File Download

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.number 1 -
dc.citation.startPage 4799 -
dc.citation.title NATURE COMMUNICATIONS -
dc.citation.volume 13 -
dc.contributor.author Kim, Miran -
dc.contributor.author Jiang, Xiaoqian -
dc.contributor.author Lauter, Kristin -
dc.contributor.author Ismayilzada, Elkhan -
dc.contributor.author Shams, Shayan -
dc.date.accessioned 2023-12-21T13:45:07Z -
dc.date.available 2023-12-21T13:45:07Z -
dc.date.created 2022-09-23 -
dc.date.issued 2022-08 -
dc.description.abstract Advanced computer vision technology can provide near real-time home monitoring to support "aging in place" by detecting falls and symptoms related to seizures and stroke. In this paper, the authors propose a strategy that uses homomorphic encryption, which guarantees information confidentiality while retaining action detection. Advanced computer vision technology can provide near real-time home monitoring to support "aging in place" by detecting falls and symptoms related to seizures and stroke. Affordable webcams, together with cloud computing services (to run machine learning algorithms), can potentially bring significant social benefits. However, it has not been deployed in practice because of privacy concerns. In this paper, we propose a strategy that uses homomorphic encryption to resolve this dilemma, which guarantees information confidentiality while retaining action detection. Our protocol for secure inference can distinguish falls from activities of daily living with 86.21% sensitivity and 99.14% specificity, with an average inference latency of 1.2 seconds and 2.4 seconds on real-world test datasets using small and large neural nets, respectively. We show that our method enables a 613x speedup over the latency-optimized LoLa and achieves an average of 3.1x throughput increase in secure inference compared to the throughput-optimized nGraph-HE2. -
dc.identifier.bibliographicCitation NATURE COMMUNICATIONS, v.13, no.1, pp.4799 -
dc.identifier.doi 10.1038/s41467-022-32168-5 -
dc.identifier.issn 2041-1723 -
dc.identifier.scopusid 2-s2.0-85136027653 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/59641 -
dc.identifier.wosid 000840984400004 -
dc.language 영어 -
dc.publisher NATURE PORTFOLIO -
dc.title Secure human action recognition by encrypted neural network inference -
dc.type Article -
dc.description.isOpenAccess TRUE -
dc.relation.journalWebOfScienceCategory Multidisciplinary Sciences -
dc.relation.journalResearchArea Science & Technology - Other Topics -
dc.type.docType Article -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Security -
dc.subject.keywordAuthor Precoding -
dc.subject.keywordAuthor NOMA -
dc.subject.keywordAuthor Downlink -
dc.subject.keywordAuthor Optimization -
dc.subject.keywordAuthor Physical layer security -
dc.subject.keywordAuthor Quality of service -
dc.subject.keywordAuthor hierarchical security -
dc.subject.keywordAuthor MU-MIMO -
dc.subject.keywordAuthor multigroup multicast -
dc.subject.keywordAuthor beamforming optimization -
dc.subject.keywordPlus PHYSICAL LAYER SECURITY -
dc.subject.keywordPlus BEAMFORMING DESIGN -
dc.subject.keywordPlus RATE OPTIMIZATION -
dc.subject.keywordPlus POWER ALLOCATION -
dc.subject.keywordPlus UNICAST -
dc.subject.keywordPlus ROBUST -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.