A Systematic Review of the Whale Optimization Algorithm: Theoretical Foundation, Improvements, and Hybridizations","volume":"30","author":"Zamani","year":"2023","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"24534","DOI":"10.1038\/s41598-024-74881-9","article-title":"Application of spiral enhanced whale optimization algorithm in solving optimization problems","volume":"14","author":"Qu","year":"2024","journal-title":"Sci. Rep."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., and Vaikuntanathan, V. (2012, January 8\u201310). (Leveled) fully homomorphic encryption without bootstrapping. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (ITCS \u201812), Cambridge, MA, USA.","DOI":"10.1145\/2090236.2090262"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"15098","DOI":"10.1007\/s11227-023-05233-z","article-title":"A survey on implementations of homomorphic encryption schemes","volume":"79","author":"Doan","year":"2023","journal-title":"J. Supercomput."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1186\/s40537-025-01098-6","article-title":"Exploring the future of privacy-preserving heart disease prediction: A fully homomorphic encryption-driven logistic regression approach","volume":"12","author":"Naresh","year":"2025","journal-title":"J. Big Data"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1186\/s42400-024-00341-6","article-title":"HP_FLAP: Homomorphic and polymorphic federated learning aggregation of parameters framework","volume":"8","author":"Moshawrab","year":"2025","journal-title":"Cybersecurity"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"36642","DOI":"10.1109\/ACCESS.2019.2905009","article-title":"Whale Optimization Algorithm Based on Lamarckian Learning for Global Optimization Problems","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"77013","DOI":"10.1109\/ACCESS.2020.2989445","article-title":"Improved Whale Optimization Algorithm Based on Nonlinear Adaptive Weight and Golden Sine Operator","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_66","first-page":"2904625","article-title":"A Whale Optimization Algorithm with Convergence and Exploitability Enhancement and Its Application","volume":"2022","author":"Liang","year":"2022","journal-title":"Math. Probl. Eng."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Zhou, Y., and Hao, Z. (2025). Multi-Strategy Improved Whale Optimization Algorithm and Its Engineering Applications. Biomimetics, 10.","DOI":"10.3390\/biomimetics10010047"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Altal, O.F., Sindiani, A.M., Abu Mhanna, H.Y., Alhatamleh, S., Amin, M., Akhdar, H.F., Madain, R., Alqasem, N., Zayed, F., and Alanazi, S. (2025). WOAENet: A whale optimization-guided ensemble deep learning with soft voting for uterine cancer diagnosis based on MRI images. Front. Artif. Intell., 8.","DOI":"10.3389\/frai.2025.1664201"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"D\u2019souza, F.J., and Panchal, D. (2017, January 5\u20136). Advanced encryption standard (AES) security enhancement using hybrid approach. Proceedings of the 2017 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India.","DOI":"10.1109\/CCAA.2017.8229881"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Guo, Y., Zuo, J., Guo, Z., Qi, J., and Lu, Y. (2023). Data Sharing Privacy Metrics Model Based on Information Entropy and Group Privacy Preference. Cryptography, 7.","DOI":"10.3390\/cryptography7010011"},{"key":"ref_71","unstructured":"Wang, G., Feng, J., Bhuiyan, M., and Lu, R. (2019). A Weighted Risk Score Model for IoT Devices. Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer. Lecture Notes in Computer Science."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/12\/549\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T14:35:51Z","timestamp":1765463751000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/12\/549"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,11]]},"references-count":71,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["computers14120549"],"URL":"https:\/\/doi.org\/10.3390\/computers14120549","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,11]]}}}