{"id":"https://openalex.org/W4398131557","doi":"https://doi.org/10.1145/3643833.3656124","title":"Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events","display_name":"Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events","publication_year":2024,"publication_date":"2024-05-20","ids":{"openalex":"https://openalex.org/W4398131557","doi":"https://doi.org/10.1145/3643833.3656124"},"language":"en","primary_location":{"id":"doi:10.1145/3643833.3656124","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3643833.3656124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075531085","display_name":"Chenglong Fu","orcid":"https://orcid.org/0000-0001-6555-9858"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chenglong Fu","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, North Carolina, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, North Carolina, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Stevens Institute of Technology, Hoboken, New Jersey, USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology, Hoboken, New Jersey, USA","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102018601","display_name":"Qiang Zeng","orcid":"https://orcid.org/0000-0001-9432-6017"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiang Zeng","raw_affiliation_strings":["George Mason University, Fairfax, Virginia, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, Virginia, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101861829","display_name":"Zhenyu Zhao","orcid":"https://orcid.org/0000-0001-9189-5150"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhenyu Zhao","raw_affiliation_strings":["Temple University, Philadelphia, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"Temple University, Philadelphia, Pennsylvania, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049921697","display_name":"Fei Zuo","orcid":"https://orcid.org/0000-0001-8902-1753"},"institutions":[{"id":"https://openalex.org/I139325414","display_name":"University of Central Oklahoma","ror":"https://ror.org/02n455404","country_code":"US","type":"education","lineage":["https://openalex.org/I139325414"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fei Zuo","raw_affiliation_strings":["University of Central Oklahoma, Edmond, Oklahoma, USA"],"affiliations":[{"raw_affiliation_string":"University of Central Oklahoma, Edmond, Oklahoma, USA","institution_ids":["https://openalex.org/I139325414"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101644887","display_name":"Jia Di","orcid":"https://orcid.org/0000-0001-7718-0220"},"institutions":[{"id":"https://openalex.org/I78715868","display_name":"University of Arkansas at Fayetteville","ror":"https://ror.org/05jbt9m15","country_code":"US","type":"education","lineage":["https://openalex.org/I78715868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jia Di","raw_affiliation_strings":["University of Arkansas, Fayetteville, Arkansas, USA"],"affiliations":[{"raw_affiliation_string":"University of Arkansas, Fayetteville, Arkansas, USA","institution_ids":["https://openalex.org/I78715868"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5075531085"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":1.7075,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86067426,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"101","last_page":"112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7224090099334717},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5839686393737793},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.42180579900741577},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.37244078516960144}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7224090099334717},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5839686393737793},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.42180579900741577},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.37244078516960144}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3643833.3656124","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3643833.3656124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.5699999928474426}],"awards":[{"id":"https://openalex.org/G7671567657","display_name":null,"funder_award_id":"CNS-2204785,CNS-2205868,CNS-2309477,CNS-2310322,CNS-2309550","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