DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks

A Boutet, C Frindel, S Gambs, T Jourdan… - Proceedings of the …, 2021 - dl.acm.org
With the widespread development of the quantified-self movement, an increasing number of
users rely on mobile applications to monitor their physical activity through their smartphones …

Latent representation learning and manipulation for privacy-preserving sensor data analytics

O Hajihassani, O Ardakanian… - 2020 IEEE Second …, 2020 - ieeexplore.ieee.org
The rapid deployment of sensor systems in homes and work environments, and new
applications of machine learning at the edge have posed an enormous and unprecedented …

Deeprotect: Enabling inference-based access control on mobile sensing applications

C Liu, S Chakraborty, P Mittal - arXiv preprint arXiv:1702.06159, 2017 - arxiv.org
Personal sensory data is used by context-aware mobile applications to provide utility.
However, the same data can also be used by an adversary to make sensitive inferences …

[PDF][PDF] Protecting sensitive attributes via generative adversarial networks

A Rezaei, C Xiao, J Gao, B Li - arXiv preprint arXiv:1812.10193, 2018 - researchgate.net
Recent advances in computing have allowed for the possibility to collect large amounts of
data on personal activities and private living spaces. Collecting and publishing a dataset in …

Replacement autoencoder: A privacy-preserving algorithm for sensory data analysis

M Malekzadeh, RG Clegg, H Haddadi - arXiv preprint arXiv:1710.06564, 2017 - arxiv.org
An increasing number of sensors on mobile, Internet of things (IoT), and wearable devices
generate time-series measurements of physical activities. Though access to the sensory …

Collective protection: Preventing sensitive inferences via integrative transformation

D Zhang, L Yao, K Chen, G Long… - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
Sharing ubiquitous mobile sensor data, especially physiological data, raises potential risks
of leaking physical and demographic information that can be inferred from the time series …

[PDF][PDF] Privacy Issues Regarding the Application of DNNs to Activity-Recognition using Wearables and Its Countermeasures by Use of Adversarial Training.

Y Iwasawa, K Nakayama, I Yairi, Y Matsuo - IJCAI, 2017 - ijcai.org
Deep neural networks have been successfully applied to activity recognition with wearables
in terms of recognition performance. However, the black-box nature of neural networks could …

Privacy-preserving machine learning based data analytics on edge devices

J Zhao, R Mortier, J Crowcroft, L Wang - Proceedings of the 2018 AAAI …, 2018 - dl.acm.org
Emerging Machine Learning (ML) techniques, such as Deep Neural Network, are widely
used in today's applications and services. However, with social awareness of privacy and …

Wristprint: Characterizing user re-identification risks from wrist-worn accelerometry data

N Saleheen, MA Ullah, S Chakraborty… - Proceedings of the …, 2021 - dl.acm.org
Public release of wrist-worn motion sensor data is growing. They enable and accelerate
research in developing new algorithms to passively track daily activities, resulting in …

Privacy protection of grid users data with blockchain and adversarial machine learning

I Yilmaz, K Kapoor, A Siraj, M Abouyoussef - proceedings of the 2021 …, 2021 - dl.acm.org
Utilities around the world are reported to invest a total of around $30 billion over the next few
years for installation of more than 300 million smart meters, replacing traditional analog …