首页 > 最新文献

2022 IEEE International Conference on Digital Health (ICDH)最新文献

英文 中文
Detection of Erythropoietin in Blood to Uncover Doping in Sports using Machine Learning 利用机器学习检测血液中的促红细胞生成素以揭露运动中的兴奋剂
Pub Date : 2022-07-01 DOI: 10.1109/ICDH55609.2022.00038
M. R. Rahman, J. Bejder, T. Bonne, A. Andersen, J. R. Huertas, R. Aikin, N. Nordsborg, Wolfgang Maass
Sports officials around the world are facing challenges due to the unfair nature of doping practices used by unscrupulous athletes to improve their performance. This prac-tice includes blood transfusion, intake of anabolic steroids or even hormone-based drugs like erythropoietin to increase their strength, endurance, and ultimately their performance. While direct detection and identification of erythropoietin in blood samples of athletes have proven an effective means to uncover doping, not all the cases are easily detectable, and some analyses are too costly to be carried out on every sample. This leads to a need to develop an indirect method for detecting erythropoietin in blood samples based on different blood biomarkers. In this paper, we presented a comparison of different machine learning algorithms combined with statistical analysis approaches to identify the presence of erythropoietin drug in blood samples collected at both sea level and moderate altitude. The results presented indicate that ensemble methods like random forest and X Gboost algorithms may provide an effective tool to aid anti-doping organisations in most effectively distributing scarce resources. Implementation of these methods on the samples from elite athletes may both enhance the deterrence effect of anti-doping as well as increases the likelihood of catching doped athletes.
由于无良运动员为了提高成绩而使用兴奋剂的不公平性质,世界各地的体育官员都面临着挑战。这种做法包括输血,摄入合成代谢类固醇,甚至是基于激素的药物,如促红细胞生成素,以增加他们的力量,耐力,最终他们的表现。虽然直接检测和鉴定运动员血液样本中的促红细胞生成素已被证明是发现兴奋剂的有效手段,但并非所有病例都容易检测到,而且有些分析成本太高,无法对每个样本都进行分析。这导致需要开发一种基于不同血液生物标志物的间接方法来检测血液样本中的促红细胞生成素。在本文中,我们提出了一个不同的机器学习算法的比较与统计分析相结合的方法来识别红细胞生成素的存在药物在血液样本收集海平面和中等高度。研究结果表明,随机森林和X - Gboost算法等集成方法可以为反兴奋剂组织最有效地分配稀缺资源提供有效工具。实现这些方法的样本精英运动员或许都加强反兴奋剂的威慑效应以及增加掺捕捉运动员的可能性。
{"title":"Detection of Erythropoietin in Blood to Uncover Doping in Sports using Machine Learning","authors":"M. R. Rahman, J. Bejder, T. Bonne, A. Andersen, J. R. Huertas, R. Aikin, N. Nordsborg, Wolfgang Maass","doi":"10.1109/ICDH55609.2022.00038","DOIUrl":"https://doi.org/10.1109/ICDH55609.2022.00038","url":null,"abstract":"Sports officials around the world are facing challenges due to the unfair nature of doping practices used by unscrupulous athletes to improve their performance. This prac-tice includes blood transfusion, intake of anabolic steroids or even hormone-based drugs like erythropoietin to increase their strength, endurance, and ultimately their performance. While direct detection and identification of erythropoietin in blood samples of athletes have proven an effective means to uncover doping, not all the cases are easily detectable, and some analyses are too costly to be carried out on every sample. This leads to a need to develop an indirect method for detecting erythropoietin in blood samples based on different blood biomarkers. In this paper, we presented a comparison of different machine learning algorithms combined with statistical analysis approaches to identify the presence of erythropoietin drug in blood samples collected at both sea level and moderate altitude. The results presented indicate that ensemble methods like random forest and X Gboost algorithms may provide an effective tool to aid anti-doping organisations in most effectively distributing scarce resources. Implementation of these methods on the samples from elite athletes may both enhance the deterrence effect of anti-doping as well as increases the likelihood of catching doped athletes.","PeriodicalId":120923,"journal":{"name":"2022 IEEE International Conference on Digital Health (ICDH)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116004176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Health Guardian Platform: A technology stack to accelerate discovery in Digital Health research 健康卫士平台:加速数字健康研究发现的技术栈
Pub Date : 2022-07-01 DOI: 10.1109/ICDH55609.2022.00015