1483054858","https://openalex.org/W1524815995","https://openalex.org/W1536680647","https://openalex.org/W1861492603","https://openalex.org/W2108598243","https://openalex.org/W2193145675","https://openalex.org/W2508433864","https://openalex.org/W2613352518","https://openalex.org/W2619405973","https://openalex.org/W2686848947","https://openalex.org/W2773326826","https://openalex.org/W2794756467","https://openalex.org/W2883406216","https://openalex.org/W2890559797","https://openalex.org/W2929305171","https://openalex.org/W2945274336","https://openalex.org/W2947175569","https://openalex.org/W2964024268","https://openalex.org/W2983277367","https://openalex.org/W2986164614","https://openalex.org/W2990216812","https://openalex.org/W3015797940","https://openalex.org/W3026341823","https://openalex.org/W3046246673","https://openalex.org/W3047139163","https://openalex.org/W3096980218","https://openalex.org/W3106250896","https://openalex.org/W4287848620","https://openalex.org/W4288057730","https://openalex.org/W4385080276","https://openalex.org/W4385689190","https://openalex.org/W4387321783"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2390279801","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W2358668433","https://openalex.org/W4200598720"],"abstract_inverted_index":{"Along":[0],"with":[1,42,82,95,187],"the":[2,43,96,107,128,161,173,193,218,232],"increasing":[3],"popularity":[4],"of":[5,131,163,208,234,245],"smart":[6,15,110,227],"home":[7,16,228],"IoT":[8,24,27,37,63,123,146,164,177,181,189,220],"devices,":[9],"more":[10,255],"users":[11],"are":[12,39,65,170],"turning":[13],"to":[14,19,31,118,134,157],"automation":[17,28,182],"platforms":[18],"control":[20],"and":[21,46,55,143,166,222],"automate":[22],"their":[23],"devices.":[25],"However,":[26],"is":[29],"vulnerable":[30],"spoofed":[32],"event":[33,147],"attacks.":[34],"Given":[35],"that":[36,61,196],"devices":[38,165,190,221],"intricately":[40],"linked":[41],"physical":[44],"environment":[45],"operate":[47],"autonomously,":[48],"event-based":[49],"attacks":[50],"can":[51,103,198],"pose":[52],"serious":[53],"safety":[54],"security":[56],"challenges.":[57],"Our":[58],"observations":[59],"show":[60],"many":[62],"events":[64,80,178],"accompanied":[66],"by":[67,106],"visual":[68],"modifications":[69],"in":[70,87,160,211,247],"objects":[71],"such":[72],"as":[73,172],"shape":[74],"alterations":[75,102],"(for":[76,89],"example,":[77,90],"contact":[78],"sensor":[79],"correspond":[81],"door":[83],"movement)":[84],"or":[85],"changes":[86],"color/brightness":[88],"a":[91,113,152],"functioning":[92],"microwave":[93],"oven":[94],"internal":[97],"light":[98],"switched":[99],"on).":[100],"These":[101,169],"be":[104,199],"detected":[105],"commonly":[108],"deployed":[109,217],"cameras,":[111],"providing":[112],"visually":[114],"rich":[115],"but":[116],"challenging":[117],"manipulate":[119],"channel":[120],"for":[121,145,175],"verifying":[122,176],"events.":[124],"We":[125,149,215],"introduce":[126],"IoTSentry,":[127],"first":[129],"system":[130],"its":[132],"kind":[133],"extract":[135],"high-level":[136],"semantic":[137],"information":[138],"from":[139],"streaming":[140],"video":[141],"data":[142],"pixels":[144],"verification.":[148],"have":[150,216],"designed":[151],"Siamese":[153],"deep":[154],"neural":[155],"network":[156],"identify":[158],"variations":[159],"appearance":[162],"interior":[167],"objects.":[168],"used":[171],"yardstick":[174],"received":[179],"at":[180],"platforms.":[183],"Upon":[184],"assessing":[185],"IoTSentry":[186,197,223,238],"21":[188,219],"(8":[191],"types),":[192],"results":[194],"demonstrate":[195],"trained":[200],"within":[201],"120":[202],"seconds,":[203],"yielding":[204],"an":[205,241],"accuracy":[206],"rate":[207,244],"over":[209],"96.7%":[210],"recognizing":[212],"device":[213],"states.":[214],"on":[224,262],"two":[225],"real-world":[226],"test":[229,264],"sites.":[230],"Over":[231],"course":[233],"our":[235],"one-week":[236],"evaluation,":[237],"consistently":[239],"achieved":[240],"average":[242],"detection":[243],"99.24%":[246],"identifying":[248],"attack":[249],"instances.":[250],"Moreover,":[251],"it":[252],"triggered":[253],"no":[254],"than":[256],"2":[257],"false":[258],"alarms":[259],"per":[260],"day":[261],"each":[263],"site.":[265]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
