• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Enhancing Healthcare Data Security and Disease Detection Using Crossover-Based Multilayer Perceptron in Smart Healthcare Systems

    2024-01-20 13:02:48MustufaHaiderAbidiHishamAlkhalefahandMohamedAboudaif

    Mustufa Haider Abidi,Hisham Alkhalefah and Mohamed K.Aboudaif

    Department of Industrial Engineering,College of Engineering,King Saud University,P.O.Box-800,Riyadh,11421,Saudi Arabia

    ABSTRACT The healthcare data requires accurate disease detection analysis,real-time monitoring,and advancements to ensure proper treatment for patients.Consequently,Machine Learning methods are widely utilized in Smart Healthcare Systems(SHS)to extract valuable features from heterogeneous and high-dimensional healthcare data for predicting various diseases and monitoring patient activities.These methods are employed across different domains that are susceptible to adversarial attacks,necessitating careful consideration.Hence,this paper proposes a crossover-based Multilayer Perceptron(CMLP)model.The collected samples are pre-processed and fed into the crossover-based multilayer perceptron neural network to detect adversarial attacks on the medical records of patients.Once an attack is detected,healthcare professionals are promptly alerted to prevent data leakage.The paper utilizes two datasets,namely the synthetic dataset and the University of Queensland Vital Signs(UQVS)dataset,from which numerous samples are collected.Experimental results are conducted to evaluate the performance of the proposed CMLP model,utilizing various performance measures such as Recall,Precision,Accuracy,and F1-score to predict patient activities.Comparing the proposed method with existing approaches,it achieves the highest accuracy,precision,recall,and F1-score.Specifically,the proposed method achieves a precision of 93%,an accuracy of 97%,an F1-score of 92%,and a recall of 92%.

    KEYWORDS Smart healthcare systems;multilayer perceptron;cybersecurity;adversarial attack detection;Healthcare 4.0

    1 Introduction

    The fundamental component of everyone’s quest for a better life is health,which is categorized as a complete condition of mental,physical,and social well-being.A health system possesses every organization,action,people,attempt to affect health determinants,and effort to improve health[1].Enhancing health,maintaining health,and restoring health is the main objective of this.The healthcare domain is currently being met with developments based on new treatment methods and technologies[2].The smart healthcare system has greatly modified medical professionals’and patients’lives.Recently,several healthcare applications are there,those are inserted in consumer devices for gathering physiological information about a patient and giving treatments in automatic [3].The healthcare system should have access control mechanisms and policies to assist the diversity of needed access.The healthcare data has financial,operational,and clinical value when it is explored correctly for extracting primary features[4,5].Machine learning(ML)models are currently applied in several fields[6-8].In the healthcare domain,ML models can be used in several ways,such as exploited for extracting valuable features from the high-dimensional data for predicting various diseases as well as the activities of the patient [9].Adversarial machine learning encompasses strategies designed to generate incorrect predictions and deceive machine learning models,rendering them ineffective when subjected to perturbed input[10].Adversarial attacks can influence any type of data,including images and videos;therefore,ML algorithms sometimes produce inaccurate detection.Generally,maximum attacks occur in medical imaging data to change the already detected disease[11].

    Adversarial attacks,as used in the context of healthcare data security,describe apparent and frequently malicious attempts to modify,falsify,or corrupt confidential patient information.These attacks can take a number of different forms,like inserting bogus data,changing patient records,or attempting to trick machine learning models by supplying carefully constructed inputs that lead to false predictions.Adversarial attacks seriously threaten the accuracy and reliability of disease detection models and healthcare data analysis.

    Several methods have analyzed the impact of the attacks and security of the healthcare system for addressing adversarial attacks [12,13].Researchers have made advancements in the adversarial attack detection model;however,the attacks on the healthcare system used in the detection require proper assessments[14].In the realm of healthcare data analysis and disease prediction,a persistent challenge that has garnered significant attention is the issue of‘instability in disease prediction.’This phenomenon refers to the susceptibility of machine learning models,particularly those operating on complex and high-dimensional healthcare data,to exhibit fluctuations in their predictions over different instances or input variations.The instability arises due to the intricate interplay of various factors,such as data noise,feature heterogeneity,and model complexity.In practical terms,the instability in disease prediction poses a substantial barrier to machine learning models’consistent and reliable performance in healthcare applications.It engenders uncertainty in diagnoses and prognoses,impeding the seamless integration of predictive analytics into clinical decision-making workflows.The potential consequences of this instability include misclassification of diseases,inaccurate risk assessments,and hindered patient management strategies.

    These methods can have issues such as identifying patient movement and have high computational costs.Some methods also have impacts in adversarial attacks that have an effect on the smart healthcare system but cannot be detected by the system’s overall security.Hence,better and optimized solutions are required.Therefore,this paper proposes the Crossover-Based-Multilayer Perceptron (CMLP) method for detecting adversarial attacks in the smart healthcare domain.The main contribution of the paper is as follows:

    CMLP method:To identify the patient’s activities accurately,a CMLP is developed.MLP is mainly proposed for detecting patient activities with high accuracy.The crossover optimization algorithm is primarily deployed to enhance the developed MLP model.

    Validation utilizing datasets:Synthetic and UQVS datasets are exploited to validate the proposed method.The synthetic dataset possesses 17000 samples,and UQVS consists of 209,115 samples,which evaluate 26 vital signs.

    Improved performances:Experimental results show that the proposed method has achieved the most remarkable performance compared to the other methods.The proposed method gets good performance using performance measures such as precision,recall,F1-score,and accuracy.

    In brief,in today’s data-driven healthcare landscape,where the accurate and secure analysis of patient information is paramount,ensuring data integrity is a growing concern.Adversarial attacks can undermine the trustworthiness of predictive models,impeding accurate disease prediction and patient monitoring.The use of machine learning models in healthcare is significantly affected by ethical considerations,particularly those relating to patient consent and data protection.Fundamental ethical considerations include protecting patient information and obtaining explicit agreement before using data.In order to foster confidence between patients,healthcare professionals,and these automated systems,transparent and interpretable models are becoming more and more important in the field of medicine.To maintain patient rights,data security,and the general integrity of healthcare procedures,responsible development,and deployment of these models should also be guided by strict ethical norms.Addressing these concerns forms the backdrop for this research work,motivating the development and evaluation of the proposed CMLP model.The remaining work of the paper is structured as follows: Section 2 represents the related works,and Section 3 explains the proposed methodology.Section 4 demonstrates the experimental results,and the conclusion of the work is presented in Section 5.

    2 Literature Review

    A plethora of research is going on in the cyber-security of healthcare.Ahmed et al.[15]illustrated a patient discomfort detection model based on deep learning-based smart healthcare systems in an IoT(Internet of Things)environment.The model utilized Mask-Region-Based Convolutional Neural Network(Mask-RCNN)for detecting key points of a patient’s body by different features.The adjacent key points’distance is measured to analyze the discomfort in the patient’s body parts.The model’s performance was evaluated using various metrics such as recall,precision,and accuracy.As a result,this model detected each organ of the human body with high accuracy.Meanwhile,it did not correctly detect the patients’head movements and facial expressions.

    Tuli et al.[10]introduced an automatic heart disease detection model Health Fog using a deeplearning-based healthcare system in an internet of things (IoT) environment.The deployment of Health Fog was used to analyze the real-time heart patient data by integrating IoT and fog computing.The model was examined by using evaluation measures such as bandwidth,accuracy,response time,and energy consumption.The result found that this model offered various configurations and attained higher accuracy based on the requirements of heart patients.However,it should be noted that Health Fog only supported file-based input data.

