Skip to main content

Table 3 Comparison with our previous work for detecting data manipulation attacks on ECG sensor measurements

From: Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems

  No replacement (%) Replacement w/ training group (%) Replacement w/ external group (%) Replacement w/ synthetic ECG (%) Feature engineering Peak detection algorithm
Temporal detector [15] 97.56 99.35 N/A 91.07 Required Required
Morphological detector [16] 97.73 90.09 93.79 N/A Required Required
Image reconstruction-based detector 96.22 99.53 98.83 98.46 Not required Not required