{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T14:38:49Z","timestamp":1776868729598,"version":"3.51.2"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,3,21]],"date-time":"2021-03-21T00:00:00Z","timestamp":1616284800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,3,21]],"date-time":"2021-03-21T00:00:00Z","timestamp":1616284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672135"],"award-info":[{"award-number":["61672135"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2023,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Human activity recognition (HAR) generates a massive amount of the dataset from the Internet of Things (IoT) devices, to enable multiple data providers to jointly produce predictive models for medical diagnosis. That the accuracy of the models is greatly improved when trained on a large number of datasets from these data providers on the untrusted cloud server is very significant and raises privacy concerns. With the migration of a deep neural network (DNN) in the learning experience in HAR, we present a privacy-preserving DNN model known as Multi-Scheme Differential Privacy (MSDP) depending on the fusion of Secure Multi-party Computation (SMC) and <jats:italic>\ud835\udf16<\/jats:italic>-differential privacy, making it very practical since existing proposals are unable to make all the fully homomorphic encryption multi-key which is very impracticable. MSDP inputs a secure multi-party alternative to the ReLU function to reduce the communication and computational cost at a minimal level. With the aid of experimental verification on the four of the most widely used human activity recognition datasets, MSDP demonstrates superior performance with very good generalization performance and is proven to be secure as compared with existing ultramodern models without breach of privacy.<\/jats:p>","DOI":"10.1007\/s00779-021-01545-0","type":"journal-article","created":{"date-parts":[[2021,3,21]],"date-time":"2021-03-21T07:02:10Z","timestamp":1616310130000},"page":"221-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["MSDP: multi-scheme privacy-preserving deep learning via differential privacy"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6943-2288","authenticated-orcid":false,"given":"Kwabena","family":"Owusu-Agyemeng","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Hu","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tianming","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Zhiguang","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,21]]},"reference":[{"key":"1545_CR1","doi-asserted-by":"publisher","unstructured":"Zhang N, Yang P, Ren J, Chen D, Li Y, Shen X (2018) Synergy of big data and 5G wireless networks: opportunities, approaches, and challenges. IEEE Wireless Communications. https:\/\/doi.org\/10.1109\/MWC.2018.1700193","DOI":"10.1109\/MWC.2018.1700193"},{"key":"1545_CR2","doi-asserted-by":"publisher","unstructured":"Zhang N, Yang P, Zhang S, Chen D, Zhuang W, Liang B, Shen XS (2017) Software defined networking enabled wireless network virtualization: Challenges and solutions. IEEE Network. https:\/\/doi.org\/10.1109\/MNET.2017.1600248","DOI":"10.1109\/MNET.2017.1600248"},{"key":"1545_CR3","doi-asserted-by":"publisher","unstructured":"Chen D, Zhang N, Qin Z, Mao X, Qin Z, Shen X, Li XY (2017) S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2016.2619679","DOI":"10.1109\/JIOT.2016.2619679"},{"key":"1545_CR4","doi-asserted-by":"publisher","unstructured":"Qin Z, Hu L, Zhang N, Chen D, Zhang K, Qin Z, Choo KKR (2019) Learning-aided user identification using smartphone sensors for smart homes. