4.7 Article

Secure and Privacy-Preserving Human Interaction Recognition of Pervasive Healthcare Monitoring

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Interaction Relational Network for Mutual Action Recognition

Mauricio Perez et al.

Summary: In this paper, the importance of person-person mutual action recognition is discussed along with the current dominant solutions in the field. The authors propose a simpler yet powerful architecture, the Interaction Relational Network, which learns interactions without prior knowledge of body structure. The network uses multiple relationships and structured pair-wise operations to enhance relational reasoning. The proposed solution achieves state-of-the-art performance on various datasets, demonstrating its effectiveness.

IEEE TRANSACTIONS ON MULTIMEDIA (2022)

Article Computer Science, Artificial Intelligence

Privacy-Preserving Deep Action Recognition: An Adversarial Learning Framework and A New Dataset

Zhenyu Wu et al.

Summary: This paper investigates the privacy-preserving video-based action recognition problem, which is becoming increasingly important in smart camera applications. It proposes a novel adversarial training framework to learn an anonymization transform for input videos and explicitly optimize the trade-off between target utility task performance and privacy budgets. Two new optimization strategies are proposed to achieve stronger universal privacy protection against any attacker models. Extensive experiments have been conducted and analyzed to validate the effectiveness of the proposed methods.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2022)

Article Business

FUSION-Fog Computing and Blockchain for Trusted Industrial Internet of Things

Andrea Ceccarelli et al.

Summary: This article investigates the management of distributed trust information and enabling trusted configuration actions in the industrial IoT by combining blockchain with software-defined networking and container orchestration technologies. The authors propose a software architecture to simplify the management, configuration, and assessment of IIoT systems, and apply it in a railways use case.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2022)

Article Business

A Cloud-Based Computing Framework for Artificial Intelligence Innovation in Support of Multidomain Operations

James Robertson et al.

Summary: The US Department of Defense's AI strategy aims to deliver transformative capabilities, establish partnerships, and utilize a flexible, cost-effective, and scalable computing infrastructure. By using cloud computing methods for solving complex systems problems, they promote rapid experimentation and collaboration.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2022)

Article Business

Designing a Health Coach-Augmented mHealth System for the Secondary Prevention of Coronary Heart Disease Among Women

Avijit Sengupta et al.

Summary: A mobile phone and wearable device-based technological system can provide home-based cardiac rehabilitation program for women with Coronary Heart Disease. The system combines human-expert intelligence with machine intelligence to enhance the decision-making capability of a health coach. The evaluation of the prototype has shown a significant positive impact of preprogrammed intervention messages on participants' walking performance.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2022)

Article Multidisciplinary Sciences

Secure human action recognition by encrypted neural network inference

Miran Kim et al.

Summary: In this paper, the authors propose a strategy that combines advanced computer vision technology and homomorphic encryption to provide near real-time home monitoring to support aging in place. The strategy can detect falls and symptoms related to seizures and stroke, ensuring information confidentiality while retaining action detection. The secure inference protocol shows high sensitivity and specificity in distinguishing falls from activities of daily living, with significant speedup compared to other methods.

NATURE COMMUNICATIONS (2022)

Article Computer Science, Artificial Intelligence

A federated learning system with enhanced feature extraction for human activity recognition

Zhiwen Xiao et al.

Summary: This paper presents a federated learning system for human activity recognition, HARFLS, which includes a perceptive extraction network (PEN) that extracts features through a feature network and a relation network. Compared to other systems, it achieves higher recognition accuracy, especially on the WISDM and PAMAP2 datasets.

KNOWLEDGE-BASED SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

A Survey on Object Detection for the Internet of Multimedia Things (IoMT) using Deep Learning and Event-based Middleware: Approaches, Challenges, and Future Directions

Asra Aslam et al.

Summary: The paper reviews existing solutions for Internet of Multimedia Things (IoMT), finding that current IoT event-based middleware solutions focus on structured events and lack domain-specific characteristics for handling unstructured multimedia events. Experimental results show that existing models are slow in responding to unseen classes, and the datasets do not have a sufficient number of categories to meet the real-time application requirements of smart cities. Existing research efforts on IoMT are limited, and there is a need for further study on combining event-based middleware capabilities with low response-time online training and adaptation techniques.

IMAGE AND VISION COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Mutual authentication with multi-factor in IoT-Fog-Cloud environment

Leandro Loffi et al.

Summary: The research improved a multi-factor mutual authentication method that can be adjusted for use in fog and cloud computing environments, showing better performance compared to other studies. Factors such as response time, challenge-response function, and nonce were used to ensure the security of the method.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Computer Science, Information Systems

G2F: A Secure User Authentication for Rapid Smart Home IoT Management

Hongwei Luo et al.

Summary: This article introduces a gateway-based 2 factor authentication (G2F) framework to enhance the security of IoT device management. By utilizing a hardware token to interact with the local gateway node, G2F ensures user authentication security and allows for multiple simultaneous operations. Through implementation on Alibaba Cloud, G2F demonstrates the ability to protect against malicious attacks with high authentication efficiency.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Fog computing security and privacy for the Internet of Thing applications: State-of-the-art

Yehia I. Alzoubi et al.

