{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:13:19Z","timestamp":1776107599860,"version":"3.50.1"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100012352","name":"Universit\u00e0 degli Studi di Milano","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100012352","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2022,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>One of the major open problems in sensor-based Human Activity Recognition (HAR) is the scarcity of labeled data. Among the many solutions to address this challenge, semi-supervised learning approaches represent a promising direction. However, their centralized architecture incurs in the scalability and privacy problems that arise when the process involves a large number of users. Federated learning (FL) is a promising paradigm to address these problems. However, the FL methods that have been proposed for HAR assume that the participating users can always obtain labels to train their local models (i.e., they assume a fully supervised setting). In this work, we propose FedAR: a novel hybrid method for HAR that combines semi-supervised and federated learning to take advantage of the strengths of both approaches. FedAR combines active learning and label propagation to semi-automatically annotate the local streams of unlabeled sensor data, and it relies on FL to build a global activity model in a scalable and privacy-aware fashion. FedAR also includes a transfer learning strategy to fine-tune the global model on each user. We evaluated our method on two public datasets, showing that FedAR reaches recognition rates and personalization capabilities similar to state-of-the-art FL supervised approaches. As a major advantage, FedAR only requires a very limited number of annotated data to populate a pre-trained model and a small number of active learning questions that quickly decrease while using the system, leading to an effective and scalable solution for the data scarcity problem of HAR.<\/jats:p>","DOI":"10.1007\/s00779-022-01688-8","type":"journal-article","created":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T23:02:53Z","timestamp":1656025373000},"page":"1281-1298","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Semi-supervised and personalized federated activity recognition based on active learning and label propagation"],"prefix":"10.1007","volume":"26","author":[{"given":"Riccardo","family":"Presotto","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8247-2524","authenticated-orcid":false,"given":"Gabriele","family":"Civitarese","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Bettini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,23]]},"reference":[{"issue":"3","key":"1688_CR1","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1109\/SURV.2012.110112.00192","volume":"15","author":"OD Lara","year":"2013","unstructured":"Lara OD, Labrador MA et al (2013) A survey on human activity recognition using wearable sensors. IEEE Communications Surveys and Tutorials 15(3):1192\u20131209","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"3","key":"1688_CR2","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/s10115-013-0665-3","volume":"36","author":"DJ Cook","year":"2013","unstructured":"Cook DJ, Feuz KD, Krishnan NC (2013) Transfer learning for activity recognition: A survey. Knowledge and Information Systems 36(3):537\u2013556","journal-title":"Knowledge and Information Systems"},{"issue":"4","key":"1688_CR3","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/3158645","volume":"51","author":"ZS Abdallah","year":"2018","unstructured":"Abdallah ZS, Gaber MM, Srinivasan B, Krishnaswamy S (2018) Activity recognition with evolving data streams: A review. ACM Computing Surveys (CSUR) 51(4):71","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"1688_CR4","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.pmcj.2014.09.010","volume":"17","author":"C Bettini","year":"2015","unstructured":"Bettini C, Riboni D (2015) Privacy protection in pervasive systems: State of the art and technical challenges. Pervasive and Mobile Computing 17:159\u2013174","journal-title":"Pervasive