B. Wen, V. Siu, Italo Buleje, Kuan Yu Hsieh, Takashi Itoh, L. Zimmerli, Nigel Hinds, Elif K. Eyigöz, Bing Dang, Stefan von Cavallar, Jeffrey L. Rogers
This paper highlights the design philosophy and architecture of the Health Guardian, a platform developed by the IBM Digital Health team to accelerate discoveries of new digital biomarkers and development of digital health technologies. The Health Guardian allows for rapid translation of artificial intelligence (AI) research into cloud-based microservices that can be tested with data from clinical cohorts to understand disease and enable early prevention. The platform can be connected to mobile applications, wearables, or Internet of things (IoT) devices to collect health-related data into a secure database. When the analytics are created, the researchers can containerize and deploy their code on the cloud using pre-defined templates, and validate the models using the data collected from one or more sensing devices. The Health Guardian platform currently supports time-series, text, audio, and video inputs with 70+ analytic capabilities and is used for non-commercial scientific research. We provide an example of the Alzheimer's disease (AD) assessment microservice which uses AI methods to extract linguistic features from audio recordings to evaluate an individual's mini-mental state, the likelihood of having AD, and to predict the onset of AD before turning the age of 85. Today, IBM research teams across the globe use the Health Guardian internally as a test bed for early-stage research ideas, and externally with collaborators to support and enhance AI model development and clinical study efforts.
本文重点介绍了Health Guardian的设计理念和架构,该平台由IBM数字健康团队开发,旨在加速发现新的数字生物标志物和开发数字健康技术。“健康卫士”允许将人工智能(AI)研究快速转化为基于云的微服务,这些微服务可以用临床队列的数据进行测试,以了解疾病并实现早期预防。该平台可以连接到移动应用程序、可穿戴设备或物联网(IoT)设备,将健康相关数据收集到安全的数据库中。创建分析后,研究人员可以使用预定义的模板将代码容器化并部署到云中,并使用从一个或多个传感设备收集的数据验证模型。健康卫士平台目前支持时间序列、文本、音频和视频输入,具有70多种分析功能,用于非商业科学研究。我们提供了一个阿尔茨海默病(AD)评估微服务的例子,该微服务使用人工智能方法从录音中提取语言特征,以评估个体的最小精神状态、患AD的可能性,并在85岁之前预测AD的发病。今天,全球的IBM研究团队在内部使用Health Guardian作为早期研究想法的测试平台,在外部与合作者一起支持和加强人工智能模型开发和临床研究工作。
{"title":"Health Guardian Platform: A technology stack to accelerate discovery in Digital Health research","authors":"B. Wen, V. Siu, Italo Buleje, Kuan Yu Hsieh, Takashi Itoh, L. Zimmerli, Nigel Hinds, Elif K. Eyigöz, Bing Dang, Stefan von Cavallar, Jeffrey L. Rogers","doi":"10.1109/ICDH55609.2022.00015","DOIUrl":"https://doi.org/10.1109/ICDH55609.2022.00015","url":null,"abstract":"This paper highlights the design philosophy and architecture of the Health Guardian, a platform developed by the IBM Digital Health team to accelerate discoveries of new digital biomarkers and development of digital health technologies. The Health Guardian allows for rapid translation of artificial intelligence (AI) research into cloud-based microservices that can be tested with data from clinical cohorts to understand disease and enable early prevention. The platform can be connected to mobile applications, wearables, or Internet of things (IoT) devices to collect health-related data into a secure database. When the analytics are created, the researchers can containerize and deploy their code on the cloud using pre-defined templates, and validate the models using the data collected from one or more sensing devices. The Health Guardian platform currently supports time-series, text, audio, and video inputs with 70+ analytic capabilities and is used for non-commercial scientific research. We provide an example of the Alzheimer's disease (AD) assessment microservice which uses AI methods to extract linguistic features from audio recordings to evaluate an individual's mini-mental state, the likelihood of having AD, and to predict the onset of AD before turning the age of 85. Today, IBM research teams across the globe use the Health Guardian internally as a test bed for early-stage research ideas, and externally with collaborators to support and enhance AI model development and clinical study efforts.","PeriodicalId":120923,"journal":{"name":"2022 IEEE International Conference on Digital Health (ICDH)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123180532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ICDH 2022 Reviewers