    Raina et al.[16]developed an Intelligent and Interactive Healthcare System to focus on the comprehensive utilization of Speech Recognition.The Hidden Markov Model is used for implementation since it is more practical to use a probabilistic method to hold the active characteristics of optical features.Moreover,it maximizes efficiency but automatically reduces the requirement for any human intervention in case of any failure.Speech recognition execution is provided with various resource allocations,energy optimization,and energy efficiency methods.Sufficient data is not obtainable to train the methods for effective and trustable outcomes.

    Liu et al.[17]proposed deep learning(DL)-based channel state information to reveal the effective output of adversarial attacks on DL-based communication systems.A jamming attack is introduced in CsiNet to calculate the reaction of the adversarial attack and the outcomes of the NMSE computation.The COST 2100 channel version is deployed to simulate forms of channel state information (CSI)datasets in indoor and outdoor scenarios.The test results show analyzing the efficiency of mean square error and the disastrous effect of the adversarial attack on DL-based CSI feedback.The channel state information model is stricken by major attacks in several scenarios,which trigger our attentiveness to DL-based real-world atmospheres.

    For the medical image evaluation mechanisms based on DL,Ma et al.[18] established an understanding of malicious attacks.The deep neural network (DNN) was the best medical image evaluation method for identifying lesions and detecting cancer.A finely conducted attack could able to make changes in the deep learning mechanisms for medical image analysis.This indicated the challenges in the implementation of these mechanisms in medical fields.A deeper knowledge of various examples of malicious attacks in clinical images was presented in this article.It was observed that the DNN used in the medical field gets easily affected by malicious attacks.The current attacks were 98%identified by the use of normal detectors.These findings could be used to develop safe deep-learning mechanisms for the medical field.An efficient intrusion detection for cloud computing was presented by Javadpour et al.[19].Researchers also developed a distributed multi-agent intrusion detection system for cloud IoT environment called DMAIDPS [20].The results reported that the developed system has improved metrics when compared against other systems available in the literature.

    Moreover,Blockchain is a contemporary technology that is very efficient in data security [21].In the Healthcare 4.0,Bhattacharya et al.[22] employed a Blockchain-based DL as-a-service.The sharing of health records by patients was made easier by the electronic health record (EHR),and it also developed risks such as security,privacy,and authenticity.To rectify these challenges created,a Blockchain-based Deep-Learning as-a-service (BinDaas) was proposed in their research work.The proposed method combines deep learning methods and blockchain to share the EHR records between various users.According to the cryptography based on lattices,the verification and signature method was developed in the first stage for resisting attacks between medical authorities.According to the present indicators and patient characteristics to forecast upcoming diseases,Deep Learning as-a-Service was applied to EHR datasets in the second stage.The proposed method outperformed the conventional methods in terms of communication/calculation cost,delay,accuracy,and time of mining.The high communication cost required was its limitation.Hady et al.[23]proposed a real-time Enhanced Healthcare Monitoring System(EHMS).It records patients biometrics and sent the metrics for further diagnostics and treatment.Several datasets were tested and the system performance showed and improvement of 7%-25%in some cases.Kumaar et al.[24]presented a hybrid system based on deep learning for detecting intrusions in healthcare environment.They named their systems as ImmuneNet.The suggested framework employs a variety of feature engineering techniques,class balance-improving oversampling techniques,and hyper-parameter optimization methods to achieve excellent accuracy and performance.Some other researchers utilized adaptive neuro-fuzzy inference system for intrusion detection in IoT based healthcare system[25].The efficacy of the proposed method was tested with various databases.Jeyanthi et al.[26]presented a a recurrent neural network(RNN)and a bidirectional long short-term memory algorithm to detect and classify intrusion attempts.The results reported that the proposed system achieved an accuracy of 99.16%,sensitivity ratio of 99.89%,error rate of 0.008371%,and specificity ratio of 98.203% for the given dataset.Iwendi et al.[27] employed the random forest with genetic algorithm for intrusion detection in healthcare.A high detection and low alarm rate was reported.

    Ahmed et al.[28] presented a comprehensive literature review for the ML based methods used in intrusion detection for healthcare data.Kilincer et al.[29]proposed an automated cyber-security system based on recursive feature elimination(RFE)and multilayer perceptron for detecting attacks in healthcare system.Savanovi′c et al.[30]presented a ML method which was optimized by metaheuristics for intrusion detection in healthcare 4.0 system.XGBoost with modified firefly algorithm was utilized.To encrypt sensitive data and lessen privacy breaches and cyberattacks from unauthorized users and hackers,a Lionized remora optimization-based serpent(LRO-S)encryption method was proposed by Almalawi et al.[31].It was reported that the suggested approach reduced the time required to encrypt and decrypt data while raising privacy standards.

    The literature review reveals a notable research gap in the domain of healthcare data security and disease detection.Previous studies have often focused on individual aspects of data security or disease prediction,but there has been limited exploration of comprehensive approaches that integrate both aspects while addressing the challenges posed by adversarial attacks.This research work bridges this gap by proposing a novel CMLP model that not only enhances healthcare data security but also improves the stability and accuracy of disease detection within the context of smart healthcare systems.By amalgamating these critical components,we aim to provide a holistic solution that safeguards patient information and augments the reliability of predictive analytics in healthcare.

    3 Proposed Methodology

    In recent years,ML has been employed in various industries to fulfill needs;in the healthcare domain,one example is that it assists in developing models for effective results based on the patient’s critical data.A schematic diagram of a smart healthcare system in a key configuration is delineated in Fig.1.In this research work,initially,the data is collected from two different datasets,namely the synthetic dataset and the University of Queensland Vital Signs(UQVS)dataset.The collected samples are then pre-processed and provided to the CMLP neural network to detect whether the adversarial attack affects the patients’medical records.

    Figure 1:Architecture of the proposed model

    The selection of datasets in this study was carefully considered to provide a balanced evaluation of the proposed CMLP model.The synthetic dataset was chosen due to its controllability and flexibility,enabling us to introduce and test adversarial attacks under controlled conditions systematically.The UQVS dataset,on the other hand,was selected to bring real-world relevance to our research.This dataset comprises vital signs data collected from actual healthcare scenarios,making it an ideal representative of real-world healthcare data.To ensure data quality and integrity,rigorous preprocessing steps were applied to both datasets.Data cleaning involved the identification and rectification of any missing or erroneous entries.Normalization was employed to standardize features,mitigating the influence of varying measurement units.Feature extraction was carried out with domain-specific knowledge to capture clinically relevant attributes.This combination of synthetic and real-world datasets,along with meticulous preprocessing,allowed us to evaluate the proposed CMLP model’s performance across various scenarios while maintaining data quality.

    The suggested CMLP model uses a novel strategy to improve transparency and comprehensibility to address concerns about machine learning model interpretability.The crossover-based process in the CMLP model lets us track information through layers,helping healthcare practitioners understand decision-making.The model emphasizes trustworthy information while minimizing noisy or unstable signals by selectively merging stable layer properties.This strengthens the model and clarifies its decision-making process.The CMLP model bridges the gap between neural network computations and healthcare professionals’demand for actionable insights they can trust by giving interpretable insights.