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2019.2900862","DOI":"10.1109\/JIOT.2019.2900862"},{"key":"1545_CR5","doi-asserted-by":"publisher","unstructured":"Qin Z, Wang Y, Cheng H, Zhou Y, Sheng Z, Leung VCM (2018) Demographic information prediction: a portrait of smartphone application users. IEEE Transactions on Emerging Topics in Computing. https:\/\/doi.org\/10.1109\/TETC.2016.2570603","DOI":"10.1109\/TETC.2016.2570603"},{"key":"1545_CR6","doi-asserted-by":"publisher","unstructured":"Freundlich RE, Freundlich KL, Drolet BC (2018) Pagers, Smartphones, and HIPAA: finding the best solution for electronic communication of protected health information. Journal of Medical Systems. https:\/\/doi.org\/10.1007\/s10916-017-0870-9","DOI":"10.1007\/s10916-017-0870-9"},{"key":"1545_CR7","unstructured":"Wagh S, Gupta D, Nishanth C (2018) SecureNN: efficient and private neural network training. IACR Cryptology EPrint Archive"},{"key":"1545_CR8","doi-asserted-by":"publisher","unstructured":"Mohassel P, Zhang Y (2017) SecureML: a system for scalable privacy-preserving machine learning. In: Proceedings - IEEE symposium on security and privacy. https:\/\/doi.org\/10.1109\/SP.2017.12","DOI":"10.1109\/SP.2017.12"},{"key":"1545_CR9","doi-asserted-by":"publisher","unstructured":"Yin C, Xi J, Sun R, Wang J (2018) Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Transactions on Industrial Informatics. https:\/\/doi.org\/10.1109\/TII.2017.2773646","DOI":"10.1109\/TII.2017.2773646"},{"key":"1545_CR10","doi-asserted-by":"publisher","unstructured":"Xiong H, Qian M, Yanan Z (2020) Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Systems Journal. https:\/\/doi.org\/10.1109\/JSYST.2018.2890126","DOI":"10.1109\/JSYST.2018.2890126"},{"key":"1545_CR11","doi-asserted-by":"publisher","unstructured":"Chen D, Zhang N, Lu R, Fang X, Zhang K, Qin Z, Shen X (2018) An LDPC code based physical layer message authentication scheme with prefect security. IEEE Journal on Selected Areas in Communications. https:\/\/doi.org\/10.1109\/JSAC.2018.2825079","DOI":"10.1109\/JSAC.2018.2825079"},{"key":"1545_CR12","doi-asserted-by":"publisher","unstructured":"Cheng X, Tang P, Su S, Chen R, Wu Z, Zhu B (2020) Multi-party high-dimensional data publishing under differential privacy. IEEE Transactions on Knowledge and Data Engineering. https:\/\/doi.org\/10.1109\/TKDE.2019.2906610","DOI":"10.1109\/TKDE.2019.2906610"},{"key":"1545_CR13","doi-asserted-by":"publisher","unstructured":"Cui L, Qu Y, Nosouhi MR , Yu S, Niu J, Xie G (2019) Improving data utility through game theory in personalized differential privacy. Journal of Computer Science and Technology. https:\/\/doi.org\/10.1007\/s11390-019-1910-3","DOI":"10.1007\/s11390-019-1910-3"},{"key":"1545_CR14","doi-asserted-by":"publisher","unstructured":"Li P, Ye H, Li J (2017) Multi-party security computation with differential privacy over outsourced data. Security, Privacy and Anonymity in Computation, Communication, and Storage China. https:\/\/doi.org\/10.1007\/978-3-319-72389-1-39","DOI":"10.1007\/978-3-319-72389-1-39"},{"key":"1545_CR15","doi-asserted-by":"publisher","unstructured":"Bogdanov D, Laur S, Willemson J (2008) Sharemind: a framework for fast privacy-preserving computations. https:\/\/doi.org\/10.1007\/978-3-540-88313-5-13","DOI":"10.1007\/978-3-540-88313-5-13"},{"key":"1545_CR16","doi-asserted-by":"publisher","unstructured":"Bogdanov D, Niitsoo M, Toft T, Willemson J (2012) High-performance secure multi-party computation for data mining applications. International Journal of Information Security. https:\/\/doi.org\/10.1007\/s10207-012-0177-2","DOI":"10.1007\/s10207-012-0177-2"},{"key":"1545_CR17","doi-asserted-by":"publisher","unstructured":"Pettai M, Laud P (2015) Combining differential privacy and secure multiparty computation. In: ACM International conference proceeding series. https:\/\/doi.org\/10.1145\/2818000.2818027","DOI":"10.1145\/2818000.2818027"},{"key":"1545_CR18","doi-asserted-by":"publisher","unstructured":"Goryczka S, Xiong L (2017) A comprehensive comparison of multiparty secure additions with differential privacy. IEEE Transactions on Dependable and Secure Computing. https:\/\/doi.org\/10.1109\/TDSC.2015.2484326","DOI":"10.1109\/TDSC.2015.2484326"},{"key":"1545_CR19","doi-asserted-by":"publisher","unstructured":"Roggen D, Calatroni A, Rossi M, Holleczek T, F\u00f6rster K, Tr\u00f6ster G, Lukowicz P, Bannach D, Pirkl G, Ferscha A, Doppler J, Holzmann C, Kurz M, Holl G, Chavarriaga R, Sagha H, Bayati H , Creatura M, Mill\u00e1n JR (2010) Collecting complex activity datasets in highly rich networked sensor environments. INSS 2010 - 7th International Conference on Networked Sensing Systems. https:\/\/doi.org\/10.1109\/INSS.2010.5573462","DOI":"10.1109\/INSS.2010.5573462"},{"key":"1545_CR20","doi-asserted-by":"publisher","unstructured":"Reiss