{"id":"https://openalex.org/W7136814686","doi":"https://doi.org/10.1109/ants66931.2025.11430012","title":"MEC-based Smart Surveillance in 5G/6G Networks: Intrusion Detection and Loitering Monitoring","display_name":"MEC-based Smart Surveillance in 5G/6G Networks: Intrusion Detection and Loitering Monitoring","publication_year":2025,"publication_date":"2025-12-15","ids":{"openalex":"https://openalex.org/W7136814686","doi":"https://doi.org/10.1109/ants66931.2025.11430012"},"language":null,"primary_location":{"id":"doi:10.1109/ants66931.2025.11430012","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants66931.2025.11430012","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071050751","display_name":"Deveshwar Singh","orcid":"https://orcid.org/0000-0003-4907-6578"},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Deveshwar Singh","raw_affiliation_strings":["Indian Institute of Technology Jammu,Dept. of Computer Science and Engineering,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Jammu,Dept. of Computer Science and Engineering,India","institution_ids":["https://openalex.org/I4210127441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035844388","display_name":"Samaresh Bera","orcid":"https://orcid.org/0000-0002-3887-9212"},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Samaresh Bera","raw_affiliation_strings":["Indian Institute of Technology Jammu,Dept. of Computer Science and Engineering,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Jammu,Dept. of Computer Science and Engineering,India","institution_ids":["https://openalex.org/I4210127441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102961706","display_name":"Ankur Bansal","orcid":"https://orcid.org/0000-0003-2976-1826"},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ankur Bansal","raw_affiliation_strings":["Indian Institute of Technology Jammu,Dept. of Electrical Engineering,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Jammu,Dept. of Electrical Engineering,India","institution_ids":["https://openalex.org/I4210127441"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071050751"],"corresponding_institution_ids":["https://openalex.org/I4210127441"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.67931368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.1696999967098236,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.1696999967098236,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.13109999895095825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.04600000008940697,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5339999794960022},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.33980000019073486},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.31540000438690186},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.3131999969482422},{"id":"https://openalex.org/keywords/tracking","display_name":"Tracking (education)","score":0.22579999268054962}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5748000144958496},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5339999794960022},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38269999623298645},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.33980000019073486},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.31540000438690186},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.3131999969482422},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3057999908924103},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.22579999268054962},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22139999270439148},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.21780000627040863}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ants66931.2025.11430012","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants66931.2025.11430012","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.5615101456642151,"id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2586992378","https://openalex.org/W2890841063","https://openalex.org/W3005116230","https://openalex.org/W3162423228","https://openalex.org/W4200632633","https://openalex.org/W4211009987","https://openalex.org/W4387415158","https://openalex.org/W4388186362","https://openalex.org/W4393146146","https://openalex.org/W4401752330","https://openalex.org/W4408564356"],"related_works":[],"abstract_inverted_index":{"Mobile":[0],"Edge":[1],"Computing":[2],"(MEC),":[3],"empowered":[4],"by":[5],"deep":[6,101,155],"learning":[7,102,156],"techniques,":[8],"plays":[9],"a":[10,62,75,146],"pivotal":[11],"role":[12],"in":[13,24,91],"enabling":[14],"real-time":[15,159],"service":[16],"delivery":[17],"for":[18,41,106,111,158],"applications":[19],"with":[20,128],"stringent":[21],"latency":[22,127],"requirements":[23],"5G":[25,76,123],"and":[26,37,50,72,87,109,142,167],"beyond-5G":[27],"(6G)":[28],"networks.":[29],"Although":[30],"numerous":[31],"studies":[32],"have":[33],"proposed":[34,137],"resource":[35],"allocation":[36],"model":[38],"placement":[39],"schemes":[40],"MEC":[42,120],"environments,":[43],"most":[44],"of":[45,65,121,153],"these":[46],"efforts":[47],"remain":[48],"theoretical":[49],"are":[51,116],"validated":[52],"primarily":[53],"through":[54],"simulations":[55],"or":[56],"emulations.In":[57],"this":[58],"paper,":[59],"we":[60,97,162],"present":[61],"practical":[63],"implementation":[64],"an":[66],"MEC-based":[67,154],"smart":[68],"surveillance":[69],"system":[70,79,138],"deployed":[71,117],"tested":[73],"on":[74],"testbed.":[77],"The":[78,114],"aims":[80],"to":[81,125],"detect":[82,141],"human":[83],"presence,":[84],"identify":[85],"intrusions,":[86],"monitor":[88,143],"loitering":[89,112],"behavior":[90],"real":[92],"time.":[93],"To":[94],"achieve":[95],"this,":[96],"employ":[98],"two":[99],"state-of-the-art":[100],"models":[103,115],"\u2013":[104],"InsightFace":[105],"intrusion":[107],"detection":[108],"YOLOv8-Pose":[110],"analysis.":[113],"at":[118],"the":[119,122,136,151],"testbed":[124],"minimize":[126],"optimize":[129],"inference":[130],"efficiency.":[131],"Experimental":[132],"results":[133],"demonstrate":[134],"that":[135],"can":[139],"accurately":[140],"individuals":[144],"within":[145],"few":[147],"hundred":[148],"milliseconds,":[149],"validating":[150],"effectiveness":[152],"deployment":[157],"surveillance.":[160],"Furthermore,":[161],"discuss":[163],"key":[164],"challenges,":[165],"limitations,":[166],"lessons":[168],"learned":[169],"from":[170],"our":[171],"testbed-based":[172],"implementation.":[173]},"counts_by_year":[],"updated_date":"2026-03-18T06:27:02.140700","created_date":"2026-03-17T00:00:00"}
