Anomaly detection using edge computing in video surveillance system

DR Patrikar, MR Parate - International Journal of Multimedia Information …, 2022 - Springer
The current concept of smart cities influences urban planners and researchers to provide
modern, secured and sustainable infrastructure and gives a decent quality of life to its …

Efficient fire detection for uncertain surveillance environment

K Muhammad, S Khan, M Elhoseny… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Tactile Internet can combine multiple technologies by enabling intelligence via mobile edge
computing and data transmission over a 5G network. Recently, several convolutional neural …

Distributed deep learning model for intelligent video surveillance systems with edge computing

J Chen, K Li, Q Deng, K Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we propose a Distributed Intelligent Video Surveillance (DIVS) system using
Deep Learning (DL) algorithms and deploy it in an edge computing environment. We …

Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database

U Chatterjee, V Govindan, R Sadhukhan… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to
provide unique identities to billions of connected devices in Internet of Things (IoTs). In …

Trust-aware service offloading for video surveillance in edge computing enabled internet of vehicles

X Xu, Q Wu, L Qi, W Dou, SB Tsai… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Internet of Vehicles (IoV) supports multiple traffic services by processing abundant data from
sensors and video surveillance devices. With edge computing, video surveillance services …

IoT-based big data secure transmission and management over cloud system: A healthcare digital twin scenario

CL Stergiou, MP Koidou, KE Psannis - Applied Sciences, 2023 - mdpi.com
The Internet of Things (IoT) was introduced as a recently developed technology in the
telecommunications field. It is a network made up of real-world objects, things, and gadgets …

Cryptography-based secure data storage and sharing using HEVC and public clouds

M Usman, MA Jan, X He - Information Sciences, 2017 - Elsevier
Mobile devices are widely used for uploading/downloading media files such as audio, video
and images to/from the remote servers. These devices have limited resources and are …

Multiple region of interest coverage in camera sensor networks for tele-intensive care units

B Cheng, L Cui, W Jia, W Zhao… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Camera sensor networks (CSNs) are gradually being used in a tele-intensive care unit (tele-
ICU), providing useful patient information to remote intensivists. Intensivists wish to focus on …

Security standards for real time video surveillance and moving object tracking challenges, limitations, and future: a case study

C Kumar, S Singh - Multimedia Tools and Applications, 2024 - Springer
Uses of video surveillance (VS) have exponentially increased using the internet as a
platform. Therefore, security issues in such real time videos need to be addressed. Video …

Dynamic watermarking-based defense of transportation cyber-physical systems

WH Ko, B Satchidanandan, PR Kumar - ACM Transactions on Cyber …, 2019 - dl.acm.org
The transportation sector is on the threshold of a revolution as advances in real-time
communication, real-time computing, and sensing technologies have brought to fruition the …