Pub Date : 2022-07-01 DOI: 10.1109/icdh55609.2022.00007
{"title":"ICDH 2022 Reviewers","authors":"","doi":"10.1109/icdh55609.2022.00007","DOIUrl":"https://doi.org/10.1109/icdh55609.2022.00007","url":null,"abstract":"","PeriodicalId":120923,"journal":{"name":"2022 IEEE International Conference on Digital Health (ICDH)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127468715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Strengthening the Security of Healthcare Devices using Secure Configuration Provenance 利用安全配置来源加强医疗设备的安全性
Pub Date : 2022-07-01 DOI: 10.1109/ICDH55609.2022.00043
Ragib Hasan
In modern healthcare, smart medical devices are used to ensure better and informed patient care. Such devices have the capability to connect to and communicate with the hospital's network or a mobile application over wi-fi or Bluetooth, allowing doctors to remotely configure them, exchange data, or update the firmware. For example, Cardiovascular Implantable Electronic Devices (CIED), more commonly known as Pacemakers, are increasingly becoming smarter, connected to the cloud or healthcare information systems, and capable of being programmed remotely. Healthcare providers can upload new configurations to such devices to change the treatment. Such configurations are often exchanged, reused, and/or modified to match the patient's specific health scenario. Such capabilities, unfortunately, come at a price. Malicious entities can provide a faulty configuration to such devices, leading to the patient's death. Any update to the state or configuration of such devices must be thoroughly vetted before applying them to the device. In case of any adverse events, we must also be able to trace the lineage and propagation of the faulty configuration to determine the cause and liability issues. In a highly distributed environment such as today's hospitals, ensuring the integrity of configurations and security policies is difficult and often requires a complex setup. As configurations propagate, traditional access control and authentication of the healthcare provider applying the configuration is not enough to prevent installation of malicious configurations. In this paper, we argue that a provenance-based approach can provide an effective solution towards hardening the security of such medical devices. In this approach, devices would maintain a verifiable provenance chain that would allow assessing not just the current state, but also the past history of the configuration of the device. Also, any configuration update would be accompanied by its own secure provenance chain, allowing verification of the origin and lineage of the configuration. The ability to protect and verify the provenance of devices and configurations would lead to better patient care, prevent malfunction of the device due to malicious configurations, and allow after-the-fact investigation of device configuration issues. In this paper, we advocate the benefits of such an approach and sketch the requirements, implementation challenges, and deployment strategies for such a provenance-based system.
在现代医疗保健中,智能医疗设备用于确保更好和知情的患者护理。这种设备能够通过wi-fi或蓝牙连接到医院的网络或移动应用程序并与之通信,从而允许医生远程配置它们、交换数据或更新固件。例如,心血管植入式电子设备(CIED),通常被称为心脏起搏器,正变得越来越智能,可以连接到云或医疗信息系统,并能够远程编程。医疗保健提供者可以将新配置上传到此类设备以更改治疗。这些配置经常被交换、重用和/或修改,以匹配患者的特定健康情况。不幸的是,这样的能力是有代价的。恶意实体可以为这些设备提供错误的配置,从而导致患者死亡。对此类设备的状态或配置的任何更新必须在应用于设备之前进行彻底审查。在任何不良事件的情况下,我们还必须能够跟踪错误配置的沿袭和传播,以确定原因和责任问题。在高度分布式的环境中,例如今天的医院,确保配置和安全策略的完整性是困难的,并且通常需要复杂的设置。随着配置的传播,应用该配置的医疗保健提供商的传统访问控制和身份验证不足以防止恶意配置的安装。在本文中,我们认为,基于来源的方法可以为加强此类医疗设备的安全性提供有效的解决方案。在这种方法中,设备将维护一个可验证的来源链,不仅可以评估当前状态,还可以评估设备配置的过去历史。此外,任何配置更新都将伴随着其自己的安全来源链,从而允许对配置的起源和沿袭进行验证。保护和验证设备和配置来源的能力将带来更好的患者护理,防止由于恶意配置导致的设备故障,并允许对设备配置问题进行事后调查。在本文中,我们提倡这种方法的好处,并概述了这种基于来源的系统的需求、实现挑战和部署策略。