and Mobile Computing"},{"key":"1688_CR5","unstructured":"Weiss GM, Lockhart J (2012) The impact of personalization on smartphone-based activity recognition. In: Workshops at the twenty-sixth AAAI conference on artificial intelligence. Citeseer"},{"key":"1688_CR6","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics. pp 1273\u20131282. PMLR"},{"issue":"2","key":"1688_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 10(2):1\u201319","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"1688_CR8","doi-asserted-by":"crossref","unstructured":"Chen Y, Qin X, Wang J, Yu C, Gao W (2020) Fedhealth: A federated transfer learning framework for wearable healthcare. IEEE Intell Syst","DOI":"10.1109\/MIS.2020.2988604"},{"key":"1688_CR9","unstructured":"Kairouz P, McMahan HB, Avent B, Bellet A, Bennis M, Bhagoji AN, Bonawitz K, Charles Z, Cormode G, Cummings R et al (2019) Advances and open problems in federated learning. arXiv:1912.04977"},{"key":"1688_CR10","unstructured":"Hard A, Rao K, Mathews R, Ramaswamy S, Beaufays F, Augenstein S, Eichner H, Kiddon C, Ramage D (2018) Federated learning for mobile keyboard prediction. arXiv:1811.03604"},{"key":"1688_CR11","doi-asserted-by":"crossref","unstructured":"Ek S, Portet F, Lalanda P, Vega G (2020) Evaluation of federated learning aggregation algorithms: application to human activity recognition. In: Adjunct proceedings of the 2020 ACM international joint conference on pervasive and ubiquitous computing and proceedings of the 2020 ACM international symposium on wearable computers. pp 638\u2013643","DOI":"10.1145\/3410530.3414321"},{"issue":"2","key":"1688_CR12","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/1964897.1964918","volume":"12","author":"JR Kwapisz","year":"2011","unstructured":"Kwapisz JR, Weiss GM, Moore SA (2011) Activity recognition using cell phone accelerometers. ACM SigKDD Explorations Newsletter 12(2):74\u201382","journal-title":"ACM SigKDD Explorations Newsletter"},{"issue":"1","key":"1688_CR13","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/s11036-008-0112-y","volume":"14","author":"N Gy\u00f6rb\u00edr\u00f3","year":"2009","unstructured":"Gy\u00f6rb\u00edr\u00f3 N, F\u00e1bi\u00e1n \u00c1, Hom\u00e1nyi G (2009) An activity recognition system for mobile phones. Mobile Networks and Applications 14(1):82\u201391","journal-title":"Mobile Networks and Applications"},{"key":"1688_CR14","doi-asserted-by":"crossref","unstructured":"Sun L, Zhang D, Li B, Guo B, Li S (2010) Activity recognition on an accelerometer embedded mobile phone with varying positions and orientations. In: International conference on ubiquitous intelligence and computing. Springer, pp 548\u2013562","DOI":"10.1007\/978-3-642-16355-5_42"},{"key":"1688_CR15","doi-asserted-by":"crossref","unstructured":"Bao L, Intille SS (2004) Activity recognition from user-annotated acceleration data. In: Pervasive computing: Second international conference, PERVASIVE 2004, Linz\/Vienna, Austria, April 21-23, 2004. Proceedings. Springer, pp 1\u201317","DOI":"10.1007\/978-3-540-24646-6_1"},{"issue":"3","key":"1688_CR16","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/2499621","volume":"46","author":"A Bulling","year":"2014","unstructured":"Bulling A, Blanke U, Schiele B (2014) A tutorial on human activity recognition using body-worn inertial sensors. ACM Computing Surveys 46(3):33\u201313333","journal-title":"ACM Computing Surveys"},{"issue":"14","key":"1688_CR17","doi-asserted-by":"publisher","first-page":"6067","DOI":"10.1016\/j.eswa.2014.04.037","volume":"41","author":"Y Kwon","year":"2014","unstructured":"Kwon Y, Kang K, Bae C (2014) Unsupervised learning for human activity recognition using smartphone sensors. Expert Systems with Applications 41(14):6067\u20136074","journal-title":"Expert Systems with Applications"},{"key":"1688_CR18","doi-asserted-by":"crossref","unstructured":"Chen L, Nugent C (2009) Ontology-based activity recognition in intelligent pervasive environments. Int J Web Inf Syst","DOI":"10.1108\/17440080911006199"},{"issue":"1","key":"1688_CR19","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/TKDE.2019.2930050","volume":"33","author":"G