    3.1 Data Collection and Pre-Processing

    A data collector phase integrates the important symptoms of sick individuals from various smart healthcare devices and sends the data to the pre-processing phase.The data is then pre-processed on the report of the sample frequencies associated with the specimen and stored in an array.For example,monitoring a heartbeat device supervises the heart rate of sick individuals,and at the same time,an Electrocardiogram (ECG) device computes a patient’s cardiac status every 10 s.Diagnostics in the smart healthcare system (SHS) utilizing the MLP model and real-time supervision pattern data are applied for training.The training data are tagged with various ailments and diseases,such as high blood pressure,low sugar,ECG,etc.,in order to realize the data sample.The sick person’s collected physiological data is utilized in the test module to identify the various ailments detected based on the previously trained MLP sample.Here,the attack method can be described as the pre-processing of the data pipeline.An adversary carefully maintains the training data during the MLP training phase after the attack occurs in a healthcare system and comforts the entire schooling process.Safe protocols for the transfer of data:The representation of the gathered data is:C_encrypted=Encrypt(C,Key),where the medical data is denoted asC,the encryption process is shown asEncrypt(),and the encryption key is indicated askey.

    3.2 Development of the Model

    MLP models are highly capable of forming accurate forecasts and understanding difficult patterns;they are used abundantly in medical data analysis.To improve the safety and performance of the model,it is proposed to implement dropout regularization,and the development of the deep learning model is explained in this section.The feedforward neural network contains a few hidden layers,an output layer,and an input layer,which is the MLP.A large number of neurons are joined to form every layer,and weighted links are present between these neurons.For making accurate forecasts,studying the suitable values for these weights is the objective of the MLP model.The CMLP model addresses disease prediction instability in a novel way.Its main feature is the crossover mechanism’s adaptive merging of neural network layer characteristics.Unlike conventional models that predict only from the final layer output,the CMLP model uses intermediate feature representations from multiple layers.These intermediate representations undergo a crossover process,transferring information from stable and resilient layers to fluctuating ones.This technique encourages knowledge sharing and mitigates noisy or unreliable features.The crossover mechanism helps the model capture subtle data patterns while minimizing instability-causing disturbances by selectively spreading information flow.This distinguishes the CMLP model from conventional schemes,making disease prediction more resilient.

    The MLP is determined from the artificial neural network (ANN) that is employed with more than one hidden layer.A huge number of hidden layers are obtained in the central portion,including input and output.The simple MLP model is employed with one hidden layer that is determined as a three-layer structure.The MLP is composed of two parts a feedforward neural network and an errorback propagation algorithm.The neuron received from the input is related to the thresholdφand later implemented through an activation functiona(.)that generates output.The output of a single hidden layer neuron is formulated as:

    From the above equationvjandyjare the input function.Detecting disorders in healthcare is still considered a challenging role in medical analysis.So,to overcome this situation,the activation function makes the neural network an efficient method.The expression for the sigmoid activation function is expressed as:

    3.2.1Multi-LayerFeedforwardNeuralNetwork

    It is determined based on MLP to predict the disease accurately in health care.In this approach,each neuron is interconnected with one another but not merged with the same layer i.e.,it does not provide a cross-layer connection.The input neuron gathered fromgththe hidden layer is formulated as:

    The output of the hidden layer is determined as:

    The output ofgtha neuron is represented as:

    The final output layer of the perceptron is expressed as:

    where the threshold of the hidden layer is denoted aslg,the output layer threshold is indicated byφi.The connection weight among the input and hidden layer is represented asujgbased onjthfunction,and forithneurons,it is indicated byvgi.The output activation function is indicated byk(.).The forward propagation model of a three-layer perceptron is generated in the form of a matrix.

    3.2.2ErrorBackpropagationAlgorithm

    In order to update the function,the backpropagation is performed in a MLP,which updates the loss function of the optimization parameter.The differences obtained between the predicted and theoretical values are estimated using the mean squared error characterization,which demonstrates the learning accuracy of the MLP.The training of the output neural network is expressed as follows:

    The mean squared for the training set is formulated as:

    Based on the gradient descent strategy,the backpropagation optimizes the negative gradient function.The learning rateη?(0,1) is utilized to direct the step size at each iteration.The updated value is formulated as:

    From the above equation,the connection weight is denoted byvgi.The activation function for the hidden and output layer based on the sigmoid function is expressed as:

    Integrating Eqs.(10)and(11)the gradient strategy is obtained as:

    The output of MLP based on error propagation diminished the cumulative error obtained while training.

    However,the error determined in the back-propagation is validated before updating the layer.The hidden and output layer function is processed,and the cumulative error will be determined as 10-3,or the iterative process will exceed 105.

    In the case of training data,the MLP models are specialized;in the case of unseen data,the MLP models fail to generalize.The frequently occurring problem in the MLP models is overfitting,which will reduce safety and performance in medical data analysis.The dropout regularization is applied in the MLP model to solve this problem.At the time of training,by randomly deactivating a few of the neurons,the problem of overfitting is prevented by the dropout regularization technique.The model is forced to understand many representations,and the dropout process introduces redundancy.The model easily makes forecasts and depends less on particular links by unevenly dropping neurons.In the MLP model,the dropout normalization is usually linked after one or more hidden layers.The dropout rate is the probability of being dropped allotted to every neuron in the hidden layer while the training occurs.0.2 to 0.5 is the rate of normal dropout;the complexity of the model and the particular dataset decides the optimal rate of dropout.The dropout is executed at the time of the MLP model’s forward pass,and zero is fixed as the activations of the neurons drop.For maintaining the anticipated resulting magnitude,the scaling factor 1/(1-dropout_rate)is used for the leftover active neurons.The entire input for the upcoming layers is maintained roughly constant by this scaling,and at the time of training,it recompenses for the neurons that are deactivated.The representation of the MLP model’s forward pass equation utilizing dropout normalization is given below:

    Here the input data is mentioned asC_input,the weight of the MLP is indicated asW_mlp,and the term of bias is given asb_mlp.Dropout layers are inserted between the hidden layers,deactivating a certain number of neurons based on the dropout rate.Dropout regularization is implemented in the MLP model to enhance both the safety of medical data analysis and the generalization of the model.Using dropout offers several advantages,including improved performance on unfamiliar data,reduced reliance on specific connections,and the ability to identify strong features.

    3.3 Cybersecurity and Privacy Elements

    3.3.1MechanismsforAccessControl

    The channel for communication present in between the storage of medical data and the end user is secured by the Elliptic Curve Integrated Encryption Scheme (ECIES) during the execution of mechanisms for access control.The system is used to safeguard the valid user’s public key.The request for accessing medical data by an end user is encrypted with the receiver’s public key utilizing ECIES.Data decryption can only be done with the particular key of the valid user.

    3.3.2EncryptionofData

    The ECIES is used to safeguard medical data while transferring and storing.The information is encrypted with the receiver’s public key utilizing ECIES before transferring or storing.From this,it is known that confidential medical information can only be decrypted and used by the receiver who has the particular private key.

    1.Key Generation:Initially,the creation of an elliptic curve key pair is included in the key generation process.A private key (c) is produced approximately,and the congruent public key (R) is obtained,and the base point of the elliptic curve by the private key (R=c * H)is increased.The elliptic curve parameters and the base point(H)are preplanned and assigned to the contract parties.

