{"id":"https://openalex.org/W7105601290","doi":"https://doi.org/10.1109/tce.2025.3632385","title":"SDTP-VA: An AI-Resistant Visualization and Secure Data Transmission Framework for Wearable Consumer IoT in Sports Training","display_name":"SDTP-VA: An AI-Resistant Visualization and Secure Data Transmission Framework for Wearable Consumer IoT in Sports Training","publication_year":2025,"publication_date":"2025-11-13","ids":{"openalex":"https://openalex.org/W7105601290","doi":"https://doi.org/10.1109/tce.2025.3632385"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3632385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3632385","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Youzhi Sun","orcid":"https://orcid.org/0009-0001-5939-8784"},"institutions":[{"id":"https://openalex.org/I3018263800","display_name":"Huzhou University","ror":"https://ror.org/04mvpxy20","country_code":"CN","type":"education","lineage":["https://openalex.org/I3018263800"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Youzhi Sun","raw_affiliation_strings":["School of Physical Education, Huzhou University, Huzhou, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Physical Education, Huzhou University, Huzhou, Zhejiang, China","institution_ids":["https://openalex.org/I3018263800"]}]},{"author_position":"middle","author":{"id":null,"display_name":"TianCi Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I118574674","display_name":"Jiangsu Normal University","ror":"https://ror.org/051hvcm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I118574674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"TianCi Wu","raw_affiliation_strings":["Sport School, Jiangsu Normal University, Xuzhou, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Sport School, Jiangsu Normal University, Xuzhou, Jiangsu, China","institution_ids":["https://openalex.org/I118574674"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zixu Li","orcid":null},"institutions":[{"id":"https://openalex.org/I118574674","display_name":"Jiangsu Normal University","ror":"https://ror.org/051hvcm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I118574674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zixu Li","raw_affiliation_strings":["Sport School, Jiangsu Normal University, Xuzhou, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Sport School, Jiangsu Normal University, Xuzhou, Jiangsu, China","institution_ids":["https://openalex.org/I118574674"]}]},{"author_position":"last","author":{"id":null,"display_name":"Xiangzhi Wu","orcid":"https://orcid.org/0000-0002-5906-2383"},"institutions":[{"id":"https://openalex.org/I118574674","display_name":"Jiangsu Normal University","ror":"https://ror.org/051hvcm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I118574674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangzhi Wu","raw_affiliation_strings":["Sport School, Jiangsu Normal University, Xuzhou, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Sport School, Jiangsu Normal University, Xuzhou, Jiangsu, China","institution_ids":["https://openalex.org/I118574674"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I3018263800"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.59602081,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1489","last_page":"1503"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.13089999556541443,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.13089999556541443,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.11710000038146973,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.06689999997615814,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.7585999965667725},{"id":"https://openalex.org/keywords/wearable-technology","display_name":"Wearable technology","score":0.6825000047683716},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.6341000199317932},{"id":"https://openalex.org/keywords/data-visualization","display_name":"Data visualization","score":0.5350000262260437},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.4729999899864197},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4544999897480011},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.39899998903274536},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.36719998717308044}],"concepts":[{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.7585999965667725},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7569000124931335},{"id":"https://openalex.org/C54290928","wikidata":"https://www.wikidata.org/wiki/Q4845080","display_name":"Wearable technology","level":3,"score":0.6825000047683716},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.6341000199317932},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.5350000262260437},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.4729999899864197},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.45989999175071716},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4544999897480011},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41370001435279846},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.39899998903274536},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.36719998717308044},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.3467999994754791},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.33489999175071716},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.3296000063419342},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3124000132083893},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.30550000071525574},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.305400013923645},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3005000054836273},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2953999936580658},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2919999957084656},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2842000126838684},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C146549078","wikidata":"https://www.wikidata.org/wiki/Q191944","display_name":"Exoskeleton","level":2,"score":0.26330000162124634},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25940001010894775},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3632385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3632385","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Wearable":[0],"consumer":[1],"electronics":[2],"are":[3],"transforming":[4],"sports":[5,84],"performance":[6,235],"training":[7],"by":[8,193,199],"allowing":[9],"real-time":[10,234],"physiological":[11],"monitoring,":[12],"analysis,":[13],"and":[14,32,76,103,143,180,216],"feedback.":[15],"Along":[16],"with":[17,58,228],"the":[18,30,74,101,145,152,221],"increasing":[19],"IoT":[20,80],"integration":[21],"of":[22,34,43,78,105,158,212],"wearable":[23,79,97,173],"devices":[24,98],"comes":[25],"a":[26,49,209],"serious":[27],"concern":[28],"regarding":[29],"security":[31,75],"privacy":[33],"sensitive":[35],"biometric":[36],"data":[37,106,125,153,217,226],"from":[38,133,149],"AI-driven":[39,66],"cyberattacks.":[40],"The":[41,86,164,205],"purpose":[42],"this":[44],"work":[45,69],"is":[46,63,166,184],"to":[47,65,71,99,117,130,223],"establish":[48],"novel":[50],"framework":[51,165],"that":[52,62,122,175],"integrates":[53],"Secure":[54],"Data":[55],"Transmission":[56],"Protocols":[57],"Visualization":[59],"Approaches":[60],"(SDTP-VA)":[61],"resistant":[64],"adversaries.":[67],"This":[68,183],"aims":[70],"improve":[72],"both":[73],"interpretability":[77],"systems":[81,148],"deployed":[82],"in":[83,126,202],"environments.":[85],"proposed":[87],"system":[88],"incorporates":[89],"lightweight":[90],"cryptographic":[91],"algorithms":[92],"designed":[93],"specifically":[94],"for":[95,140,154],"resource-constrained":[96],"protect":[100,131],"integrity":[102],"confidentiality":[104],"while":[107,195,232],"maintaining":[108],"device":[109],"performance.":[110],"Our":[111],"organization":[112],"has":[113],"applied":[114],"visualization":[115],"techniques":[116],"provide":[118],"an":[119],"AI-resistant":[120],"transform":[121],"convey":[123],"raw":[124],"tamper-proof,":[127],"robust":[128],"representations":[129,138],"ourselves":[132],"adversarial":[134],"attacks.":[135],"Distinct":[136],"pattern":[137],"allow":[139],"human-in-the-loop":[141],"validation":[142],"disrupt":[144],"automated":[146],"AI":[147],"subtly":[150],"exploiting":[151],"malign":[155],"inference.":[156],"Both":[157],"these":[159],"goals":[160],"could":[161],"be":[162],"achieved.":[163],"tested":[167],"across":[168],"various":[169],"sport":[170],"contexts":[171],"using":[172],"sensors":[174],"measure":[176],"mobility,":[177],"heart":[178],"rate,":[179],"muscle":[181],"activation.":[182],"achieved":[185],"through":[186],"wireless":[187],"technology.":[188],"Furthermore,":[189],"scaling":[190],"efficiencies":[191],"decreased":[192,198],"95.81%,":[194],"reaction":[196],"times":[197],"96.88%,":[200],"resulting":[201],"significant":[203],"gains.":[204],"experimental":[206],"results":[207],"indicate":[208],"strong":[210],"amount":[211],"resistance":[213],"against":[214],"spoofing":[215],"injection":[218],"attacks,":[219],"suggesting":[220],"ability":[222],"achieve":[224],"secure":[225],"interpretation":[227],"accuracy":[229],"above":[230],"95%":[231],"achieving":[233],"characteristics.":[236]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-11-13T00:00:00"}