Civitarese","year":"2019","unstructured":"Civitarese G, Sztyler T, Riboni D, Bettini C, Stuckenschmidt H (2019) Polaris: Probabilistic and ontological activity recognition in smart-homes. IEEE Transactions on Knowledge and Data Engineering 33(1):209\u2013223","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1688_CR20","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) Smote: synthetic minority over-sampling technique. Journal of Artificial Intelligence Research 16:321\u2013357","journal-title":"Journal of Artificial Intelligence Research"},{"key":"1688_CR21","doi-asserted-by":"publisher","first-page":"100944","DOI":"10.1016\/j.aei.2019.100944","volume":"42","author":"KM Rashid","year":"2019","unstructured":"Rashid KM, Louis J (2019) Times-series data augmentation and deep learning for construction equipment activity recognition. Advanced Engineering Informatics 42:100944","journal-title":"Advanced Engineering Informatics"},{"key":"1688_CR22","doi-asserted-by":"crossref","unstructured":"Wang J, Chen Y, Gu Y, Xiao Y, Pan H (2018) Sensorygans: An effective generative adversarial framework for sensor-based human activity recognition. In: 2018 International joint conference on neural networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN.2018.8489106"},{"key":"1688_CR23","doi-asserted-by":"crossref","unstructured":"Chan MH, Noor MHM (2020) A unified generative model using generative adversarial network for activity recognition. J Ambient Intell Humanized Comput, 1\u201310","DOI":"10.1007\/s12652-020-02548-0"},{"issue":"3","key":"1688_CR24","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/s10115-013-0665-3","volume":"36","author":"D Cook","year":"2013","unstructured":"Cook D, Feuz KD, Krishnan NC (2013) Transfer learning for activity recognition: A survey. Knowledge and Information Systems 36(3):537\u2013556","journal-title":"Knowledge and Information Systems"},{"key":"1688_CR25","doi-asserted-by":"crossref","unstructured":"Wang J, Zheng VW, Chen Y, Huang M (2018) Deep transfer learning for cross-domain activity recognition. In: Proceedings of the 3rd international conference on crowd science and engineering. pp 1\u20138","DOI":"10.1145\/3265689.3265705"},{"key":"1688_CR26","doi-asserted-by":"publisher","first-page":"19421","DOI":"10.1109\/ACCESS.2021.3053704","volume":"9","author":"AR Sanabria","year":"2021","unstructured":"Sanabria AR, Zambonelli F, Ye J (2021) Unsupervised domain adaptation in activity recognition: A gan-based approach. IEEE Access 9:19421\u201319438","journal-title":"IEEE Access"},{"key":"1688_CR27","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.neucom.2020.10.056","volume":"426","author":"E Soleimani","year":"2021","unstructured":"Soleimani E, Nazerfard E (2021) Cross-subject transfer learning in human activity recognition systems using generative adversarial networks. Neurocomputing 426:26\u201334","journal-title":"Neurocomputing"},{"key":"1688_CR28","doi-asserted-by":"crossref","unstructured":"Stikic M, Van Laerhoven K, Schiele B (2008) Exploring semi-supervised and active learning for activity recognition. In: 2008 12th IEEE international symposium on wearable computers. IEEE, pp 81\u201388","DOI":"10.1109\/ISWC.2008.4911590"},{"key":"1688_CR29","doi-asserted-by":"crossref","unstructured":"Guan D, Yuan W, Lee Y-K., Gavrilov A, Lee S (2007) Activity recognition based on semi-supervised learning. In: 13th IEEE international conference on embedded and real-time computing systems and applications, 2007. RTCSA 2007. IEEE, pp 469\u2013475","DOI":"10.1109\/RTCSA.2007.17"},{"key":"1688_CR30","doi-asserted-by":"crossref","unstructured":"Longstaff B, Reddy S, Estrin D (2010) Improving activity classification for health applications on mobile devices using active and semi-supervised learning. In: Pervasive computing technologies for Healthcare (PervasiveHealth), 2010 4th International Conference on Pervasive Computing Technologies for Healthcare. IEEE, pp 1\u20137","DOI":"10.4108\/ICST.PERVASIVEHEALTH2010.8851"},{"key":"1688_CR31","doi-asserted-by":"crossref","unstructured":"Stikic M, Larlus D, Schiele B (2009) Multi-graph