Summary: Fog computing mitigates the impact of low latency and geographic distribution issues in IoT applications by implementing fog nodes near end-users, reducing data offload to the Cloud and improving response time. However, it faces challenges in meeting security and privacy requirements, with the need for more research and solutions.

SECURITY AND PRIVACY (2021)

Article Computer Science, Information Systems

Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment

Hojin Choi et al.

Summary: PBKDF2 is a widely used cryptographic algorithm to generate secure keys for passwords, but the derived key has lower entropy and limited use compared to general cryptography keys. Increasing the number of iteration counts can improve the entropy of the derived key, but at the cost of increased generation time. Optimization methods, such as reducing redundant operations and optimizing the PRF, can enhance the efficiency and security of PBKDF2 implementations.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

ANN Assisted-IoT Enabled COVID-19 Patient Monitoring

Geetanjali Rathee et al.

Summary: COVID-19 is a highly infectious and dangerous disease that requires quick and accurate identification of infection. Researchers have proposed classification schemes based on machine learning and IoT, using artificial neural networks to support decision-making in healthcare information management.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Privacy and Security Issues in Deep Learning: A Survey

Ximeng Liu et al.

Summary: Deep Learning algorithms have achieved remarkable success in various domains, but privacy and security issues such as model theft, data inference, and adversarial attacks have been revealed. Research has identified these problems and proposed attack and defense methods to address them.

IEEE ACCESS (2021)

Article Computer Science, Artificial Intelligence

OpenPose: Realtime Multi-Person 2D Pose Estimation Using Part Affinity Fields

Zhe Cao et al.

Summary: This work presents a real-time approach to detect the 2D pose of multiple people in an image, achieving high accuracy and real-time performance regardless of the number of people in the image. By refining PAFs separately, both runtime performance and accuracy are significantly improved. Additionally, the first combined body and foot keypoint detector reduces inference time and maintains accuracy compared to running them sequentially.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2021)

Article Computer Science, Software Engineering

Skeleton-based action recognition by part-aware graph convolutional networks

Yang Qin et al.

VISUAL COMPUTER (2020)

Article Computer Science, Artificial Intelligence

Privacy-preserving human action recognition as a remote cloud service using RGB-D sensors and deep CNN

Amitesh Singh Rajput et al.

EXPERT SYSTEMS WITH APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

Fuzzy conformable fractional differential equations: novel extended approach and new numerical solutions

Omar Abu Arqub et al.

SOFT COMPUTING (2020)

Article Computer Science, Information Systems

A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems

Lalit Chettri et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Fog/Edge Computing-Based IoT (FECIoT): Architecture, Applications, and Research Issues

Babatuni Omoniwa et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Comparative Study of Various Cryptographic Algorithms Used for Text, Image, and Video

Nilesh Advani et al.

EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Spatial Residual Layer and Dense Connection Block Enhanced Spatial Temporal Graph Convolutional Network for Skeleton-Based Action Recognition

Cong Wu et al.

2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW) (2019)

Review Computer Science, Theory & Methods

Intelligent video surveillance: a review through deep learning techniques for crowd analysis

G. Sreenu et al.

JOURNAL OF BIG DATA (2019)

Article Computer Science, Information Systems

Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey

Yingnan Sun et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

The Ubiquitous Healthcare Facility Framework: A Proposed System for Managing Rural Antenatal Care

Maria Saleemi et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog

Michele De Donno et al.

IEEE ACCESS (2019)

Article Mathematics, Applied

Implementation and comparison of the functions of building blocks in SHA-2 family used in secured cloud applications

Alka Leekha et al.

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY (2019)

Article Computer Science, Information Systems

Future Edge Cloud and Edge Computing for Internet of Things Applications

Jianli Pan et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Proceedings Paper Computer Science, Information Systems

Robust Spatio-Temporal Features for Human Interaction Recognition via Artificial Neural Network

Ahmad Jalal et al.

2018 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2018) (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Human Activity Recognition for Healthcare using Smartphones

Godwin Ogbuabor et al.

PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018) (2018)

Article

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

Saurabh Singh et al.

Journal of Ambient Intelligence and Humanized Computing (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Towards Accurate Multi-person Pose Estimation in the Wild

George Papandreou et al.

30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)

Review Computer Science, Information Systems

Fog computing security: a review of current applications and security solutions

Saad Khan et al.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Quantitative analysis of the security performance in wireless LANs

Poonam Jindal et al.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2017)

Article Computer Science, Information Systems

Two-person interaction recognition via spatial multiple instance embedding

Fadime Sener et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2015)

Proceedings Paper Computer Science, Information Systems

Analysis of SHA-512/224 and SHA-512/256

Christoph Dobraunig et al.

ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II (2015)

Article Computer Science, Information Systems

Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm

Omar Abu Arqub et al.

INFORMATION SCIENCES (2014)

Proceedings Paper Computer Science, Artificial Intelligence

Human interaction recognition based on the co-occurence of visual words

K. Nour el Houda Slimani et al.

2014 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW) (2014)