{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:37:12Z","timestamp":1772303832685,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11277-024-11371-1","type":"journal-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T13:02:19Z","timestamp":1719925339000},"page":"2185-2200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing Smart Home Security Using Deep Convolutional Neural Networks and Multiple Cameras"],"prefix":"10.1007","volume":"136","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6186-5518","authenticated-orcid":false,"given":"Rishi","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Anjali","family":"Potnis","sequence":"additional","affiliation":[]},{"given":"Vijayshri","family":"Chaurasia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,2]]},"reference":[{"key":"11371_CR1","doi-asserted-by":"publisher","first-page":"56474","DOI":"10.2196\/56474","volume":"7","author":"S Groeneveld","year":"2024","unstructured":"Groeneveld, S., et al. (2024). The cooperation between nurses and a new digital colleague \u201cAI-Driven Lifestyle Monitoring\u201d in long-term care for older adults. JMIR nursing, 7, 56474.","journal-title":"JMIR nursing"},{"key":"11371_CR2","first-page":"451","volume-title":"Advances in networks, intelligence and computing","author":"P Verma","year":"2024","unstructured":"Verma, P., et al. (2024). Smart home system integration using internet of things. Advances in networks, intelligence and computing (pp. 451\u2013459). CRC Press."},{"issue":"7","key":"11371_CR3","doi-asserted-by":"publisher","first-page":"9986","DOI":"10.1007\/s11227-023-05843-7","volume":"80","author":"P Shukla","year":"2024","unstructured":"Shukla, P., Krishna, C. R., & Patil, N. V. (2024). Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review. The Journal of Supercomputing, 80(7), 9986\u201310043.","journal-title":"The Journal of Supercomputing"},{"key":"11371_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2024.3394799","author":"W Rahman","year":"2024","unstructured":"Rahman, W., et al. (2024). Automated detection of harmful insects in agriculture: A smart framework leveraging IoT, machine learning, and blockchain. IEEE Transactions on Artificial Intelligence. https:\/\/doi.org\/10.1109\/TAI.2024.3394799","journal-title":"IEEE Transactions on Artificial Intelligence"},{"key":"11371_CR5","doi-asserted-by":"publisher","first-page":"102527","DOI":"10.1016\/j.ecoinf.2024.102527","volume":"80","author":"D-Q Yang","year":"2024","unstructured":"Yang, D.-Q., et al. (2024). A systematic study on transfer learning: Automatically identifying empty camera trap images using deep convolutional neural networks. Ecological Informatics, 80, 102527.","journal-title":"Ecological Informatics"},{"issue":"2","key":"11371_CR6","doi-asserted-by":"publisher","first-page":"445","DOI":"10.12928\/telkomnika.v22i2.25840","volume":"22","author":"MA Rajab","year":"2024","unstructured":"Rajab, M. A., Abdullatif, F. A., & Sutikno, T. (2024). Classification of grapevine leaves images using VGG-16 and VGG-19 deep learning nets. TELKOMNIKA (Telecommunication Computing Electronics and Control), 22(2), 445\u2013453.","journal-title":"TELKOMNIKA (Telecommunication Computing Electronics and Control)"},{"issue":"4","key":"11371_CR7","doi-asserted-by":"publisher","first-page":"12375","DOI":"10.1049\/tje2.12375","volume":"2024","author":"M Haque","year":"2024","unstructured":"Haque, M., Nyeem, H., & Afsha, S. (2024). BrutNet: A novel approach for violence detection and classification using DCNN with GRU. The Journal of Engineering, 2024(4), 12375.","journal-title":"The Journal of Engineering"},{"issue":"6","key":"11371_CR8","doi-asserted-by":"publisher","first-page":"754","DOI":"10.18196\/jrc.v3i6.15978","volume":"3","author":"T-V Dang","year":"2022","unstructured":"Dang, T.-V. (2022). Smart home management system with face recognition based on ArcFace model in deep convolutional neural network. Journal of Robotics and Control (JRC), 3(6), 754\u2013761.","journal-title":"Journal of Robotics and Control (JRC)"},{"key":"11371_CR9","unstructured":"Ishraque, I., Hasan, M.S., &. Al-Amin, M.S. (2023) Traffic congestion prediction using deep convolutional neural networks: A color-coding approach. Department of electrical and elecrtonics engineering (EEE), Islamic."