based semi-supervised learning for activity recognition. In: 2009 International symposium on wearable computers. IEEE, pp 85\u201392","DOI":"10.1109\/ISWC.2009.24"},{"key":"1688_CR32","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.neucom.2013.05.044","volume":"126","author":"Y-S Lee","year":"2014","unstructured":"Lee Y-S, Cho S-B (2014) Activity recognition with android phone using mixture-of-experts co-trained with labeled and unlabeled data. Neurocomputing 126:106\u2013115","journal-title":"Neurocomputing"},{"key":"1688_CR33","doi-asserted-by":"crossref","unstructured":"Miu T, Missier P, Pl\u00f6tz T (2015) Bootstrapping personalised human activity recognition models using online active learning. In: 2015 IEEE international conference on computer and information technology; Ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing. IEEE, pp 1138\u20131147","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.170"},{"key":"1688_CR34","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.neucom.2014.09.074","volume":"150","author":"ZS Abdallah","year":"2015","unstructured":"Abdallah ZS, Gaber MM, Srinivasan B, Krishnaswamy S (2015) Adaptive mobile activity recognition system with evolving data streams. Neurocomputing 150:304\u2013317","journal-title":"Neurocomputing"},{"key":"1688_CR35","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.pmcj.2016.08.017","volume":"38","author":"HS Hossain","year":"2017","unstructured":"Hossain HS, Khan MAAH, Roy N (2017) Active learning enabled activity recognition. Pervasive and Mobile Computing 38:312\u2013330","journal-title":"Pervasive and Mobile Computing"},{"key":"1688_CR36","unstructured":"Nguyen KT, Portet F, Garbay C (2018) Dealing with imbalanced data sets for human activity recognition using mobile phone sensors. In: 3rd international workshop on smart sensing systems"},{"key":"1688_CR37","doi-asserted-by":"publisher","first-page":"105816","DOI":"10.1016\/j.knosys.2020.105816","volume":"196","author":"C Bettini","year":"2020","unstructured":"Bettini C, Civitarese G, Presotto R (2020) Caviar: Context-driven active and incremental activity recognition. Knowledge-Based Systems 196:105816","journal-title":"Knowledge-Based Systems"},{"key":"1688_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7","volume-title":"The eu general data protection regulation (gdpr). A Practical Guide","author":"P Voigt","year":"2017","unstructured":"Voigt P, Von dem Bussche A (2017) The eu general data protection regulation (gdpr). A Practical Guide, 1st edn. Springer International Publishing, Cham","edition":"1"},{"key":"1688_CR39","doi-asserted-by":"crossref","unstructured":"Samarati P (2014) Data security and privacy in the cloud. In: International conference on information security practice and experience. Springer, pp 28\u201341","DOI":"10.1007\/978-3-319-06320-1_4"},{"key":"1688_CR40","unstructured":"Kone\u010dn\u1ef3 J, McMahan HB, Yu FX, Richt\u00e1rik P, Suresh AT, Bacon D (2016) Federated learning: Strategies for improving communication efficiency. arXiv:1610.05492"},{"key":"1688_CR41","doi-asserted-by":"crossref","unstructured":"Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. pp 1175\u20131191","DOI":"10.1145\/3133956.3133982"},{"key":"1688_CR42","doi-asserted-by":"crossref","unstructured":"Damaskinos G, Guerraoui R, Kermarrec A-M, Nitu V, Patra R, Taiani F (2020) Fleet: Online federated learning via staleness awareness and performance prediction. In: Proceedings of the 21st international middleware conference. pp 163\u2013177","DOI":"10.1145\/3423211.3425685"},{"key":"1688_CR43","unstructured":"Fallah A, Mokhtari A, Ozdaglar A (2020) Personalized federated learning: A meta-learning approach. arXiv:2002.07948"},{"key":"1688_CR44","doi-asserted-by":"crossref","unstructured":"Ek S, Portet F, Lalanda P, Vega G (2021) A federated learning aggregation algorithm for pervasive computing: Evaluation and comparison. In: 19th IEEE international conference on pervasive computing and communications PerCom 2021","DOI":"10.1109\/PERCOM50583.2021.9439129"},{"key":"1688_CR45","doi-asserted-by":"crossref","unstructured":"Sozinov K, Vlassov