{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:54:17Z","timestamp":1753275257536,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031480560"},{"type":"electronic","value":"9783031480577"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-48057-7_23","type":"book-chapter","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T06:01:30Z","timestamp":1700892090000},"page":"373-389","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Machine Learning Techniques and Privacy Concerns in Human-Computer Interactions: A Systematic Review"],"prefix":"10.1007","author":[{"given":"Jun","family":"He","sequence":"first","affiliation":[]},{"given":"Tianyu","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Vincent G.","family":"Duffy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"23_CR1","unstructured":"Abadi, M., et al.: TensorFlow: A System for Large-Scale Machine Learning (2016)"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"140699","DOI":"10.1109\/ACCESS.2020.3013541","volume":"8","author":"M Aledhari","year":"2020","unstructured":"Aledhari, M., Razzak, R., Parizi, R.M., Saeed, F.: Federated learning: a survey on enabling technologies, protocols, and applications. IEEE Access 8, 140699\u2013140725 (2020)","journal-title":"IEEE Access"},{"key":"23_CR3","doi-asserted-by":"publisher","unstructured":"Asokan, S., Duffy, V.G.: Using bibliometric analysis, ergonomic principles and a perching stool to prevent injuries in the workplace. In: Duffy, V.G., Rau, PL.P. (eds.) HCI International 2022 \u2013 Late Breaking Papers: Ergonomics and Product Design. HCII 2022. LNCS, vol. 13522. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-21704-3_2","DOI":"10.1007\/978-3-031-21704-3_2"},{"key":"23_CR4","unstructured":"Bonawitz, K., et al.: Towards federated learning at scale: System design (2019)"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Chhikara, P.: Federated learning meets human emotions: a decentralized framework for human-computer interaction for IoT applications. IEEE Internet Things J. 8 (2021)","DOI":"10.1109\/JIOT.2020.3037207"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the ACM Conference on Computer and Communications Security 2015-October, pp. 1322\u20131333 (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"23_CR7","unstructured":"Geyer, R.C., Klein, T., Nabi, M., Se, S., Zurich, E.: Differentially private federated learning: a client level perspective (2018)"},{"key":"23_CR8","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep learning (2016)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition 2016-December, pp. 770\u2013778 (2015)","DOI":"10.1109\/CVPR.2016.90"},{"key":"23_CR10","doi-asserted-by":"publisher","unstructured":"Kanade, S.G., Duffy, V.G.: A systematic literature review of game-based learning and safety management. In: Duffy, V. (eds.) Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. Human Communication, Organization and Work. HCII 2020. LNCS, vol. 12199. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49907-5_26","DOI":"10.1007\/978-3-030-49907-5_26"},{"key":"23_CR11","doi-asserted-by":"publisher","unstructured":"Kanade, S.G., Duffy, V.G.: Use of virtual reality for safety training: a systematic review. In: Duffy, V.G. (eds.) Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. Health, Operations Management, and Design. HCII 2022. LNCS, vol. 13320. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06018-2_25","DOI":"10.1007\/978-3-031-06018-2_25"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MWC.001.1900119","volume":"27","author":"J Kang","year":"2020","unstructured":"Kang, J., Xiong, Z., Niyato, D., Zou, Y., Zhang, Y., Guizani, M.: Reliable federated learning for mobile networks. IEEE Wirel. Commun. 27, 72\u201380 (2020)","journal-title":"IEEE Wirel. Commun."},{"key":"23_CR13","first-page":"137","volume":"1","author":"F Karray","year":"2008","unstructured":"Karray, F., Alemzadeh, M., Saleh, J.A., Arab, M.N.: Human-computer interaction: overview on state of the art. Int. J. Smart Sens. Intell. Syst. 1, 137\u2013159 (2008)","journal-title":"Int. J. Smart Sens. Intell. Syst."},{"key":"23_CR14","unstructured":"Kingma, D.P., Ba, J.L.: Adam: a method for stochastic optimization (2015)"},{"key":"23_CR100","unstructured":"Kone\u010dn\u00fd, J., McMahan, H.B., Yu, F.X., Richt\u00e1rik, P., Suresh, A.T., Bacon, D.: Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)."},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Lecun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 2015 521:7553 521, 436\u2013444 (2015)","DOI":"10.1038\/nature14539"},{"key":"23_CR16","unstructured":"Li, Q., et al.: A survey on federated learning systems: vision, hype and reality for data privacy and protection (2021)"},{"key":"23_CR17","first-page":"50","volume":"37","author":"T Li","year":"2019","unstructured":"Li, T., Sahu, A.K., Talwalkar, A., Smith, V.: Federated learning: challenges, methods, and future directions. IEEE Signal Process. Mag. 37, 50\u201360 (2019)","journal-title":"IEEE Signal Process. Mag."