    2.Encryption:The following steps are taken using ECIES to encrypt the message(m).

    a.Random Secret Generation:For every encryption,a random secret key(l)is produced to get uniform encryption,and the secret key is employed for MAC keys.

    b.Key Derivation:The receiver’s public key(Q)is increasing with the sender’s private key to obtain the shared secret(T).The shared secret(T=c*Q)is then the uniform encryption key(KE)and the MAC key(KM)to get the random secret(k)is employed in the key derivation function(KDF).

    c.Symmetric Encryption:With the obtained encryption key the message (m) is encrypted using a uniform encryption algorithm,such as AES and it assures the surreptitiousness of the message.

    d.Message Authentication Code (MAC) Generation:HMAC and MAC are applied to produce MAC in the encrypted message along with the obtained MAC key.The MAC guarantees the encrypted message’s integrity and discovers any interception efforts.

    e.Public Key and Encrypted Data Packaging:In the ciphertext,the public key is used for encryption and the encrypted data consists of the sender.

    3.Decryption:Using ECIES the receiver executes the following steps to decrypt the ciphertext(Q,C):

    a)Key Derivation:Increasing the receiver’s private key with the sender’s public key is used to obtain the secret key(T).The shared secret key(T=c*R)is then used during encryption with the uniform and MAC keys as the random secret keys obtained in the key derivation function.

    b)MAC Verification:Using the received MAC key the MAC is computed for the derived encrypted data,and the probity of the encrypted data is cross-checked when the computed MAC suits the obtained MAC.

    c)Symmetric Decryption:The encrypted data,the received encryption key,and a similar uniform encryption algorithm are decrypted and used during encryption,and the original message(m)is shown by the decrypted data.

    3.3.3DataAccessLoggingandAuditing

    When recording instances of data access,ECIES can be applied to keep in existence a preserved record of data acquisition activities data can be encrypted with the public key of the recording system.The acquired records are preserved in the form of encryption,assured only decrypted by the official recording system.The surreptitiousness and integrity of the records are kept in existence,storing unofficial access by employing ECIES to access data records.

    3.3.4SecurityTrainingandAwareness

    In the context of safety training and awareness programs,the use of ECIES can be implemented to promote secure communication.When distributing sensitive training materials or information among multiple contributors,the message can be encrypted using the ECIES public key of each contributor.This ensures that only authorized users with the corresponding private key can decrypt and access the training materials,thereby maintaining confidentiality and preventing unauthorized dissemination.This approach ensures the confidentiality and controlled distribution of sensitive information,reducing the risk of unofficial spreading and unauthorized access.

    3.3.5CrossoverBasedMLPAlgorithmforAdversarialAttackDetection

    The application of a crossover AOA-based MLP pattern in safeguarding healthcare data enhances the aspect of two-step authentication.Following this,the recipients are prompted to undergo authentication for the second factor,and upon successful user authentication,access is granted.A Time-based One-Time Password(TOTP)method,such as a mobile application,generates a unique one-time code to implement the two-step authentication.A shared secret key and the current-time code are generated,and the receiver’s computer verifies the second component of the code.The system ensures that only authorized individuals can interact with the healthcare data by integrating two-step authentication,valid credentials,and second-factor verification.

    3.4 Arithmetic Optimization Algorithm(AOA)

    The Arithmetic optimization algorithm (AOA) [32] is a completely new meta-heuristic method.The important suggestion of this algorithm is to mix the four conventional arithmetic operators in mathematics,i.e.,subtraction (s),multiplication (m),division (d),and addition (a).Similar to the sine-cosine algorithm (SCA),AOA additionally has a very easy shape and occasional computation complexity.The M and D operators inside the iterations can generate big stepsmandd,specifically within the exploration phase where the result is carried out.The declaration is as follows:

    whereinEPSis the smallest positive number,andλis a continuous coefficient that is cautiously deliberate for this set of rules.During iterations,theMoPis decreased non-linearly from 1 to 0,and the advent is as follows:

    According to the AOAβis a continuous variable,which is set to 5 according to the AOA.

    From the above equation,MandDoperators each have very consistent postures at the concept of what the hunt agent can produce.Instead,sandaoperators had been used to prominence neighborhood exploitation,which creates small steps within the search location.The numerical notation is represented as:

    For an optimization algorithm to explore and exploit,there may be no ambiguity approximately the consequences of equilibrium.In AOA,the MOA parameter is used for the duration of iterations to change exploration and exploitation,which is represented as:

    whereMINIandMAXIare constant values.According to Eq.(20),MOA increases from Min to Max.Therefore,in the preliminary stage,the search agent operates in the seek area and has a greater opportunity to explore even as the search agent is much more likely to act the search close by the optimal position.In order to enhance the exploration and exploitation capability,a crossover strategy is established.In the crossover operation,a hybrid offspring is created by combining two parent solutions using the crossover operator,preserving the characteristics of both parent solutions in the offspring[33].The equation presented below describes the crossover utilized in the current work.

    Here the rate of crossover isXV.The evenly issued random number in the range[0,1]is denoted asiq.The parent solutions used for crossing areerandar.The value of 0.3 is fixed as the crossover probabilityXVof the current work.By comparing the robustness of the present solution vector and the updated solution vector,the selection of greedy determines whether the vectorfrwhich is updated,exists or not in the upcoming generation.The following equation defines the selection operator:

    Here the objective function is denoted ask.For the challenge of minimization,this selection process can be used.The solution’s populations in the flat search locations are steered by the inequality≤implemented,and it prevents solutions from immobility.Thus,by employing crossover based MLP algorithm,the medical data of various patients are protected from adversarial attack.Fig.2 below describes the developed hybrid algorithm.

    Figure 2:MLP based crossover AOA algorithm

    4 Results and Discussions

    This paper presents the proposed CMLP method for accurately identifying the patient’s activities.The method simulates various attacks in MATLAB using Python library and implements Keras and Scikit-Learn library on the Google Collab platform to test the dataset.The algorithm and computation was peformed on i7 processor with 16 Gb RAM,and 4 GB graphics card.Hyperparameter tuning was conducted to optimize the CMLP model’s performance.This process involved systematic adjustments to parameters such as learning rates,batch sizes,and the number of hidden layers to achieve the best results.For the training-validation split,an 80-20 ratio was adopted,where 80% of the dataset was used for training,and the remaining 20% was designated for validation.To further assess the model’s robustness,a cross-validation procedure using k-fold cross-validation (with k=5) on both the synthetic and UQVS datasets was conducted.This approach involved splitting the data into k subsets(folds),training the model on k-1 folds,and validating it on the remaining fold.This process was repeated k times,rotating the validation fold each time.The results from each iteration were then averaged to provide a more robust estimate of the model’s performance.This method is assessed with various metrics such as precision,accuracy,recall,and F1-score,and these results are compared with existing methods such as DL-based CSI[17],Blockchain-based DL[22],and Mask-RCNN[15].

    4.1 Data Collection

    This work collects data from the UQVS dataset,which consists of almost 16,000 data samples[34].The samples in the dataset are divided into training and testing in the ratio of 80:20.In data analysis,this research utilized the MLP model to learn complex patterns and provide accurate predictions.When implementing access control mechanisms,ECIES can be used to secure the communication channel between the user and the healthcare data repository.ECIES is used to protect the communication channel between the healthcare data repository and the user.This ensures that only authenticated users with the corresponding private key can decrypt and access the data.This research implements a two-factor authentication phase,which increases healthcare data security by MLP model.For identifying the various activities of the patient,the proposed CMLP utilizes correlation among several medical devices.Here,that correlation is utilized to execute the crafting decision tree untargeted attacks for finding more important devices.The untargeted attack assumes and utilizes the total training sample to generate adversarial examples.To change the state of the disease from a stroke to an abnormal oxygen level,hemoglobin devices were established for observing the untargeted attack.Likewise,the glucose device is influenced when modifying the disease state,as mentioned from high cholesterol to stroke.An oxygen saturation device,heart rate,and glucose are more influenced devices,and these devices perform the untargeted attack.Table 1 depicts the parameters involved,its final state,affected device as well as device count.

