Secure human action recognition by encrypted neural network inference
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Miran | - |
dc.contributor.author | Jiang, Xiaoqian | - |
dc.contributor.author | Lauter, Kristin | - |
dc.contributor.author | Ismayilzada, Elkhan | - |
dc.contributor.author | Shams, Shayan | - |
dc.date.accessioned | 2022-09-19T11:36:32Z | - |
dc.date.available | 2022-09-19T11:36:32Z | - |
dc.date.created | 2022-09-08 | - |
dc.date.issued | 2022-08 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/171508 | - |
dc.description.abstract | Advanced computer vision technology can provide near real-time home monitoring to support “aging in place” by detecting falls and symptoms related to seizures and stroke. Affordable webcams, together with cloud computing services (to run machine learning algorithms), can potentially bring significant social benefits. However, it has not been deployed in practice because of privacy concerns. In this paper, we propose a strategy that uses homomorphic encryption to resolve this dilemma, which guarantees information confidentiality while retaining action detection. Our protocol for secure inference can distinguish falls from activities of daily living with 86.21% sensitivity and 99.14% specificity, with an average inference latency of 1.2 seconds and 2.4 seconds on real-world test datasets using small and large neural nets, respectively. We show that our method enables a 613x speedup over the latency-optimized LoLa and achieves an average of 3.1x throughput increase in secure inference compared to the throughput-optimized nGraph-HE2. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | NATURE PORTFOLIO | - |
dc.title | Secure human action recognition by encrypted neural network inference | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Miran | - |
dc.identifier.doi | 10.1038/s41467-022-32168-5 | - |
dc.identifier.scopusid | 2-s2.0-85136027653 | - |
dc.identifier.wosid | 000840984400004 | - |
dc.identifier.bibliographicCitation | NATURE COMMUNICATIONS, v.13, no.1, pp.1 - 13 | - |
dc.relation.isPartOf | NATURE COMMUNICATIONS | - |
dc.citation.title | NATURE COMMUNICATIONS | - |
dc.citation.volume | 13 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 13 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Science & Technology - Other Topics | - |
dc.relation.journalWebOfScienceCategory | Multidisciplinary Sciences | - |
dc.subject.keywordPlus | artificial neural network | - |
dc.subject.keywordPlus | computer vision | - |
dc.subject.keywordPlus | data set | - |
dc.subject.keywordPlus | detection method | - |
dc.subject.keywordPlus | optimization | - |
dc.subject.keywordPlus | real time | - |
dc.subject.keywordPlus | recognition | - |
dc.subject.keywordPlus | article | - |
dc.subject.keywordPlus | confidentiality | - |
dc.subject.keywordPlus | controlled study | - |
dc.subject.keywordPlus | daily life activity | - |
dc.subject.keywordPlus | encryption | - |
dc.subject.keywordPlus | human | - |
dc.subject.keywordPlus | male | - |
dc.subject.keywordPlus | sensitivity and specificity | - |
dc.subject.keywordPlus | algorithm | - |
dc.subject.keywordPlus | automated pattern recognition | - |
dc.subject.keywordPlus | cloud computing | - |
dc.subject.keywordPlus | computer security | - |
dc.subject.keywordPlus | daily life activity | - |
dc.identifier.url | https://www.nature.com/articles/s41467-022-32168-5 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.