{"title":"Towards Strengthening the Security of Healthcare Devices using Secure Configuration Provenance","authors":"Ragib Hasan","doi":"10.1109/ICDH55609.2022.00043","DOIUrl":"https://doi.org/10.1109/ICDH55609.2022.00043","url":null,"abstract":"In modern healthcare, smart medical devices are used to ensure better and informed patient care. Such devices have the capability to connect to and communicate with the hospital's network or a mobile application over wi-fi or Bluetooth, allowing doctors to remotely configure them, exchange data, or update the firmware. For example, Cardiovascular Implantable Electronic Devices (CIED), more commonly known as Pacemakers, are increasingly becoming smarter, connected to the cloud or healthcare information systems, and capable of being programmed remotely. Healthcare providers can upload new configurations to such devices to change the treatment. Such configurations are often exchanged, reused, and/or modified to match the patient's specific health scenario. Such capabilities, unfortunately, come at a price. Malicious entities can provide a faulty configuration to such devices, leading to the patient's death. Any update to the state or configuration of such devices must be thoroughly vetted before applying them to the device. In case of any adverse events, we must also be able to trace the lineage and propagation of the faulty configuration to determine the cause and liability issues. In a highly distributed environment such as today's hospitals, ensuring the integrity of configurations and security policies is difficult and often requires a complex setup. As configurations propagate, traditional access control and authentication of the healthcare provider applying the configuration is not enough to prevent installation of malicious configurations. In this paper, we argue that a provenance-based approach can provide an effective solution towards hardening the security of such medical devices. In this approach, devices would maintain a verifiable provenance chain that would allow assessing not just the current state, but also the past history of the configuration of the device. Also, any configuration update would be accompanied by its own secure provenance chain, allowing verification of the origin and lineage of the configuration. The ability to protect and verify the provenance of devices and configurations would lead to better patient care, prevent malfunction of the device due to malicious configurations, and allow after-the-fact investigation of device configuration issues. In this paper, we advocate the benefits of such an approach and sketch the requirements, implementation challenges, and deployment strategies for such a provenance-based system.","PeriodicalId":120923,"journal":{"name":"2022 IEEE International Conference on Digital Health (ICDH)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128141586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepCAD: A Stand-alone Deep Neural Network-based Framework for Classification and Anomaly Detection in Smart Healthcare Systems DeepCAD:一个独立的基于深度神经网络的框架,用于智能医疗系统中的分类和异常检测
Pub Date : 2022-07-01 DOI: 10.1109/ICDH55609.2022.00042
Nur Imtiazul Haque, Mohammad Rahman, S. Ahamed
Contemporary smart healthcare systems (SHSs) frequently use wireless body sensor devices (WBSDs) for vital sign monitoring and the internet of medical things (IoMT) network for rapid communication with a cloud-based controller. The SHS controllers generate required control decisions based on the patient status to enable real-time patient medication/treatment. Hence, the correct medical delivery primarily depends on accurately identifying the patient's status. Accordingly, SHSs mostly leverage deep neural network (DNN)-based machine learning (ML) models for patient status classification due to their prediction accuracy and complex relation capturing capability. Nevertheless, the open IoMT network is prone to several cyberattacks, including adversarial ML-based attacks, which can exploit DNN models and create a life-threatening event in a safety-critical SHS. Existing solutions usually propose outlier detection or transfer learning-based ML models on top of the patient status classification model to deal with SHS security issues. However, incorporating a separate anomaly detection model increases the model complexity and raises feasibility issues for real-time deployment. This work presents a novel framework, DeepCAD, that considers training a stand-alone DNN model integrated with anomaly detection rules for classification and anomaly detection in SHS. The proposed framework is verified on the Pima Indians Diabetes and Parkinson datasets.