A, Stricker D (2012) Introducing a new benchmarked dataset for activity monitoring. proceedings - international symposium on wearable computers, ISWC. https:\/\/doi.org\/10.1109\/ISWC.2012.13","DOI":"10.1109\/ISWC.2012.13"},{"key":"1545_CR21","unstructured":"Anguita D, Ghio A, Oneto L, Parra X, Reyes-Ortiz JL (2013) A public domain dataset for human activity recognition using smartphones. In: ESANN 2013 proceedings, 21st european symposium on artificial neural networks, computational intelligence and machine learning"},{"issue":"1","key":"1545_CR22","first-page":"91","volume":"21","author":"A El-Yahyaoui","year":"2019","unstructured":"El-Yahyaoui A, Kettani MDECE (2019) An efficient fully homomorphic encryption scheme. Int. J. Netw. Secur. 21(1):91\u201399. [Online]. Available: http:\/\/ijns.femto.com.tw\/contents\/ijns-v21-n1\/ijns-2019-v21-n1-p91-99.pdf","journal-title":"Int. J. Netw. Secur."},{"key":"1545_CR23","doi-asserted-by":"publisher","unstructured":"Hoffstein J., Pipher J, Silverman JH (1998) NTRU: a ring-based public key cryptosystem. In: Algorithmic number theory, third international symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings pp 267\u2013288. https:\/\/doi.org\/10.1007\/BFb0054868","DOI":"10.1007\/BFb0054868"},{"key":"1545_CR24","doi-asserted-by":"publisher","unstructured":"L\u00f3pez-Alt A, Tromer E, Vaikuntanathan V (2012) On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the 44th symposium on theory of computing conference, STOC 2012, New York, NY, USA, May 19 - 22, 2012, pp 1219\u20131234. https:\/\/doi.org\/10.1145\/2213977.2214086","DOI":"10.1145\/2213977.2214086"},{"key":"1545_CR25","doi-asserted-by":"publisher","unstructured":"Dwork C (2010) Differential privacy in new settings. In: Proc. 21st annu. ACM-SIAM symp. discret. algorithms. pp 174\u2013183. https:\/\/doi.org\/10.2307\/2374806","DOI":"10.2307\/2374806"},{"key":"1545_CR26","doi-asserted-by":"publisher","unstructured":"Mukherjee P, Wichs D (2016) Two round multiparty computation via multi-key FHE. In: Advances in cryptology - EUROCRYPT 2016 - 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8-12. Proceedings, Part II, 2016, 9666, pp 735\u2013763. https:\/\/doi.org\/10.1007\/978-3-662-49896-5-26","DOI":"10.1007\/978-3-662-49896-5-26"},{"key":"1545_CR27","unstructured":"Mukherjee P, Wichs D (2015) Two round MPC from LWE via multi-key FHE. IACR Cryptol. ePrint Arch., 2015, 345. [Online]. Available: http:\/\/eprint.iacr.org\/2015\/345"},{"key":"1545_CR28","doi-asserted-by":"publisher","first-page":"117354","DOI":"10.1109\/ACCESS.2020.3004711","volume":"8","author":"KA Abuhasel","year":"2020","unstructured":"Abuhasel KA, Khan MA (2020) A secure industrial internet of things (IIot) framework for resource management in smart manufacturing. IEEE Access 8:117354\u2013117364. https:\/\/doi.org\/10.1109\/ACCESS.2020.3004711","journal-title":"IEEE Access"},{"key":"1545_CR29","doi-asserted-by":"publisher","first-page":"27468","DOI":"10.1109\/ACCESS.2020.2971654","volume":"8","author":"K Wei","year":"2020","unstructured":"Wei K, Zhang L, Yi G, Jiang X (2020) Health monitoring based on internet of medical things: architecture, enabling technologies, and applications. IEEE Access 8:27468\u201327478. https:\/\/doi.org\/10.1109\/ACCESS.2020.2971654","journal-title":"IEEE Access"},{"key":"1545_CR30","doi-asserted-by":"crossref","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on theory of computing","DOI":"10.1145\/1536414.1536440"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01545-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-021-01545-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01545-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T10:08:27Z","timestamp":1681898907000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-021-01545-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,21]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["1545"],"URL":"https:\/\/doi.org\/10.1007\/s00779-021-01545-0","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,21]]},"assertion":[{"value":"14 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}