    Table 1: Status of every affected device and device count

    4.2 Evaluation Measures

    The evaluation in terms of precision,accuracy,recall,and F1-score is conducted to validate the performance of the proposed CMLP model.

    Accuracy:Accuracy is the most basic measurement used to evaluate the effectiveness of the model.It is defined as the number of correct predictions to the total number of predictions.Accuracy measures the overall correctness of the model’s predictions,providing a global assessment of its performance.In healthcare data security and disease detection,high Accuracy indicates the model’s capability to make correct predictions across various scenarios,contributing to reliable decision support.

    Precision:Precision is the measurement used to analyze positive predictions.Precision quantifies the model’s ability to correctly identify relevant instances among all instances it classifies as positive.In healthcare data security,a high Precision signifies that the model’s positive predictions are highly accurate,reducing the chances of false alarms and unnecessary alerts.It is defined as the ratio of true positives to the summation of true positives and false positives.

    Recall:Recall is the measurement used to analyze the number of true positive samples.Recall,also known as Sensitivity or True Positive Rate,measures the model’s ability to correctly identify relevant instances among all actual positive instances.In the context of healthcare data security,a high Recall ensures that the model effectively detects adverse events,minimizing the risk of data breaches and unauthorized access.It is defined as the ratio of true positives to the sum of false negatives and true positives.

    F1-score:F1-score is the harmonic mean of precision and recall,and during the precision-recall tradeoff,if the precision increase,recall decrease and vice versa.The F1-score strikes a balance between Precision and Recall,offering a single metric that considers both false positives and false negatives.In the healthcare domain,a high F1-score signifies a model’s proficiency in achieving accurate,reliable,and balanced predictions,which is crucial for data security and disease detection scenarios.

    4.3 Performance Analysis

    The performance of the developed algorithm is evaluated based on the above-mentioned measures.Fig.3a demonstrates the effects of device reduction in terms of the effectiveness of untargeted attacks.The success rate of the proposed attack is dropped when the number of devices is decreased.To remove 2 devices(glucose,blood oxygen)and 1 device,the proposed attains the greatest success rate of 14.60%than the existing methods.The proposed method attains the greatest success rate of 16.45%in removing three devices: oxygen,glucose,and heart rate.To eliminate one,two,and three devices,as can be seen in Fig.3b.By decreasing the devices at SHE,the effectiveness of adversarial attacks decreased in short.

    Figure 3:Analysis based on(a)attacker success rate(b)accuracy drop rate

    4.3.1AssessmentwithVariousAttackAlgorithms

    Here,in CMLP,two attacks are executed such as a black box and white box attack,to assess the proposed model’s effectiveness by several algorithms.Table 2 shows the effectiveness of the various methods with the proposed method.In Table 2,the proposed method has a 32.30% for success rate and a 15.70%for accuracy drop in both targeted attack and targeted attack.The existing Mask-RCNN method attained an 8.32 accuracy drop lower than the proposed method as well as it attained a success rate of 9.26.The proposed method achieved a success rate of 8.22 and a 12.29 accuracy drop in the black box.

    Table 2: Performance analysis

    The time complexity of the proposed method is analyzed with the existing methods.Fig.4a demonstrates the complexity analysis of the proposed method.The proposed method obtains low complexity in the synthetic data.It has low complexity in 10 sensors with 1600000 clauses.The proposed method achieves low complexity in the clauses.Fig.4b shows the complexity of using UQVS data.In the UQVS data,when compared to existing techniques,the proposed method has low complexity in 10 sensors with 200000 clauses.Hence,these methods are utilized across various domains which will be affected by adversarial attacks.

    Figure 4:Complexity analysis for(a)synthetic data(b)UQVS data

    The performance is evaluated by comparing the proposed CMLP method with the existing DLbased CSI,Blockchain-based DL,and Mask-RCNN.Fig.5a shows the accuracy analysis of the proposed method.The proposed method and existing methods are compared in terms of detecting activities.The proposed method achieves a higher accuracy of 97%than the other methods.The DLbased CSI attains an accuracy of 94%,85%for the Blockchain-based DL method,and Mask RCNN reaches an accuracy of 91%.The graphical representation of the precision analysis is illustrated in Fig.5b.From the figure,it can be see seen the proposed method attains a precision of 93% higher than the existing methods.

    Figure 5:Comparative analysis for(a)accuracy and(b)precision

    Fig.6 a demonstrates the recall analysis with the comparison of the proposed method and other methods.When comparing the existing methods with the proposed method,the proposed method outperformed the existing methods.It achieves a recall of 92% more than the other methods.The DL-based CSI method attains a recall of 90%,the Blockchain-based DL method achieves a recall of 86%,and the mask RCNN method has 85%.Fig.6b illustrates the F1-score analysis for the proposed method.The proposed method attains an F1-score of 92% in the comparison of existing methods.The methods get an F1-score of 90%for DL-based CSI,.80%for Blockchain-based DL,and 85%for mask-RCNN.

    Figure 6:Comparative results based on(a)recall and(b)F1-score

    The achieved accuracy,precision,recall,and F1-score bear significant practical implications in the realm of healthcare data security and disease detection.The high precision indicates a low rate of false alarms,ensuring that healthcare professionals can confidently act on model alerts without being inundated with erroneous notifications.The equally high recall signifies the model’s ability to effectively detect potential issues,minimizing the risk of missed critical events.The impressive F1-score balances precision and recall and demonstrates the model’s proficiency in maintaining accuracy while providing comprehensive coverage.

    In practical terms,this translates to a more secure environment for healthcare data,where there is a substantially lower risk of data breaches and illegal access.It simultaneously improves disease detection accuracy,enabling prompt intervention and accurate patient management.These metrics demonstrate the value and relevance of this study in enhancing the dependability and security of smart healthcare systems.

    To provide a more comprehensive comparison,a thorough assessment of the proposed CMLP model was made against three existing methods: DL based CSI,Blockchain-based DL,and Mask-RCNN.This detailed evaluation sheds light on the CMLP model’s unique advantages in healthcare data security and disease detection.While DL-based CSI exhibits competence in certain predictive tasks,it may be vulnerable to adversarial attacks and often lacks transparency.The CMLP model excels by integrating a crossover-based mechanism that enhances both security and interpretability.Blockchain-based DL offers data security but can introduce computational inefficiencies and scalability challenges.The CMLP model,through its feature fusion approach,manages to provide robustness against adversarial attacks without compromising computational efficiency.Mask-RCNN,designed for image segmentation,may not seamlessly translate to healthcare data security and disease detection,particularly with non-image data.The CMLP model’s adaptability to diverse data types and its ability to effectively handle adversarial attacks position it as a more versatile solution in the healthcare domain.

    CMLP model addresses adversarial attacks by selectively fusing features from different layers,prioritizing reliable information while attenuating noisy or adversarial signals.Its adaptability to diverse healthcare data types and its capability to maintain robustness without sacrificing computational efficiency sets it apart from other approaches.

    5 Conclusions

    Machine learning methods are used to analyze large amounts of patient data in the healthcare industry.However,these models face several challenges due to their instability in disease prediction.To address this drawback,this research proposed a novel adversarial CMLP-based attack.This method used the UQVS dataset and some performance evaluation measures such as accuracy,precision,recall,and F1-score.The performance of the proposed CMLP model is validated by comparing it with existing methods such as DL-based CSI,Blockchain-based DL,and Mask-RCNN.The model achieved an accuracy of 97%,a precision of 93%,a recall of 92%,and an F1 score of 92%,respectively.The experimental result revealed that the proposed CMLP model performs better than the existing methods.

