2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2022
DOI: 10.1109/seeda-cecnsm57760.2022.9932957
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Vulnerabilities in Human Activity Recognition systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…In addition, its phase response is linear and thus does not introduce any phase distortion, thus preserving the temporal information of the signal. The core mathematical relationship of the Butterworth filter is shown in Equation (3).…”
Section: Data Preprocessingmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, its phase response is linear and thus does not introduce any phase distortion, thus preserving the temporal information of the signal. The core mathematical relationship of the Butterworth filter is shown in Equation (3).…”
Section: Data Preprocessingmentioning
confidence: 99%
“…Human activity recognition (HAR) is the process of automatic detection and classification of human motion states using sensor data, machine learning, and pattern recognition. In recent years, HAR has been applied in many different fields, such as smart homes [1], healthcare [2] (monitoring the health status of elderly and disabled people), and security [3] (biometric or face recognition). Traditional human motion recognition methods include computer vision [4], wearable sensors [5], and radar [6].…”
Section: Introductionmentioning
confidence: 99%