当代智能医疗系统(SHSs)经常使用无线身体传感器设备(wbsd)进行生命体征监测,并使用医疗物联网(IoMT)网络与基于云的控制器进行快速通信。SHS控制器根据患者状态生成所需的控制决策,以实现对患者的实时用药/治疗。因此,正确的医疗交付主要取决于准确识别患者的状态。因此,由于其预测准确性和复杂关系捕获能力,SHSs主要利用基于深度神经网络(DNN)的机器学习(ML)模型进行患者状态分类。然而,开放的IoMT网络容易受到多种网络攻击,包括基于ml的对抗性攻击,这些攻击可以利用DNN模型,并在安全关键的SHS中创建危及生命的事件。现有的解决方案通常在患者状态分类模型的基础上提出离群值检测或基于迁移学习的ML模型来处理SHS的安全问题。然而,合并单独的异常检测模型增加了模型的复杂性,并提出了实时部署的可行性问题。这项工作提出了一个新的框架,DeepCAD,它考虑训练一个独立的DNN模型与异常检测规则相结合,用于SHS中的分类和异常检测。在皮马印第安人糖尿病和帕金森数据集上验证了所提出的框架。
{"title":"DeepCAD: A Stand-alone Deep Neural Network-based Framework for Classification and Anomaly Detection in Smart Healthcare Systems","authors":"Nur Imtiazul Haque, Mohammad Rahman, S. Ahamed","doi":"10.1109/ICDH55609.2022.00042","DOIUrl":"https://doi.org/10.1109/ICDH55609.2022.00042","url":null,"abstract":"Contemporary smart healthcare systems (SHSs) frequently use wireless body sensor devices (WBSDs) for vital sign monitoring and the internet of medical things (IoMT) network for rapid communication with a cloud-based controller. The SHS controllers generate required control decisions based on the patient status to enable real-time patient medication/treatment. Hence, the correct medical delivery primarily depends on accurately identifying the patient's status. Accordingly, SHSs mostly leverage deep neural network (DNN)-based machine learning (ML) models for patient status classification due to their prediction accuracy and complex relation capturing capability. Nevertheless, the open IoMT network is prone to several cyberattacks, including adversarial ML-based attacks, which can exploit DNN models and create a life-threatening event in a safety-critical SHS. Existing solutions usually propose outlier detection or transfer learning-based ML models on top of the patient status classification model to deal with SHS security issues. However, incorporating a separate anomaly detection model increases the model complexity and raises feasibility issues for real-time deployment. This work presents a novel framework, DeepCAD, that considers training a stand-alone DNN model integrated with anomaly detection rules for classification and anomaly detection in SHS. The proposed framework is verified on the Pima Indians Diabetes and Parkinson datasets.","PeriodicalId":120923,"journal":{"name":"2022 IEEE International Conference on Digital Health (ICDH)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132883312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PHASE: Security Analyzer for Next-Generation Smart Personalized Smart Healthcare System PHASE:用于下一代智能个性化智能医疗系统的安全分析仪
Pub Date : 2022-07-01 DOI: 10.1109/ICDH55609.2022.00040
Nur Imtiazul Haque, M. Rahman
With the advent of the connected healthcare systems, the contemporary healthcare system is going through a swift transformation to handle the ever-growing healthcare needs. The internet of medical things (IoMT) network and implantable medical devices (IMDs) are progressively being adopted in healthcare facilities for increasing efficiency and reducing treatment latency, thus giving rise to a smart healthcare system (SHS). Moreover, the acquisition of the personalized healthcare concept with SHS is boosting precise medication in real-time. However, the open network communication of IoMT sensor measurements collected from body sensor devices (BSDs) is vulnerable to measurement manipulation attacks since they are primarily encrypted or enciphered with lightweight cryptographic algorithms due to computational constraints. Hence, it is crucial to analyze the robustness of the SHS and real-time sensor measurements' vulnerability analysis to prevent mistreatment. This paper presents PHASE, a novel real-time security analysis framework for personalized rule-based SHS. Our framework can synthesize optimal attack vectors for measurement alteration attacks, each representing minimal required alterations to misinform the SHS controller with wrong patients' health status. The identified attack vectors can assess the vulnerability of the measurements in real-time with variable attacker's capability. We verify the effectiveness of the proposed framework using Pima Indians Diabetes, AIM-94, and Harvard Dataverse datasets.