},{"key":"23_CR18","unstructured":"Li, T., Sahu, K., Talwalkar, A., Smith, V.: Distributed, streaming machine learning IEEE signal processing magazine (2020)"},{"key":"23_CR19","unstructured":"Liu, Z., Zhiwei, S.H., Wu, S., Smith, V.: On privacy and personalization in cross-silo federated learning. Advances in neural information processing systems (2022)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Margetis, G., Ntoa, S., Antona, M., Stephanidis, C.: Human-centered design of artificial intelligence. Handbook of Human Factors and Ergonomics, pp. 1085\u20131106 (2018)","DOI":"10.1002\/9781119636113.ch42"},{"key":"23_CR21","unstructured":"Martin, K.D., Murphy, P.E.: The role of data privacy in marketing (2017)"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Mendling, J., Decker, G., Reijers, H.A., Hull, R., Weber, I.: How do machine learning, robotic process automation, and blockchains affect the human factor in business process management? Commun. Assoc. Inform. Syst. 43, 19 (2018)","DOI":"10.17705\/1CAIS.04319"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Moallem, A.: Cybersecurity, privacy, and trust. Handbook of Human Factors and Ergonomics, pp. 1107\u20131120 (2021)","DOI":"10.1002\/9781119636113.ch43"},{"key":"23_CR24","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2020.10.007","volume":"115","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri, V., Parizi, R.M., Pouriyeh, S., Huang, Y., Dehghantanha, A., Srivastava, G.: A survey on security and privacy of federated learning. Futur. Gener. Comput. Syst. 115, 619\u2013640 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"23_CR25","unstructured":"National Science Foundation. NSF award search: Award 2144927 - career: Foundations of privacy- preserving collaborative (2022). Retrieved from https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=2144927&HistoricalAwards=false"},{"key":"23_CR26","unstructured":"National Science Foundation. NSF award search: Award 2145670 - career: Foundations of federated multi-task learning (2022). Retrieved from https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=2145670&HistoricalAwards=false"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Saha, S., Ahmad, T.: Federated transfer learning: concept and applications (2021)","DOI":"10.3233\/IA-200075"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Savazzi, S., Nicoli, M., Rampa, V.: Federated learning with cooperating devices: a consensus approach for massive IoT networks (2019)","DOI":"10.1109\/ICASSP40776.2020.9054055"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.; Privacy-preserving deep learning. In: Proceedings of the ACM Conference on Computer and Communications Security 2015-October, 1310\u20131321 (2015)","DOI":"10.1109\/ALLERTON.2015.7447103"},{"key":"23_CR30","unstructured":"Stanford, V.S., Chiang, C.-K., Sanjabi, M.: Federated multi-task learning (2017)"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Truex, S., et al.: A hybrid approach to privacy-preserving federated learning. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 1\u201311 (2019)","DOI":"10.1145\/3338501.3357370"},{"key":"23_CR32","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1109\/JSAC.2019.2904348","volume":"37","author":"S Wang","year":"2018","unstructured":"Wang, S., et al.: Adaptive federated learning in resource constrained edge computing systems. IEEE J. Sel. Areas Commun. 37, 1205\u20131221 (2018)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"23_CR33","first-page":"2020","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inform. Foren. Security 15, 2020 (2020)","journal-title":"IEEE Trans. Inform. Foren. Security"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Whig, P., Velu, A., Sharma, P.: Demystifying federated learning for blockchain: a case study. Demystifying Federated Learning for Blockchain and Industrial Internet of Things, pp. 94\u2013122 (2022)","DOI":"10.4018\/978-1-6684-3733-9.ch006"},{"key":"23_CR35","doi-asserted-by":"crossref","unstructured":"Wu, Y., Cai, S., Xiao, X., Chen, G., Ooi, C.: Privacy preserving vertical federated learning for tree-based models [technical report] (2020)","DOI":"10.14778\/3407790.3407811"},{"key":"23_CR36","doi-asserted-by":"crossref","unstructured":"Xu, J., et al.: Federated learning for healthcare informatics. J. Healthcare Inform. Res. 5 (2019)","DOI":"10.1007\/s41666-020-00082-4"},{"key":"23_CR37","doi-asserted-by":"crossref","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. 10, 19 (2019)","DOI":"10.1145\/3298981"},{"key":"23_CR38","doi-asserted-by":"crossref","unstructured":"Zhan, Y., Zhang, J., Hong, Z., Wu, L., Li, P., Guo, S.: A survey of incentive mechanism design for federated learning (2021)","DOI":"10.1109\/TETC.2021.3063517"},{"key":"23_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Makarov, S., Ren, X., Lion, D., Yuan, D.: Pensieve: Non-intrusive failure reproduction for distributed systems using the event chaining approach. In: SOSP 2017 - Proceedings of the 26th ACM Symposium on Operating Systems Principles, pp. 19\u201333 (2017)","DOI":"10.1145\/3132747.3132768"},{"key":"23_CR40","unstructured":"Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., Chandra, V.: Federated learning with non-iid data (2018)"},{"key":"23_CR41","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.1109\/JIOT.2020.3017377","volume":"8","author":"Y Zhao","year":"2019","unstructured":"Zhao, Y., et al.: Privacy-preserving blockchain-based federated learning for IoT devices. IEEE Internet Things J. 8, 1817\u20131829 (2019)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","HCI International 2023 \u2013 Late Breaking Papers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-48057-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T06:05:22Z","timestamp":1700892322000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-48057-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031480560","9783031480577"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-48057-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7472","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1578","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"396","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}