{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:54:17Z","timestamp":1762005257037,"version":"3.37.3"},"reference-count":34,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T00:00:00Z","timestamp":1606348800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ZD2014004","61741516"],"award-info":[{"award-number":["ZD2014004","61741516"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["ZD2014004","61741516"],"award-info":[{"award-number":["ZD2014004","61741516"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2020,11,26]]},"abstract":"<jats:p>To date, the Medical Internet of Things (MIoT) technology has been recognized and widely applied due to its convenience and practicality. The MIoT enables the application of machine learning to predict diseases of various kinds automatically and accurately, assisting and facilitating effective and efficient medical treatment. However, the MIoT are vulnerable to cyberattacks which have been constantly advancing. In this paper, we establish a MIoT platform and demonstrate a scenario where a trained Convolutional Neural Network (CNN) model for predicting lung cancer complicated with pulmonary embolism can be attacked. First, we use CNN to build a model to predict lung cancer complicated with pulmonary embolism and obtain high detection accuracy. Then, we build a copycat model using only a small amount of data labeled by the target network, aiming to steal the established prediction model. Experimental results prove that the stolen model can also achieve a relatively high prediction outcome, revealing that the copycat network could successfully copy the prediction performance from the target network to a large extent. This also shows that such a prediction model deployed on MIoT devices can be stolen by attackers, and effective prevention strategies are open questions for researchers.<\/jats:p>","DOI":"10.1155\/2020\/8859489","type":"journal-article","created":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T03:50:07Z","timestamp":1606449007000},"page":"1-10","source":"Crossref","is-referenced-by-count":8,"title":["Neural Model Stealing Attack to Smart Mobile Device on Intelligent Medical Platform"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6813-1213","authenticated-orcid":true,"given":"Liqiang","family":"Zhang","sequence":"first","affiliation":[{"name":"Yunnan Key Laboratory of Opto-Electronic Information Technology, Yunnan Normal University, Kunming 650000, China"}]},{"given":"Guanjun","family":"Lin","sequence":"additional","affiliation":[{"name":"The School of Information Engineering, Sanming University, Sanming, Fujian 365004, China"}]},{"given":"Bixuan","family":"Gao","sequence":"additional","affiliation":[{"name":"Yunnan Key Laboratory of Opto-Electronic Information Technology, Yunnan Normal University, Kunming 650000, China"}]},{"given":"Zhibao","family":"Qin","sequence":"additional","affiliation":[{"name":"Yunnan Key Laboratory of Opto-Electronic Information Technology, Yunnan Normal University, Kunming 650000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9186-475X","authenticated-orcid":true,"given":"Yonghang","family":"Tai","sequence":"additional","affiliation":[{"name":"Yunnan Key Laboratory of Opto-Electronic Information Technology, Yunnan Normal University, Kunming 650000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5310-0270","authenticated-orcid":true,"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Yunnan Key Laboratory of Opto-Electronic Information Technology, Yunnan Normal University, Kunming 650000, China"}]}],"member":"311","reference":[{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/jiot.2018.2847733"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/MIS.2016.34"},{"author":"V. Tan","first-page":"17","article-title":"IoT-enabled health promotion","key":"3"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-39238-2_65","article-title":"Well-being on the go: an IoT vending machine service for the promotion of healthy behaviors and lifestyles","volume-title":"International Conference of Design, User Experience, and Usability. Springer","author":"S. Vicini","year":"2013"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.13052\/jcsm2245-1439.414"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/COMST.2018.2800740"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/TCYB.2019.2940940"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1016\/j.ins.2020.03.036"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/JPROC.2020.2993293"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1016\/j.dcan.2020.07.003"},{"issue":"3","key":"11","article-title":"Safety, security, and privacy threats posed by accelerating trends in the internet of things","volume":"29","author":"K. Fu","year":"2017","journal-title":"Computing Community Consortium (CCC) Technical Report"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/JIOT.2017.2694844"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1016\/j.suronc.2010.07.004"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1007\/s10916-019-1489-9"},{"key":"15","first-page":"372","article-title":"IEEE International Conference on Distributed Computing in Sensor Systems","volume":"2014","author":"A. Mohan","year":"2014","journal-title":"IEEE"},{"issue":"2003","key":"16","article-title":"Best practices for convolutional neural networks applied to visual document analysis","volume":"3","author":"P. Y. Simard","year":"2003","journal-title":"Icdar"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1109\/IJCNN.2018.8489592","article-title":"Copycat CNN: stealing knowledge by persuading confession with random non-labeled data","author":"J. R. Correia-Silva","year":"2018"},{"author":"F. Mohamed","doi-asserted-by":"crossref","article-title":"Towards new approach to enhance learning based on internet of things and virtual reality","key":"18","DOI":"10.1145\/3230905.3230955"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/ACCESS.2018.2809453"},{"key":"20","first-page":"2053","article-title":"IEEE international conference on green computing and communications and IEEE Internet of Things and IEEE cyber, physical and social computing","volume":"2013","author":"F. Hu","year":"2013","journal-title":"IEEE"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1007\/s13755-018-0049-x"},{"author":"T. Flynn","doi-asserted-by":"crossref","article-title":"Knock! Knock! Who is there? Investigating data leakage from a medical internet of things hijacking attack","key":"22","DOI":"10.24251\/HICSS.2020.791"},{"key":"23","article-title":"A survey of Android malware detection with deep neural models","author":"J. Qiu","year":"2020","journal-title":"ACM Computing Survey"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1016\/j.patcog.2017.10.013"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1109\/COMST.2018.2885561"},{"key":"26","article-title":"Intriguing properties of neural networks","author":"C. Szegedy","year":"2013","journal-title":"arXiv preprint arXiv"},{"key":"27","article-title":"Explaining and harnessing adversarial examples","author":"I. J. Goodfellow","year":"2014","journal-title":"arXiv preprint arXiv"},{"key":"28","first-page":"2574","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"S. M. Moosavi-Dezfooli","year":"2016"},{"author":"N. Dalvi","first-page":"99","article-title":"Adversarial classification","key":"29"},{"author":"D. Lowd","first-page":"641","article-title":"Adversarial learning","key":"30"},{"key":"31","article-title":"Good word attacks on statistical spam filters","volume":"2005","author":"D. Lowd","year":"2005","journal-title":"CEAS."},{"author":"M. Barreno","first-page":"16","article-title":"Can machine learning be secure","key":"32"},{"author":"N. Papernot","first-page":"506","article-title":"Practical black-box attacks against machine learning","key":"33"},{"issue":"11","key":"34","first-page":"1086","article-title":"Deep neural networks in cyber attack detection systems","volume":"8","author":"I. M. Bapiyev","year":"2017","journal-title":"International Journal of Civil Engineering and Technology (IJCIET)"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/8859489.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/8859489.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/8859489.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T03:50:12Z","timestamp":1606449012000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/wcmc\/2020\/8859489\/"}},"subtitle":[],"editor":[{"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,11,26]]},"references-count":34,"alternative-id":["8859489","8859489"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8859489","relation":{},"ISSN":["1530-8677","1530-8669"],"issn-type":[{"type":"electronic","value":"1530-8677"},{"type":"print","value":"1530-8669"}],"subject":[],"published":{"date-parts":[[2020,11,26]]}}}