Full metadata record
DC Field | Value | Language |
---|---|---|
dc.citation.number | 1 | - |
dc.citation.startPage | 4799 | - |
dc.citation.title | NATURE COMMUNICATIONS | - |
dc.citation.volume | 13 | - |
dc.contributor.author | Kim, Miran | - |
dc.contributor.author | Jiang, Xiaoqian | - |
dc.contributor.author | Lauter, Kristin | - |
dc.contributor.author | Ismayilzada, Elkhan | - |
dc.contributor.author | Shams, Shayan | - |
dc.date.accessioned | 2023-12-21T13:45:07Z | - |
dc.date.available | 2023-12-21T13:45:07Z | - |
dc.date.created | 2022-09-23 | - |
dc.date.issued | 2022-08 | - |
dc.description.abstract | Advanced computer vision technology can provide near real-time home monitoring to support "aging in place" by detecting falls and symptoms related to seizures and stroke. In this paper, the authors propose a strategy that uses homomorphic encryption, which guarantees information confidentiality while retaining action detection. Advanced computer vision technology can provide near real-time home monitoring to support "aging in place" by detecting falls and symptoms related to seizures and stroke. Affordable webcams, together with cloud computing services (to run machine learning algorithms), can potentially bring significant social benefits. However, it has not been deployed in practice because of privacy concerns. In this paper, we propose a strategy that uses homomorphic encryption to resolve this dilemma, which guarantees information confidentiality while retaining action detection. Our protocol for secure inference can distinguish falls from activities of daily living with 86.21% sensitivity and 99.14% specificity, with an average inference latency of 1.2 seconds and 2.4 seconds on real-world test datasets using small and large neural nets, respectively. We show that our method enables a 613x speedup over the latency-optimized LoLa and achieves an average of 3.1x throughput increase in secure inference compared to the throughput-optimized nGraph-HE2. | - |
dc.identifier.bibliographicCitation | NATURE COMMUNICATIONS, v.13, no.1, pp.4799 | - |
dc.identifier.doi | 10.1038/s41467-022-32168-5 | - |
dc.identifier.issn | 2041-1723 | - |
dc.identifier.scopusid | 2-s2.0-85136027653 | - |
dc.identifier.uri | https://scholarworks.unist.ac.kr/handle/201301/59641 | - |
dc.identifier.wosid | 000840984400004 | - |
dc.language | 영어 | - |
dc.publisher | NATURE PORTFOLIO | - |
dc.title | Secure human action recognition by encrypted neural network inference | - |
dc.type | Article | - |
dc.description.isOpenAccess | TRUE | - |
dc.relation.journalWebOfScienceCategory | Multidisciplinary Sciences | - |
dc.relation.journalResearchArea | Science & Technology - Other Topics | - |
dc.type.docType | Article | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Precoding | - |
dc.subject.keywordAuthor | NOMA | - |
dc.subject.keywordAuthor | Downlink | - |
dc.subject.keywordAuthor | Optimization | - |
dc.subject.keywordAuthor | Physical layer security | - |
dc.subject.keywordAuthor | Quality of service | - |
dc.subject.keywordAuthor | hierarchical security | - |
dc.subject.keywordAuthor | MU-MIMO | - |
dc.subject.keywordAuthor | multigroup multicast | - |
dc.subject.keywordAuthor | beamforming optimization | - |
dc.subject.keywordPlus | PHYSICAL LAYER SECURITY | - |
dc.subject.keywordPlus | BEAMFORMING DESIGN | - |
dc.subject.keywordPlus | RATE OPTIMIZATION | - |
dc.subject.keywordPlus | POWER ALLOCATION | - |
dc.subject.keywordPlus | UNICAST | - |
dc.subject.keywordPlus | ROBUST | - |
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Tel : 052-217-1404 / Email : scholarworks@unist.ac.kr
Copyright (c) 2023 by UNIST LIBRARY. All rights reserved.
ScholarWorks@UNIST was established as an OAK Project for the National Library of Korea.