• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Cheng, Hang (Cheng, Hang.) [1] | Liu, Ximeng (Liu, Ximeng.) [2] | Wang, Huaxiong (Wang, Huaxiong.) [3] | Fang, Yan (Fang, Yan.) [4] | Wang, Meiqing (Wang, Meiqing.) [5] | Zhao, Xiaopeng (Zhao, Xiaopeng.) [6]

Indexed by:

EI

Abstract:

Anomaly detection offers a powerful approach to identifying unusual activities and uncommon behaviors in real-world video scenes. At present, convolutional neural networks (CNN) have been widely used to tackle anomalous events detection, which mainly rely on its stronger ability of feature representation than traditional hand-crafted features. However, massive video data and high cost of CNN model training are a challenge to achieve satisfactory detection results for resource-limited users. In this article, we propose a secure video anomaly detection framework (SecureAD) based on CNN. Specifically, we introduce additive secret sharing to design several calculation protocols for achieving safe CNN training and video anomaly detection. Besides, we propose a Bloom filter based fine-grained access control policy to authenticate legitimate users, without leaking the privacy of raw personal attributes. In addition, edge computing instead of cloud computing is integrated into the architecture to reduce response time between servers and users in an outsourced environment. Finally, we prove that the proposed SecureAD achieves secure video anomaly detection without compromising the privacy of the related data. Also, the simulation results demonstrate the effectiveness and security of our SecureAD. © 2013 IEEE.

Keyword:

Anomaly detection Authentication Convolution Convolutional neural networks Edge computing Network security

Community:

  • [ 1 ] [Cheng, Hang]Fuzhou University, College of Mathematics and Computer Science, Fuzhou; 350108, China
  • [ 2 ] [Cheng, Hang]Nanyang Technological University, School of Physical and Mathematical Sciences, 639798, Singapore
  • [ 3 ] [Liu, Ximeng]Fuzhou University, College of Mathematics and Computer Science, Key Lab of Information Security of Network Systems, Fuzhou; 350108, China
  • [ 4 ] [Wang, Huaxiong]Nanyang Technological University, School of Physical and Mathematical Sciences, 639798, Singapore
  • [ 5 ] [Fang, Yan]Fujian Agriculture and Forestry University, College of Computer and Information Sciences, Fuzhou; 350002, China
  • [ 6 ] [Wang, Meiqing]Fuzhou University, College of Mathematics and Computer Science, Fuzhou; 350108, China
  • [ 7 ] [Zhao, Xiaopeng]East China Normal University, School of Computer Science and Software Engineering, Department of Cryptography and Cyber Security, Shanghai; 200062, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Cloud Computing

Year: 2022

Issue: 2

Volume: 10

Page: 1413-1427

6 . 5

JCR@2022

5 . 3 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 9

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:248/10062692
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1