},{"key":"11371_CR10","doi-asserted-by":"crossref","unstructured":"Suresh, M., et al. (2023) IoT-based smart security and home automation system, In: Intelligent technologies for sensors. Apple academic press. pp. 89\u2013101.","DOI":"10.1201\/9781003314851-9"},{"key":"11371_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/9307961","volume":"2022","author":"O Taiwo","year":"2022","unstructured":"Taiwo, O., et al. (2022). Enhanced intelligent smart home control and security system based on deep learning model. Wireless communications and mobile computing, 2022, 1\u201322.","journal-title":"Wireless communications and mobile computing"},{"issue":"2","key":"11371_CR12","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s13735-023-00289-2","volume":"12","author":"MA Ansari","year":"2023","unstructured":"Ansari, M. A., Singh, D. K., & Singh, V. P. (2023). Detecting abnormal behavior in megastore for crime prevention using a deep neural architecture. International Journal of Multimedia Information Retrieval, 12(2), 25.","journal-title":"International Journal of Multimedia Information Retrieval"},{"key":"11371_CR13","doi-asserted-by":"crossref","unstructured":"Waseem, Q., et al. (2023). Exploring machine learning in IoT smart home automation. In: 2023 IEEE 8th international conference on software engineering and computer systems (ICSECS). IEEE.","DOI":"10.1109\/ICSECS58457.2023.10256283"},{"issue":"17","key":"11371_CR14","doi-asserted-by":"publisher","first-page":"11573","DOI":"10.1007\/s00500-021-06028-1","volume":"25","author":"G Kalnoor","year":"2021","unstructured":"Kalnoor, G., & Gowrishankar, S. (2021). IoT-based smart environment using intelligent intrusion detection system. Soft Computing, 25(17), 11573\u201311588.","journal-title":"Soft Computing"},{"issue":"8","key":"11371_CR15","doi-asserted-by":"publisher","first-page":"23799","DOI":"10.1007\/s11042-023-16476-6","volume":"83","author":"K DurgaBhavani","year":"2024","unstructured":"DurgaBhavani, K., & FerniUkrit, M. (2024). Design of inception with deep convolutional neural network based fall detection and classification model. Multimedia Tools and Applications, 83(8), 23799\u201323817.","journal-title":"Multimedia Tools and Applications"},{"key":"11371_CR16","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.neucom.2019.10.007","volume":"379","author":"B Ma","year":"2020","unstructured":"Ma, B., et al. (2020). Autonomous deep learning: A genetic DCNN designer for image classification. Neurocomputing, 379, 152\u2013161.","journal-title":"Neurocomputing"},{"issue":"3","key":"11371_CR17","doi-asserted-by":"publisher","first-page":"953","DOI":"10.3390\/s24030953","volume":"24","author":"Y Lu","year":"2024","unstructured":"Lu, Y., et al. (2024). Application of deep learning and intelligent sensing analysis in smart home. Sensors, 24(3), 953.","journal-title":"Sensors"},{"issue":"4","key":"11371_CR18","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/s12046-023-02249-2","volume":"48","author":"P Suganthi","year":"2023","unstructured":"Suganthi, P., & Kavitha, R. (2023). Secure and privacy in healthcare data using quaternion based neural network and encoder-elliptic curve deep neural network with blockchain on the cloud environment. S\u0101dhan\u0101, 48(4), 206.","journal-title":"S\u0101dhan\u0101"},{"key":"11371_CR19","doi-asserted-by":"crossref","unstructured":"Karthikamani, R., et al. (2024) IoT based anti-theft flooring system using CC3200. In: 2024 2nd international conference on intelligent data communication technologies and Internet of Things (IDCIoT). IEEE.","DOI":"10.1109\/IDCIoT59759.2024.10467952"},{"issue":"1","key":"11371_CR20","doi-asserted-by":"publisher","first-page":"4609","DOI":"10.1038\/s41467-020-18471-z","volume":"11","author":"Q Shi","year":"2020","unstructured":"Shi, Q., et al. (2020). Deep learning enabled smart mats as a scalable floor monitoring system. Nature communications, 11(1), 4609.","journal-title":"Nature communications"},{"key":"11371_CR21","doi-asserted-by":"publisher","first-page":"1810","DOI":"10.1109\/ACCESS.2016.2557846","volume":"4","author":"N Neverova","year":"2016","unstructured":"Neverova, N., et al. (2016). Learning human identity from motion patterns. IEEE Access, 4, 1810\u20131820.","journal-title":"IEEE Access"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11371-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11371-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11371-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T13:20:26Z","timestamp":1720531226000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11371-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["11371"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11371-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"11 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors report no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}