    While the proposed CMLP model presents several advantages,it is essential to acknowledge its limitations and identify avenues for future research.One potential limitation lies in its susceptibility to highly sophisticated adversarial attacks that may exploit intricate data correlations.Further research into advanced adversarial defense mechanisms could enhance the model’s resilience.Additionally,while our model demonstrates robustness in offline experiments,deploying it in real-time automated disease detection systems poses practical challenges.Considerations such as data privacy,real-time processing constraints,and scalability need to be carefully addressed.Strategies for secure and efficient data transmission and processing warrant exploration,especially in cloud-based healthcare systems.Its effective application in real-world healthcare settings will depend on recognizing its limitations and resolving deployment issues that arise in the real world,paving the way for a safer and more dependable healthcare ecosystem.

    In the future,this proposed CMLP model will be applied in a real-time automated disease detection system.Future research could also focus on enhancing the model’s interpretability further,making it more accessible to healthcare professionals.Incorporating domain-specific knowledge or designing user-friendly interfaces could facilitate seamless integration into clinical workflows.

    Acknowledgement:The authors extend their appreciation to King Saud University for funding this work through Researchers Supporting Project Number(RSP2024R499),King Saud University,Riyadh,Saudi Arabia.

    Funding Statement:This research was funded by King Saud University through Researchers Supporting Program Number(RSP2024R499).

