Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sensors (Basel) ; 23(24)2023 Dec 15.
Artigo em Inglês | MEDLINE | ID: mdl-38139702

RESUMO

Wireless Body Area Networks (WBANs) are an emerging industrial technology for monitoring physiological data. These networks employ medical wearable and implanted biomedical sensors aimed at improving quality of life by providing body-oriented services through a variety of industrial sensing gadgets. The sensors collect vital data from the body and forward this information to other nodes for further services using short-range wireless communication technology. In this paper, we provide a multi-aspect review of recent advancements made in this field pertaining to cross-domain security, privacy, and trust issues. The aim is to present an overall review of WBAN research and projects based on applications, devices, and communication architecture. We examine current issues and challenges with WBAN communications and technologies, with the aim of providing insights for a future vision of remote healthcare systems. We specifically address the potential and shortcomings of various Wireless Body Area Network (WBAN) architectures and communication schemes that are proposed to maintain security, privacy, and trust within digital healthcare systems. Although current solutions and schemes aim to provide some level of security, several serious challenges remain that need to be understood and addressed. Our aim is to suggest future research directions for establishing best practices in protecting healthcare data. This includes monitoring, access control, key management, and trust management. The distinguishing feature of this survey is the combination of our review with a critical perspective on the future of WBANs.


Assuntos
Redes de Comunicação de Computadores , Qualidade de Vida , Atenção à Saúde , Privacidade , Inquéritos e Questionários , Tecnologia sem Fio
2.
Artigo em Inglês | MEDLINE | ID: mdl-37561624

RESUMO

The susceptibility of deep neural networks (DNNs) to adversarial intrusions, exemplified by adversarial examples, is well-documented. Conventional attacks implement unstructured, pixel-wise perturbations to mislead classifiers, which often results in a noticeable departure from natural samples and lacks human-perceptible interpretability. In this work, we present an adversarial attack strategy that implements fine-granularity, semantic-meaning-oriented structural perturbations. Our proposed methodology manipulates the semantic attributes of images through the use of disentangled latent codes. We engineer adversarial perturbations by manipulating either a single latent code or a combination thereof. To this end, we propose two unsupervised semantic manipulation strategies: one based on vector-disentangled representation and the other on feature map-disentangled representation, taking into consideration the complexity of the latent codes and the smoothness of the reconstructed images. Our empirical evaluations, conducted extensively on real-world image data, showcase the potency of our attacks, particularly against black-box classifiers. Furthermore, we establish the existence of a universal semantic adversarial example that is agnostic to specific images.

4.
Front Big Data ; 4: 583723, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-33748750

RESUMO

The effectiveness of cyber security measures are often questioned in the wake of hard hitting security events. Despite much work being done in the field of cyber security, most of the focus seems to be concentrated on system usage. In this paper, we survey advancements made in the development and design of the human centric cyber security domain. We explore the increasing complexity of cyber security with a wider perspective, defining user, usage and usability (3U's) as three essential components for cyber security consideration, and classify developmental efforts through existing research works based on the human centric security design, implementation and deployment of these components. Particularly, the focus is on studies that specifically illustrate the shift in paradigm from functional and usage centred cyber security, to user centred cyber security by considering the human aspects of users. The aim of this survey is to provide both users and system designers with insights into the workings and applications of human centric cyber security.

5.
Stud Health Technol Inform ; 266: 168-173, 2019 Aug 08.
Artigo em Inglês | MEDLINE | ID: mdl-31397319

RESUMO

Healthcare and wellness support that consider context within different dimensions can lead to intelligent, personalised recommendations that will more likely be accepted and acted upon by consumers. In this paper, we look at the main components of traditional personalised healthcare and wellness support services, and identify some of the challenges that should be addressed in creating a more intelligent and efficient solution. Our contribution lies in defining away forward in terms of designing such a solution.


Assuntos
Atenção à Saúde , Serviços de Saúde , Conscientização , Inteligência
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...