{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T14:02:54Z","timestamp":1762351374894,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T00:00:00Z","timestamp":1688515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,5]]},"DOI":"10.1145\/3594806.3596562","type":"proceedings-article","created":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T17:38:12Z","timestamp":1691689092000},"page":"638-644","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight machine learning for privacy-preserving and secure networked medical devices: The SEPTON project use cases"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5998-2940","authenticated-orcid":false,"given":"Sotiris","family":"Messinis","sequence":"first","affiliation":[{"name":"Institute of Communications and Computer Systems (ICCS), Greece and School of Rural Surveying and Geoinformatics Engineering, National Technical University of Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7701-5644","authenticated-orcid":false,"given":"Nicholas","family":"Protonotarios","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics and Theoretical Physics, University of Cambridge, United Kingdom and Institute of Communications and Computer Systems (ICCS), Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0942-6166","authenticated-orcid":false,"given":"Ioannis","family":"Tzortzis","sequence":"additional","affiliation":[{"name":"School of Rural Surveying and Geoinformatics Engineering, National Technical University of Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4491-5854","authenticated-orcid":false,"given":"Ioannis","family":"Rallis","sequence":"additional","affiliation":[{"name":"School of Rural Surveying and Geoinformatics Engineering, National Technical University of Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9550-0088","authenticated-orcid":false,"given":"Dimitrios","family":"Kalogeras","sequence":"additional","affiliation":[{"name":"Institute of Communications and Computer Systems (ICCS), Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4064-8990","authenticated-orcid":false,"given":"Nikolaos","family":"Doulamis","sequence":"additional","affiliation":[{"name":"School of Rural Surveying and Geoinformatics Engineering, National Technical University of Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2023,8,10]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100656"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-05539-7"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6522-6_6"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41551-020-0541-x"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477314.3508377"},{"key":"e_1_3_2_2_6_1","volume-title":"Wearable devices in healthcare: Privacy and information security issues. Health information management journal 49, 2-3","author":"Cilliers Liezel","year":"2020","unstructured":"Liezel Cilliers. 2020. Wearable devices in healthcare: Privacy and information security issues. Health information management journal 49, 2-3 (2020), 150\u2013156."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IST.2016.7738244"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2021.100366"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi15020054"},{"key":"e_1_3_2_2_10_1","volume-title":"MDCG 2019-16 Guidance on Cyber Security for Medical Devices. Technical Report. European Commission.","author":"Medical Device\u00a0Coordination Group","year":"2019","unstructured":"Medical Device\u00a0Coordination Group 2019. MDCG 2019-16 Guidance on Cyber Security for Medical Devices. Technical Report. European Commission."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym13061043"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5540296"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3180829"},{"volume-title":"Trends of Artificial Intelligence and Big Data for E-Health","author":"Kelly Brendan","key":"e_1_3_2_2_14_1","unstructured":"Brendan Kelly, Conor Quinn, Aonghus Lawlor, Ronan Killeen, and James Burrell. 2023. Cybersecurity in Healthcare. In Trends of Artificial Intelligence and Big Data for E-Health. Springer International Publishing, Schweizer Verlag, 213\u2013231."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3179047"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103583"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.200"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3152620"},{"key":"e_1_3_2_2_19_1","volume-title":"Wearable health devices in health care: narrative systematic review. JMIR mHealth and uHealth 8, 11","author":"Lu Lin","year":"2020","unstructured":"Lin Lu, Jiayao Zhang, Yi Xie, Fei Gao, Song Xu, Xinghuo Wu, Zhewei Ye, 2020. Wearable health devices in health care: narrative systematic review. JMIR mHealth and uHealth 8, 11 (2020), e18907."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2018.2845450"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3159092"},{"key":"e_1_3_2_2_22_1","volume-title":"Deep learning for anomaly detection: A review. ACM computing surveys (CSUR) 54, 2","author":"Pang Guansong","year":"2021","unstructured":"Guansong Pang, Chunhua Shen, Longbing Cao, and Anton Van\u00a0Den Hengel. 2021. Deep learning for anomaly detection: A review. ACM computing surveys (CSUR) 54, 2 (2021), 1\u201338."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102819"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110227"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.11.028"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2021.3137646"},{"key":"e_1_3_2_2_27_1","first-page":"4","article-title":"Toward a safe and secure medical Internet of Things","volume":"2","author":"Soroush Hamed","year":"2016","unstructured":"Hamed Soroush, David Arney, and Julian Goldman. 2016. Toward a safe and secure medical Internet of Things. IIC J. Innov 2, 1 (2016), 4\u201318.","journal-title":"IIC J. Innov"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3052390"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS48785.2022.9937920"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3176317"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108616"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-24082-z"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.02.007"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3195572"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13311-019-00727-2"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.028"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103118"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2022.3146131"}],"event":{"name":"PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments","acronym":"PETRA '23","location":"Corfu Greece"},"container-title":["Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594806.3596562","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594806.3596562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:07Z","timestamp":1750182547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594806.3596562"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,5]]},"references-count":39,"alternative-id":["10.1145\/3594806.3596562","10.1145\/3594806"],"URL":"https:\/\/doi.org\/10.1145\/3594806.3596562","relation":{},"subject":[],"published":{"date-parts":[[2023,7,5]]},"assertion":[{"value":"2023-08-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}