2017
DOI: 10.1145/3064006
|View full text |Cite
|
Sign up to set email alerts
|

On Exploiting Structured Human Interactions to Enhance Sensing Accuracy in Cyber-physical Systems

Abstract: In this article, we describe a general methodology for enhancing sensing accuracy in cyber-physical systems that involve structured human interactions in noisy physical environment. We define structured human interactions as domain-specific workflow. A novel workflow-aware sensing model is proposed to jointly correct unreliable sensor data and keep track of states in a workflow. We also propose a new inference algorithm to handle cases with partially known states and objects as supervis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…TRNG can be applied to various applications that use cryptographic algorithms, and is particularly effective for user authentication protocol, which is one of the important applications for security. Ding et al proposed an efficient multi-factor user authentication protocol using WSNs (Wireless Sensor Network) [26]. User authentication protocol must securely transfer the information related to user authentication, and uses cryptographic algorithms and a secret key to ensure security.…”
Section: Related Work and Adversary Modelmentioning
confidence: 99%
“…TRNG can be applied to various applications that use cryptographic algorithms, and is particularly effective for user authentication protocol, which is one of the important applications for security. Ding et al proposed an efficient multi-factor user authentication protocol using WSNs (Wireless Sensor Network) [26]. User authentication protocol must securely transfer the information related to user authentication, and uses cryptographic algorithms and a secret key to ensure security.…”
Section: Related Work and Adversary Modelmentioning
confidence: 99%