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design:M.H.A.,H.A.,M.K.A.;methodology:M.H.A.,H.A.;data collection:M.H.A.,M.K.A.;analysis and interpretation of results: M.H.A.,H.A.;draft manuscript preparation: M.H.A.,H.A.,M.K.A.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:All the databases and their reference source are mentioned in the paper.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产女主播在线喷水免费视频网站| 亚洲精品国产av成人精品| 国产亚洲一区二区精品| 蜜桃在线观看..| 熟女电影av网| 午夜福利在线观看免费完整高清在| 欧美区成人在线视频| 欧美高清成人免费视频www| 国产av一区二区精品久久 | 女人久久www免费人成看片| 大陆偷拍与自拍| 天堂中文最新版在线下载| 亚洲精品亚洲一区二区| 亚洲精品,欧美精品| 最新中文字幕久久久久| 亚洲美女视频黄频| 午夜激情久久久久久久| 成人漫画全彩无遮挡| 色婷婷久久久亚洲欧美| 菩萨蛮人人尽说江南好唐韦庄| 亚洲精品久久午夜乱码| 18禁动态无遮挡网站| 一个人看视频在线观看www免费| 久久精品人妻少妇| 中国国产av一级| 日韩 亚洲 欧美在线| 日韩视频在线欧美| 亚洲精品视频女| 啦啦啦在线观看免费高清www| 六月丁香七月| 国产爽快片一区二区三区| 99国产精品免费福利视频| av播播在线观看一区| 亚洲精品国产成人久久av| 亚洲国产精品成人久久小说| 成人一区二区视频在线观看| 天天躁夜夜躁狠狠久久av| 午夜激情久久久久久久| 一级黄片播放器| 久久这里有精品视频免费| 久久人妻熟女aⅴ| 亚洲av男天堂| 热99国产精品久久久久久7| 一个人免费看片子| 久久久久久九九精品二区国产| 自拍欧美九色日韩亚洲蝌蚪91 | 国产深夜福利视频在线观看| 国产精品.久久久| 精华霜和精华液先用哪个| 少妇裸体淫交视频免费看高清| 麻豆乱淫一区二区| 国产在线视频一区二区| 国产精品av视频在线免费观看| 一二三四中文在线观看免费高清| av在线app专区| h日本视频在线播放| 亚洲欧美精品专区久久| 久久影院123| 麻豆乱淫一区二区| 伦理电影大哥的女人| 国产一区二区在线观看日韩| 春色校园在线视频观看| 午夜视频国产福利| 一区在线观看完整版| 天美传媒精品一区二区| 亚洲图色成人| 国产女主播在线喷水免费视频网站| 2018国产大陆天天弄谢| 国产视频内射| 十八禁网站网址无遮挡 | 日韩成人av中文字幕在线观看| 久久99热6这里只有精品| 人妻 亚洲 视频| 中文字幕av成人在线电影| 亚洲国产欧美人成| 亚洲精品成人av观看孕妇| 国产精品人妻久久久久久| 一区二区三区精品91| 欧美一区二区亚洲| a级毛色黄片| 国产毛片在线视频| 搡女人真爽免费视频火全软件| 18禁在线无遮挡免费观看视频| 久久精品国产亚洲av天美| 成人免费观看视频高清| 日韩大片免费观看网站| 97精品久久久久久久久久精品| 少妇的逼水好多| 汤姆久久久久久久影院中文字幕| 一级毛片久久久久久久久女| 国产久久久一区二区三区| 国产精品一区二区三区四区免费观看| 在线观看一区二区三区| 欧美成人a在线观看| 精品亚洲乱码少妇综合久久| 纵有疾风起免费观看全集完整版| 国产精品女同一区二区软件| 99久久人妻综合| av.在线天堂| 免费久久久久久久精品成人欧美视频 | 国产精品伦人一区二区| 波野结衣二区三区在线| 国产男女内射视频| 国产69精品久久久久777片| 高清视频免费观看一区二区| www.色视频.com| 亚洲欧美清纯卡通| 久久亚洲国产成人精品v| 日本午夜av视频| 在线观看免费高清a一片| 国产日韩欧美亚洲二区| 久久久午夜欧美精品| 偷拍熟女少妇极品色| 久热久热在线精品观看| 天堂中文最新版在线下载| 国产精品三级大全| 18禁动态无遮挡网站| 最近中文字幕2019免费版| 亚洲av福利一区| 精品人妻熟女av久视频| 日韩成人伦理影院| 亚洲av男天堂| 国产精品一二三区在线看| 伊人久久精品亚洲午夜| 亚洲精品色激情综合| 亚洲欧美中文字幕日韩二区| 国产在线免费精品| 国产成人精品婷婷| 亚洲精品中文字幕在线视频 | 成人毛片60女人毛片免费| 精品一区在线观看国产| av线在线观看网站| 午夜日本视频在线| 日本爱情动作片www.在线观看| 亚洲av在线观看美女高潮| 亚洲欧美精品自产自拍| 国产亚洲最大av| 国产69精品久久久久777片| 国产精品一区二区三区四区免费观看| 午夜激情久久久久久久| 国产精品久久久久久久久免| 高清黄色对白视频在线免费看 | 建设人人有责人人尽责人人享有的 | 汤姆久久久久久久影院中文字幕| 精品久久久久久久末码| 亚洲精品一二三| 欧美日韩精品成人综合77777| 国模一区二区三区四区视频| 小蜜桃在线观看免费完整版高清| 视频区图区小说| 中文字幕精品免费在线观看视频 | 欧美成人a在线观看| 亚洲第一av免费看| av免费观看日本| 能在线免费看毛片的网站| 青春草视频在线免费观看| 汤姆久久久久久久影院中文字幕| 国产综合精华液| 99热这里只有精品一区| 边亲边吃奶的免费视频| 男男h啪啪无遮挡| videos熟女内射| 日韩人妻高清精品专区| 天天躁日日操中文字幕| 人人妻人人看人人澡| 在线观看一区二区三区| 少妇人妻精品综合一区二区| 欧美最新免费一区二区三区| 国产视频首页在线观看| 中文在线观看免费www的网站| 男的添女的下面高潮视频| 国产综合精华液| 老师上课跳d突然被开到最大视频| 22中文网久久字幕| 少妇猛男粗大的猛烈进出视频| tube8黄色片| 国产永久视频网站| 亚洲婷婷狠狠爱综合网| kizo精华| 少妇人妻久久综合中文| 国产精品一二三区在线看| av天堂中文字幕网| 狂野欧美激情性xxxx在线观看| 亚洲精品国产av蜜桃| 高清黄色对白视频在线免费看 | 欧美日韩亚洲高清精品| 你懂的网址亚洲精品在线观看| 欧美另类一区| 国产91av在线免费观看| 亚洲精品乱码久久久久久按摩| av在线播放精品| 少妇精品久久久久久久| 3wmmmm亚洲av在线观看| 亚洲欧美日韩另类电影网站 | 99九九线精品视频在线观看视频| 国产免费又黄又爽又色| 久久精品久久久久久噜噜老黄| 99久久精品国产国产毛片| 亚洲性久久影院| 日日撸夜夜添| 亚洲国产成人一精品久久久| freevideosex欧美| 国产精品久久久久成人av| 欧美日本视频| 欧美精品国产亚洲| 亚洲精品一区蜜桃| 亚洲欧美日韩无卡精品| 精品人妻熟女av久视频| 欧美三级亚洲精品| 欧美zozozo另类| 免费人成在线观看视频色| av免费观看日本| 国产老妇伦熟女老妇高清| 久久精品国产亚洲av涩爱| 97超视频在线观看视频| 国产精品伦人一区二区| 日韩人妻高清精品专区| 大香蕉97超碰在线| 日韩,欧美,国产一区二区三区| 午夜激情久久久久久久| 精品亚洲成a人片在线观看 | 免费黄频网站在线观看国产| 少妇被粗大猛烈的视频| 日本黄色片子视频| 91午夜精品亚洲一区二区三区| 久久 成人 亚洲| 少妇的逼水好多| 亚洲av.av天堂| 欧美丝袜亚洲另类| 久久久久久九九精品二区国产| 国产成人免费无遮挡视频| 日韩电影二区| 七月丁香在线播放| 久久久久久久大尺度免费视频| av.在线天堂| 精品少妇久久久久久888优播| 精品久久久噜噜| 久久国产乱子免费精品| 51国产日韩欧美| 国产男女超爽视频在线观看| 免费观看性生交大片5| 国产成人精品一,二区| 国产 一区精品| 色婷婷久久久亚洲欧美| 国产av码专区亚洲av| 少妇裸体淫交视频免费看高清| 亚洲三级黄色毛片| 一本色道久久久久久精品综合| 国产69精品久久久久777片| 在线看a的网站| 国产av国产精品国产| 成人一区二区视频在线观看| 亚洲欧美精品专区久久| 久久国产亚洲av麻豆专区| 少妇的逼水好多| 2022亚洲国产成人精品| 嫩草影院新地址| 国产欧美日韩精品一区二区| 国产一区亚洲一区在线观看| av在线app专区| 国产真实伦视频高清在线观看| 成年人午夜在线观看视频| 五月开心婷婷网| 国产亚洲最大av| 99热这里只有是精品50| 我的女老师完整版在线观看| 国产精品久久久久久精品古装| 人妻夜夜爽99麻豆av| 天天躁日日操中文字幕| 精品酒店卫生间| 久久ye,这里只有精品| 国产一区有黄有色的免费视频| 欧美日韩视频精品一区| 美女高潮的动态| 午夜福利网站1000一区二区三区| 日本一二三区视频观看| 国产成人精品福利久久| 久久久久人妻精品一区果冻| 成人午夜精彩视频在线观看| 又粗又硬又长又爽又黄的视频| 直男gayav资源| 日本av免费视频播放| 人妻少妇偷人精品九色| 欧美日韩一区二区视频在线观看视频在线| 久久午夜福利片| 人人妻人人爽人人添夜夜欢视频 | 亚洲欧美日韩卡通动漫| 日韩国内少妇激情av| 