Milan Petković

ORCID: 0000-0002-6264-6822
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Video Analysis and Summarization
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Access Control and Trust
  • Data Quality and Management
  • Network Security and Intrusion Detection
  • Digital Rights Management and Security
  • Privacy, Security, and Data Protection
  • Advanced Image and Video Retrieval Techniques
  • Image Retrieval and Classification Techniques
  • Music and Audio Processing
  • Human Pose and Action Recognition
  • Digital and Cyber Forensics
  • Blockchain Technology Applications and Security
  • Big Data Technologies and Applications
  • Anomaly Detection Techniques and Applications
  • Fault Detection and Control Systems
  • Advanced Data Storage Technologies
  • Face recognition and analysis
  • Security and Verification in Computing
  • Reinforcement Learning in Robotics
  • Data Management and Algorithms
  • IoT and Edge/Fog Computing
  • Artificial Intelligence in Healthcare

Eindhoven University of Technology
2015-2025

Philips (Netherlands)
2015-2024

NXP (Netherlands)
2004-2024

University of Nis
2022-2023

Philips (France)
2021

Philips (Finland)
2007-2020

Philips (India)
2006-2020

Holst Centre (Netherlands)
2018

Philips (Spain)
2014-2016

University of Twente
2002-2011

Medicine and healthcare are undergoing profound changes. Whole-genome sequencing high-resolution imaging technologies key drivers of this rapid crucial transformation. Technological innovation combined with automation miniaturization has triggered an explosion in data production that will soon reach exabyte proportions. How we going to deal exponential increase production? The potential "big data" for improving health is enormous but, at the same time, face a wide range challenges overcome...

10.1186/s13073-016-0323-y article EN cc-by Genome Medicine 2016-06-23

The confidentiality of personal health records is a major problem when patients use commercial Web-based systems to store their data. Traditional access control mechanisms have several limitations with respect enforcing policies and ensuring data confidentiality. In particular, the has be stored on central server locked by mechanism, owner loses from moment sent server. Therefore, these do not fulfill requirements outsourcing scenarios where third party storing should plain data, it trusted...

10.1109/phealth.2009.5754828 article EN 2009-06-01

Cloud computing is an emerging technology that expected to support Internet scale critical applications which could be essential the healthcare sector. Its scalability, resilience, adaptability, connectivity, cost reduction, and high performance features have potential lift efficiency quality of healthcare. However, it also important understand specific risks related security privacy this brings. This paper focuses on a home system based cloud computing. It introduces several use cases draws...

10.1109/cloud.2011.108 article EN 2011-07-01

A privacy policy is a legal document, used by websites to communicate how the personal data that they collect will be managed. By accepting it, user agrees release his under conditions stated policy. Privacy policies should provide enough information enable users make informed decisions. regulations support this specifying what kind of has provided. As can long and difficult understand, tend not read them. Because this, generally agree with without knowing it states whether aspects important...

10.1145/2381966.2381979 article EN 2012-10-15

10.1016/j.dss.2014.02.002 article EN Decision Support Systems 2014-02-22

The idea of artificial intelligence (AI) has a long history. It turned out, however, that reaching at human levels is more complicated than originally anticipated. Currently, we are experiencing renewed interest in AI, fueled by an enormous increase computing power and even larger data, combination with improved AI technologies like deep learning. Healthcare considered the next domain to be revolutionized intelligence. While approaches excellently suited develop certain algorithms, for...

10.2196/12100 article EN cc-by Interactive Journal of Medical Research 2019-01-31

As amounts of publicly available video data grow, the need to automatically infer semantics from raw becomes significant. In this paper, we focus on use dynamic Bayesian networks (DBN) for that purpose, and demonstrate how they can be effectively applied fusing evidence obtained different media information sources. The approach is validated in particular domain Formula I race videos. For specific introduce a robust audiovisual feature extraction scheme text recognition detection method....

10.1109/icme.2002.1035907 article EN 2003-06-25

As amounts of publicly available video data grow the need to query this efficiently becomes significant. Consequently content-based retrieval turns out be a challenging and important problem. We address specific aspect inferring semantics automatically from raw data. In particular, we introduce new model that supports integrated use two different approaches for mapping low-level features high-level concepts. Firstly, is extended with rule-based approach spatio-temporal formalization...

10.1109/event.2001.938869 article EN 2002-11-13

Trust is an essential ingredient in our daily activities. The fact that these activities are increasingly carried out using the large number of available services on Internet makes it necessary to understand how users perceive trust online environment. A wide body literature concerning perception and ways model already exists. generally lists a set factors influencing person trusting another person, computer, or website. Different models define different factors, but single unifying model,...

10.1109/stast.2011.6059256 article EN 2011-09-01

The Continua Health Alliance, which was started in 2006 to enable an interoperable personal telehealth ecosystem, has become a major force the domain. Within one year after release of Version One Design Guidelines over dozen products have been officially Certified and many more are coming. In parallel continued its technical developments since made great progress on defining interoperability for LAN WAN interfaces, with that now enables end-to-end interoperability. this paper we motivate why...

10.1109/health.2010.5556588 article EN 2010-07-01

In most cases, reverse engineering is used to retrieve missing design documentation from the source code in form of an abstract (e.g., UML) model. context this work, as a part verification and validation chain software systems, where static structure dynamic behavior system are derived represented XML Metadata Interchange (XMI) format. The obtained model further analyzed for such characteristics soundness complexity system. XMI standard that enables us express objects using Extensible Markup...

10.1109/wcre.2006.21 article EN 2006-10-01

Advances in e-health bring new challenges with regard to the protection of sensitive patient data; an increasing number applications require share data consumer healthcare services. Typically providers those services reside outside traditional health care domain, where medical laws (such as HIPAA) do not apply. Instead, technical means should safeguard critical that is shared third parties. In this paper, we show cryptographic privacy-enhancing protocols are a key tool protect privacy...

10.1109/ares.2008.85 article EN 2008-03-01

In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows outsourcing of computationally expensive and decryption steps. The constitutes an important building block mobile applications where both the host users use devices with limited computational power. proposed scheme, during involves semi-trusted proxy to encrypt partially encrypted (by host) message according access policy provided by host. is unable learn from text. A user can only decrypt...

10.4225/75/57b65cc3343d0 article EN 2014-01-01
Coming Soon ...