随着互联医疗系统的出现,现代医疗系统正在经历快速转型,以应对不断增长的医疗需求。医疗物联网(IoMT)网络和植入式医疗设备(imd)正逐步被医疗机构采用,以提高效率和减少治疗延迟,从而产生智能医疗系统(SHS)。此外,通过SHS获得个性化医疗保健概念正在促进实时精准用药。然而,从身体传感器设备(bsd)收集的IoMT传感器测量数据的开放网络通信容易受到测量操作攻击,因为由于计算限制,它们主要使用轻量级加密算法进行加密或加密。因此,分析SHS的鲁棒性和实时传感器测量的脆弱性分析对于防止误用至关重要。提出了一种新的基于个性化规则的SHS实时安全分析框架PHASE。我们的框架可以为测量更改攻击合成最佳攻击向量,每个攻击向量代表最小的更改,以错误的患者健康状态误导SHS控制器。所识别的攻击向量可以在攻击者能力变化的情况下实时评估测量的脆弱性。我们使用皮马印第安人糖尿病、AIM-94和哈佛Dataverse数据集验证了所提出框架的有效性。
{"title":"PHASE: Security Analyzer for Next-Generation Smart Personalized Smart Healthcare System","authors":"Nur Imtiazul Haque, M. Rahman","doi":"10.1109/ICDH55609.2022.00040","DOIUrl":"https://doi.org/10.1109/ICDH55609.2022.00040","url":null,"abstract":"With the advent of the connected healthcare systems, the contemporary healthcare system is going through a swift transformation to handle the ever-growing healthcare needs. The internet of medical things (IoMT) network and implantable medical devices (IMDs) are progressively being adopted in healthcare facilities for increasing efficiency and reducing treatment latency, thus giving rise to a smart healthcare system (SHS). Moreover, the acquisition of the personalized healthcare concept with SHS is boosting precise medication in real-time. However, the open network communication of IoMT sensor measurements collected from body sensor devices (BSDs) is vulnerable to measurement manipulation attacks since they are primarily encrypted or enciphered with lightweight cryptographic algorithms due to computational constraints. Hence, it is crucial to analyze the robustness of the SHS and real-time sensor measurements' vulnerability analysis to prevent mistreatment. This paper presents PHASE, a novel real-time security analysis framework for personalized rule-based SHS. Our framework can synthesize optimal attack vectors for measurement alteration attacks, each representing minimal required alterations to misinform the SHS controller with wrong patients' health status. The identified attack vectors can assess the vulnerability of the measurements in real-time with variable attacker's capability. We verify the effectiveness of the proposed framework using Pima Indians Diabetes, AIM-94, and Harvard Dataverse datasets.","PeriodicalId":120923,"journal":{"name":"2022 IEEE International Conference on Digital Health (ICDH)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134208194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the 2022 Steering Committee Chair 2022年指导委员会主席致辞
Pub Date : 2022-07-01 DOI: 10.1109/icdh55609.2022.00006
{"title":"Message from the 2022 Steering Committee Chair","authors":"","doi":"10.1109/icdh55609.2022.00006","DOIUrl":"https://doi.org/10.1109/icdh55609.2022.00006","url":null,"abstract":"","PeriodicalId":120923,"journal":{"name":"2022 IEEE International Conference on Digital Health (ICDH)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124967369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contactless Authentication for Wearable Devices Using RFID 使用RFID的可穿戴设备的非接触式认证
Pub Date : 2022-07-01 DOI: 10.1109/ICDH55609.2022.00044
V. Bellandi, P. Ceravolo, M. Conti, Maryam Ehsanpour
Technological advancements are strongly integrated into our daily lives and an increasing trend prompts the usage of smart healthcare devices for health management. Health providers are beginning to use wearable devices as equipment that can support remote care services. As a result, an accurate, robust, lightweight, and convenient authentication system for smart healthcare devices is urgently required. Considering RFID technology, we present a contactless authentication mechanism that secures a smartwatch at the hardware level. When the authorized person uses the smartwatch, then power is “ON” otherwise “OFF”. Thanks to our method the answer to the question “Am I authorized to use the wearable medical sensor?” and “Am I really the person who is proceeding?” is directly enforced by the system. This study significantly improved the usability and security of the authentication process.