狂野欧美激情性xxxx在线观看| 欧美一级a爱片免费观看看| 亚洲国产av新网站| 性色av一级| 日韩一本色道免费dvd| 一本一本综合久久| 亚洲经典国产精华液单| 毛片一级片免费看久久久久| 99re6热这里在线精品视频| 成人特级av手机在线观看| 日本欧美视频一区| 99久久中文字幕三级久久日本| 久久久久久久国产电影| 哪个播放器可以免费观看大片| 熟女人妻精品中文字幕| 国产永久视频网站| 精品人妻熟女av久视频| 国内少妇人妻偷人精品xxx网站| 高清欧美精品videossex| 三级经典国产精品| 久久 成人 亚洲| 精品少妇黑人巨大在线播放| 成人影院久久| 久久亚洲国产成人精品v| 多毛熟女@视频| 精品久久久噜噜| 成人国产av品久久久| 特大巨黑吊av在线直播| 欧美日韩精品成人综合77777| 天堂俺去俺来也www色官网| 91久久精品电影网| 久久久久网色| 成人免费观看视频高清| 毛片一级片免费看久久久久| 三级经典国产精品| 好男人视频免费观看在线| www.av在线官网国产| 综合色丁香网| 伊人久久精品亚洲午夜| 精品少妇久久久久久888优播| 欧美日本视频| 天堂8中文在线网| 赤兔流量卡办理| 日韩av免费高清视频| 免费少妇av软件| 亚洲精品乱久久久久久| 最近最新中文字幕大全电影3| 国内揄拍国产精品人妻在线| 亚洲图色成人| 国产成人免费观看mmmm| 丝袜喷水一区| 亚州av有码| 高清在线视频一区二区三区| 色吧在线观看| 国产成人a区在线观看| 丰满人妻一区二区三区视频av| av线在线观看网站| 日本vs欧美在线观看视频 | 国产精品一区二区在线观看99| 日日摸夜夜添夜夜爱| 日韩国内少妇激情av| 在线观看美女被高潮喷水网站| 中国美白少妇内射xxxbb| 国产亚洲最大av| 国产av一区二区精品久久 | 国产精品麻豆人妻色哟哟久久| 高清日韩中文字幕在线| 国产成人a区在线观看| 亚州av有码| 亚洲国产毛片av蜜桃av| 国产精品人妻久久久影院| 观看免费一级毛片| 亚洲自偷自拍三级| 日韩电影二区| 91久久精品国产一区二区三区| 日韩一区二区视频免费看| 国产国拍精品亚洲av在线观看| 欧美97在线视频| 国产亚洲91精品色在线| 成人综合一区亚洲| 多毛熟女@视频| 久久久精品免费免费高清| 九色成人免费人妻av| 成人综合一区亚洲| a级毛片免费高清观看在线播放| 久久精品熟女亚洲av麻豆精品| 欧美精品国产亚洲| a级一级毛片免费在线观看| 一级a做视频免费观看| av专区在线播放| 黑人猛操日本美女一级片| 久久毛片免费看一区二区三区| 91久久精品国产一区二区三区| 国产又色又爽无遮挡免| 欧美一区二区亚洲| 黄色一级大片看看| 亚洲高清免费不卡视频| 插逼视频在线观看| av女优亚洲男人天堂| 在线观看av片永久免费下载| 国产乱来视频区| 黄片无遮挡物在线观看| 晚上一个人看的免费电影| 精品国产乱码久久久久久小说| 国产精品蜜桃在线观看| 亚洲av成人精品一二三区| 亚洲精品一区蜜桃| av又黄又爽大尺度在线免费看| 国产色婷婷99| 欧美国产精品一级二级三级 | 国产精品成人在线| 国产v大片淫在线免费观看| 一区在线观看完整版| 久久久久久久国产电影| 我的女老师完整版在线观看| 精品视频人人做人人爽| 青春草亚洲视频在线观看| 久久av网站| 久久青草综合色| 成人免费观看视频高清| 中文字幕精品免费在线观看视频 | 国产乱来视频区| 亚洲av欧美aⅴ国产| 亚洲国产最新在线播放| 日韩国内少妇激情av| 九色成人免费人妻av| 精品亚洲成国产av| 精品久久久久久久久av| 国产毛片在线视频| 午夜福利视频精品| 夜夜看夜夜爽夜夜摸| 精品一区二区三区视频在线| 蜜臀久久99精品久久宅男| 色视频www国产| 国产午夜精品久久久久久一区二区三区| 极品教师在线视频| 99久久精品热视频| 中文字幕久久专区| 美女xxoo啪啪120秒动态图| 国产一区二区三区综合在线观看 | 国产高潮美女av| 亚洲欧美日韩另类电影网站 | 在线免费观看不下载黄p国产| av播播在线观看一区| 欧美日韩亚洲高清精品| 一级毛片 在线播放| 联通29元200g的流量卡| 舔av片在线| 亚洲国产日韩一区二区| 成人无遮挡网站| 我的老师免费观看完整版| 一级黄片播放器| av免费观看日本| 国产乱人偷精品视频| 在线观看三级黄色| 日日摸夜夜添夜夜添av毛片| 高清不卡的av网站| 午夜福利在线观看免费完整高清在| 丝袜脚勾引网站| 国产黄频视频在线观看| av线在线观看网站| 一边亲一边摸免费视频| 99re6热这里在线精品视频| 国产精品久久久久久av不卡| 人妻夜夜爽99麻豆av| 麻豆乱淫一区二区| 亚洲欧洲国产日韩| 联通29元200g的流量卡| 视频中文字幕在线观看| 欧美区成人在线视频| 亚洲欧美中文字幕日韩二区| 精品人妻视频免费看| av线在线观看网站| 麻豆国产97在线/欧美| 色5月婷婷丁香| 一二三四中文在线观看免费高清| 一级毛片黄色毛片免费观看视频| 亚洲人与动物交配视频| 干丝袜人妻中文字幕| 亚洲精品日韩av片在线观看| 国产乱人偷精品视频| 国产男女内射视频| 免费看光身美女| 久久午夜福利片| 国产高潮美女av| 干丝袜人妻中文字幕| 99久久精品热视频| 人妻 亚洲 视频| 国产黄片视频在线免费观看| 精品国产露脸久久av麻豆| 精品人妻熟女av久视频| 欧美日韩精品成人综合77777| 乱码一卡2卡4卡精品| 免费av中文字幕在线| 亚洲国产日韩一区二区| 国产精品熟女久久久久浪| 国产亚洲5aaaaa淫片| 久久久久久久国产电影| 一边亲一边摸免费视频| 国产一区二区三区综合在线观看 | 在线观看免费日韩欧美大片 | 国产v大片淫在线免费观看| 亚洲av.av天堂| 国产av一区二区精品久久 | 国产伦理片在线播放av一区| 毛片一级片免费看久久久久| 午夜福利高清视频| 狠狠精品人妻久久久久久综合| 精品午夜福利在线看| 国产伦理片在线播放av一区| 亚洲精品,欧美精品| 亚洲美女搞黄在线观看| 2018国产大陆天天弄谢| 日本黄色日本黄色录像| 亚洲欧美清纯卡通| 国产精品偷伦视频观看了| 亚洲国产精品国产精品| 伦理电影免费视频| 网址你懂的国产日韩在线| 亚洲国产精品成人久久小说| 五月伊人婷婷丁香| 美女中出高潮动态图| 亚洲精品久久午夜乱码| 寂寞人妻少妇视频99o| 99热这里只有是精品在线观看| 久久久成人免费电影| 国产在线男女| 91精品国产国语对白视频| 日韩欧美 国产精品| 久久久久性生活片| 久久久久久伊人网av| 国产精品人妻久久久久久| 18禁在线无遮挡免费观看视频| 天天躁夜夜躁狠狠久久av| 中文字幕免费在线视频6| 日韩av免费高清视频| 久久久久国产网址| 丝袜脚勾引网站| 少妇丰满av| 在线观看免费视频网站a站| 女人十人毛片免费观看3o分钟| 1000部很黄的大片| 国产欧美日韩一区二区三区在线 | 日日撸夜夜添| 欧美老熟妇乱子伦牲交| 春色校园在线视频观看| 深夜a级毛片| 欧美一级a爱片免费观看看| 亚洲精品久久午夜乱码| 午夜福利网站1000一区二区三区| 中文字幕制服av| 麻豆国产97在线/欧美| 性高湖久久久久久久久免费观看| 国产黄色视频一区二区在线观看| 国产精品秋霞免费鲁丝片| 另类亚洲欧美激情| 最后的刺客免费高清国语| 免费人妻精品一区二区三区视频| 在线观看人妻少妇| 青青草视频在线视频观看| 在线天堂最新版资源| 免费在线观看成人毛片| 久久久久久伊人网av| 国产伦理片在线播放av一区| 深爱激情五月婷婷| 成年美女黄网站色视频大全免费 | 在线免费观看不下载黄p国产| 亚洲国产av新网站| 国产精品不卡视频一区二区| 亚洲欧美清纯卡通| 亚洲精品日韩av片在线观看| 国产淫语在线视频| 久久 成人 亚洲| 亚洲精品乱码久久久久久按摩| 国产乱人偷精品视频| 亚洲国产精品一区三区| 成年美女黄网站色视频大全免费 | 青春草国产在线视频| 各种免费的搞黄视频| 国产在线视频一区二区| 水蜜桃什么品种好| 99热网站在线观看| 在线精品无人区一区二区三 | av免费观看日本| 久久婷婷青草| av国产久精品久网站免费入址| 国产亚洲5aaaaa淫片| 99热这里只有是精品50| 高清不卡的av网站| 亚洲一区二区三区欧美精品| 国产在线一区二区三区精| 美女xxoo啪啪120秒动态图| 大话2 男鬼变身卡| 欧美高清性xxxxhd video| 国产精品一区二区在线不卡| 亚洲第一区二区三区不卡| 中文字幕亚洲精品专区| 伦理电影免费视频| 亚洲第一区二区三区不卡| 久久久久久久国产电影| 搡老乐熟女国产| 亚洲欧美精品自产自拍| 99热这里只有精品一区| 久久影院123| 在线看a的网站| 亚洲图色成人| 在线观看美女被高潮喷水网站| 交换朋友夫妻互换小说| 尤物成人国产欧美一区二区三区| 成人漫画全彩无遮挡| 两个人的视频大全免费| 伊人久久国产一区二区| 日本av手机在线免费观看| 天天躁夜夜躁狠狠久久av| 老女人水多毛片| 免费观看无遮挡的男女| 蜜臀久久99精品久久宅男| 日本欧美视频一区| 99久久综合免费| 深夜a级毛片| 午夜视频国产福利| 国产精品久久久久成人av| 久久精品久久久久久噜噜老黄| 欧美老熟妇乱子伦牲交| 国产片特级美女逼逼视频| 99热网站在线观看| 国产欧美亚洲国产|