Skip to main content

Table 3 Comparison with our previous work for detecting data manipulation attacks on ECG sensor measurements

From: Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems

 

No replacement (%)

Replacement w/ training group (%)

Replacement w/ external group (%)

Replacement w/ synthetic ECG (%)

Feature engineering

Peak detection algorithm

Temporal detector [15]

97.56

99.35

N/A

91.07

Required

Required

Morphological detector [16]

97.73

90.09

93.79

N/A

Required

Required

Image reconstruction-based detector

96.22

99.53

98.83

98.46

Not required

Not required