2019 IEEE International Conference on Artificial Intelligence Circuits and Systems (AICAS) 2019
DOI: 10.1109/aicas.2019.8771558
|View full text |Cite
|
Sign up to set email alerts
|

Towards Workload-Balanced, Live Deep Learning Analytics for Confidentiality-Aware IoT Medical Platforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…(𝑇𝑃+𝑇𝑁) 𝑇𝑃+𝑇𝑁+𝐹𝑃+𝐹𝑁 (5) In this section, our focus is on the results of the confusion matrix (Cm) as presented in (6). Additionally, we illustrate the accuracy (Acc) of LDA-DT for the addition of a new controller and KNN for assigning a new VM to a specific zone.…”
Section: π΄π‘π‘π‘’π‘Ÿπ‘Žπ‘π‘¦ =mentioning
confidence: 99%
See 1 more Smart Citation
“…(𝑇𝑃+𝑇𝑁) 𝑇𝑃+𝑇𝑁+𝐹𝑃+𝐹𝑁 (5) In this section, our focus is on the results of the confusion matrix (Cm) as presented in (6). Additionally, we illustrate the accuracy (Acc) of LDA-DT for the addition of a new controller and KNN for assigning a new VM to a specific zone.…”
Section: π΄π‘π‘π‘’π‘Ÿπ‘Žπ‘π‘¦ =mentioning
confidence: 99%
“…Consequently, when exchanging data between communicating devices in a medical environment, security measures must be strengthened. In this context, set up a real-time medical internet of thing (IoT) platform that processes information collected by the deep learning method on biological signals [6]. The result of their work is that the detection accuracy of the deep neural network is compared to that of a human expert on electrocardiogram (ECG) signals, which predicts possible future health damages.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, security must be reinforced when exchanging data between communicating equipment within the medical environment. In this context, Granados et al [6] [9]. The previously presented works in [7,9] deploy the cloud in the medical field, without considering the security and access control of the stored medical data.…”
Section: Related Workmentioning
confidence: 99%
“…(𝑇𝑃 + 𝑇𝑁) 𝑇𝑃 + 𝑇𝑁 + 𝐹𝑃 + 𝐹𝑁 (5) In this section, we focus on the results of the confusion matrix (Cm) presented by (6). In addition, we have illustrated accuracy (Acc) of DT (Decision Tree) for the addition of a new controller and of KNN (KNeighborsClassifier) for the membership of a new VM (i.e.…”
Section: π΄π‘π‘π‘’π‘Ÿπ‘Žπ‘π‘¦ =mentioning
confidence: 99%
“…At the application-layer, they adapt based on the protocol used at the edge to the one used by the cloud. For example, from constrained IoT devices employing CoAP to a cloud service that communicates through MQTT or AMQP [61,108,46]. They may also convert the lower-layer wireless protocols of the local, constrained devices for enabling Internet based transmission to the cloud [30].…”
Section: The Gatewaymentioning
confidence: 99%