科技进步与我们的日常生活紧密结合,越来越多的趋势促使人们使用智能医疗设备进行健康管理。医疗服务提供者开始使用可穿戴设备作为支持远程护理服务的设备。因此,迫切需要一个准确、健壮、轻量级和方便的智能医疗设备认证系统。考虑到RFID技术,我们提出了一种非接触式认证机制,可以在硬件层面保护智能手表。当被授权人使用智能手表时,电源为“ON”,否则为“OFF”。由于我们的方法,“我是否被授权使用可穿戴医疗传感器?”和“我真的是那个在行动的人吗?”是由系统直接执行的。该研究显著提高了认证过程的可用性和安全性。
{"title":"Contactless Authentication for Wearable Devices Using RFID","authors":"V. Bellandi, P. Ceravolo, M. Conti, Maryam Ehsanpour","doi":"10.1109/ICDH55609.2022.00044","DOIUrl":"https://doi.org/10.1109/ICDH55609.2022.00044","url":null,"abstract":"Technological advancements are strongly integrated into our daily lives and an increasing trend prompts the usage of smart healthcare devices for health management. Health providers are beginning to use wearable devices as equipment that can support remote care services. As a result, an accurate, robust, lightweight, and convenient authentication system for smart healthcare devices is urgently required. Considering RFID technology, we present a contactless authentication mechanism that secures a smartwatch at the hardware level. When the authorized person uses the smartwatch, then power is “ON” otherwise “OFF”. Thanks to our method the answer to the question “Am I authorized to use the wearable medical sensor?” and “Am I really the person who is proceeding?” is directly enforced by the system. This study significantly improved the usability and security of the authentication process.","PeriodicalId":120923,"journal":{"name":"2022 IEEE International Conference on Digital Health (ICDH)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing User-friendly Medical AI Applications - Methodical Development of User-centered Design Guidelines 设计用户友好的医疗人工智能应用——以用户为中心的设计指南的系统开发
Pub Date : 2022-07-01 DOI: 10.1109/ICDH55609.2022.00011
Laura Wiebelitz, Peter Schmid, T. Maier, Malte Volkwein
Medical artificial intelligence (AI) applications will become increasingly relevant in the future and change the medical technology market. Areas of application are located in the professional as well as in private use. The human-machine interface (HMI) is crucial for a successful use of these AI technologies and for a high user added value. The factors of user experience, usability and joy of use significantly determine the quality of an HMI, but are still insufficiently researched for medical AI applications. This work addresses this gap and provides generally applicable design guidelines to AI-based mobile medical applications. For this purpose, a user-centered requirements analysis was conducted to evaluate possible HMI concepts for a fictitious medical AI application. Based on these findings, specific design guidelines for the HMI of the fictitious application were established. Finally, a universal design catalog for medical AI applications was developed.
医疗人工智能(AI)应用将在未来变得越来越重要,并改变医疗技术市场。应用领域包括专业领域和私人领域。人机界面(HMI)对于成功使用这些人工智能技术和实现高用户附加值至关重要。用户体验、可用性和使用乐趣等因素在很大程度上决定了人机界面的质量,但在医疗人工智能应用方面的研究仍然不足。这项工作解决了这一差距,并为基于人工智能的移动医疗应用程序提供了普遍适用的设计指南。为此,进行了以用户为中心的需求分析,以评估虚拟医疗人工智能应用程序可能的HMI概念。基于这些发现,建立了虚拟应用程序HMI的具体设计准则。最后,制定了医疗人工智能应用的通用设计目录。
{"title":"Designing User-friendly Medical AI Applications - Methodical Development of User-centered Design Guidelines","authors":"Laura Wiebelitz, Peter Schmid, T. Maier, Malte Volkwein","doi":"10.1109/ICDH55609.2022.00011","DOIUrl":"https://doi.org/10.1109/ICDH55609.2022.00011","url":null,"abstract":"Medical artificial intelligence (AI) applications will become increasingly relevant in the future and change the medical technology market. Areas of application are located in the professional as well as in private use. The human-machine interface (HMI) is crucial for a successful use of these AI technologies and for a high user added value. The factors of user experience, usability and joy of use significantly determine the quality of an HMI, but are still insufficiently researched for medical AI applications. This work addresses this gap and provides generally applicable design guidelines to AI-based mobile medical applications. For this purpose, a user-centered requirements analysis was conducted to evaluate possible HMI concepts for a fictitious medical AI application. Based on these findings, specific design guidelines for the HMI of the fictitious application were established. Finally, a universal design catalog for medical AI applications was developed.","PeriodicalId":120923,"journal":{"name":"2022 IEEE International Conference on Digital Health (ICDH)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114627933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GMH-D: Combining Google MediaPipe and RGB-Depth Cameras for Hand Motor Skills Remote Assessment GMH-D:结合谷歌MediaPipe和rgb深度相机手部运动技能远程评估
Pub Date : 2022-07-01 DOI: 10.1109/ICDH55609.2022.00029
G. Amprimo, Claudia Ferraris, Giulia Masi, G. Pettiti, L. Priano
Impairment in the execution of simple motor tasks involving hands and fingers could hint at a general worsening of health conditions, particularly in the elderly and in people affected by neurological diseases. The deterioration of hand motor function strongly impacts autonomy in daily activities and, consequently, the perceived quality of life. The early detection of alterations in hand motor skills would allow, for example, to promptly activate treatments and mitigate this discomfort. This preliminary study examines an innovative pipeline based on a single RGB-Depth camera and Google MediaPipe Hands, that is suitable for the remote assessment of hand motor skills through simple tasks commonly used in clinical practice. The study includes several phases. First, the quality of hand tracking is evaluated by comparing reconstructed and real hand 3D trajectories. The proposed solution is then tested on a cohort of healthy volunteers to estimate specific kinematic features for each task. Finally, these features are used to train supervised classifiers and distinguish between “normal” and “altered” performance by simulating typical motor behaviour of real impaired subjects. The preliminary results show the ability of the proposed solution to automatically highlight alterations in hand performance, providing an easy-to-use and non-invasive tool suitable for remote monitoring of hand motor skills.
涉及手和手指的简单运动任务的执行受损可能暗示健康状况普遍恶化,特别是在老年人和受神经系统疾病影响的人群中。手部运动功能的恶化严重影响日常活动的自主性,从而影响感知的生活质量。例如,早期发现手部运动技能的变化将允许及时启动治疗并减轻这种不适。本初步研究探讨了一种基于单个RGB-Depth相机和Google MediaPipe Hands的创新管道,该管道适用于通过临床实践中常用的简单任务远程评估手部运动技能。这项研究包括几个阶段。首先,通过对比重建的和真实的手部三维轨迹来评估手部跟踪的质量。然后在一组健康志愿者身上对提出的解决方案进行测试,以估计每个任务的具体运动学特征。最后,这些特征被用于训练监督分类器,并通过模拟真实受损受试者的典型运动行为来区分“正常”和“改变”的表现。初步结果表明,所提出的解决方案能够自动突出手部表现的变化,为手部运动技能的远程监测提供了一种易于使用和非侵入性的工具。
{"title":"GMH-D: Combining Google MediaPipe and RGB-Depth Cameras for Hand Motor Skills Remote Assessment","authors":"G. Amprimo, Claudia Ferraris, Giulia Masi, G. Pettiti, L. Priano","doi":"10.1109/ICDH55609.2022.00029","DOIUrl":"https://doi.org/10.1109/ICDH55609.2022.00029","url":null,"abstract":"Impairment in the execution of simple motor tasks involving hands and fingers could hint at a general worsening of health conditions, particularly in the elderly and in people affected by neurological diseases. The deterioration of hand motor function strongly impacts autonomy in daily activities and, consequently, the perceived quality of life. The early detection of alterations in hand motor skills would allow, for example, to promptly activate treatments and mitigate this discomfort. This preliminary study examines an innovative pipeline based on a single RGB-Depth camera and Google MediaPipe Hands, that is suitable for the remote assessment of hand motor skills through simple tasks commonly used in clinical practice. The study includes several phases. First, the quality of hand tracking is evaluated by comparing reconstructed and real hand 3D trajectories. The proposed solution is then tested on a cohort of healthy volunteers to estimate specific kinematic features for each task. Finally, these features are used to train supervised classifiers and distinguish between “normal” and “altered” performance by simulating typical motor behaviour of real impaired subjects. The preliminary results show the ability of the proposed solution to automatically highlight alterations in hand performance, providing an easy-to-use and non-invasive tool suitable for remote monitoring of hand motor skills.","PeriodicalId":120923,"journal":{"name":"2022 IEEE International Conference on Digital Health (ICDH)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130788333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2022 IEEE International Conference on Digital Health (ICDH)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1