V, Girdzijauskas S (2018) Human activity recognition using federated learning. In: 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA\/IUCC\/BDCloud\/SocialCom\/SustainCom). IEEE pp 1103\u20131111","DOI":"10.1109\/BDCloud.2018.00164"},{"key":"1688_CR46","doi-asserted-by":"crossref","unstructured":"Wu Q, He K, Chen X (2020) Personalized federated learning for intelligent iot applications: A cloud-edge based framework. IEEE Computer Graphics Appl","DOI":"10.1109\/OJCS.2020.2993259"},{"key":"1688_CR47","unstructured":"Zhao Y, Liu H, Li H, Barnaghi P, Haddadi H (2020) Semi-supervised federated learning for activity recognition. arXiv:2011.00851"},{"key":"1688_CR48","unstructured":"Wu Q, Chen X, Zhou Z, Zhang J (2020) Fedhome: Cloud-edge based personalized federated learning for in-home health monitoring. IEEE Trans Mob Comput"},{"key":"1688_CR49","doi-asserted-by":"crossref","unstructured":"Lee S, Zheng X, Hua J, Vikalo H, Julien C (2021) Opportunistic federated learning: An exploration of egocentric collaboration for pervasive computing applications. In: 2021 IEEE international conference on pervasive computing and communications (PerCom). IEEE, pp 1\u20138","DOI":"10.1109\/PERCOM50583.2021.9439130"},{"issue":"20","key":"1688_CR50","doi-asserted-by":"publisher","first-page":"6743","DOI":"10.3390\/s21206743","volume":"21","author":"V Kelli","year":"2021","unstructured":"Kelli V, Argyriou V, Lagkas T, Fragulis G, Grigoriou E, Sarigiannidis P (2021) Ids for industrial applications: a federated learning approach with active personalization. Sensors 21(20):6743","journal-title":"Sensors"},{"issue":"2","key":"1688_CR51","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1109\/JIOT.2020.3009358","volume":"8","author":"A Saeed","year":"2020","unstructured":"Saeed A, Salim FD, Ozcelebi T, Lukkien J (2020) Federated self-supervised learning of multisensor representations for embedded intelligence. IEEE Internet of Things Journal 8(2):1030\u20131040","journal-title":"IEEE Internet of Things Journal"},{"key":"1688_CR52","doi-asserted-by":"crossref","unstructured":"Yu H, Chen Z, Zhang X, Chen X, Zhuang F, Xiong H, Cheng X (2021) Fedhar: Semi-supervised online learning for personalized federated human activity recognition. IEEE Trans Mob Comput","DOI":"10.1109\/TMC.2021.3136853"},{"key":"1688_CR53","unstructured":"Arivazhagan MG, Aggarwal V, Singh AK, Choudhary S (2019) Federated learning with personalization layers. arXiv:1912.00818"},{"key":"1688_CR54","doi-asserted-by":"crossref","unstructured":"Nasr M, Shokri R, Houmansadr A (2019) Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In: 2019 IEEE symposium on security and privacy (SP). IEEE, pp 739\u2013753","DOI":"10.1109\/SP.2019.00065"},{"key":"1688_CR55","doi-asserted-by":"crossref","unstructured":"Cruciani F, Vafeiadis A, Nugent C, Cleland I, McCullagh P, Votis K, Giakoumis D, Tzovaras D, Chen L, Hamzaoui R (2019) Comparing cnn and human crafted features for human activity recognition. In: 2019 IEEE smartworld, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, cloud & big data computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI). IEEE, pp 960\u2013967","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00190"},{"key":"1688_CR56","unstructured":"Yosinski J, Clune J, Bengio Y, Lipson H (2014) How transferable are features in deep neural networks? In: Advances in neural information processing systems. pp 3320\u20133328"},{"issue":"1","key":"1688_CR57","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TNNLS.2012.2236570","volume":"25","author":"I \u017dliobait\u0117","year":"2013","unstructured":"\u017dliobait\u0117 I, Bifet A, Pfahringer B, Holmes G (2013) Active learning with drifting streaming data. IEEE Transactions on Neural Networks and Learning Systems 25(1):27\u201339","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"16","key":"1688_CR58","first-page":"321","volume":"16","author":"D Zhou","year":"2004","unstructured":"Zhou D, Bousquet O, Lal TN, Weston J, Sch\u00f6lkopf B (2004) Learning with local and global consistency. Advances in Neural Information Processing Systems 16(16):321\u2013328","journal-title":"Advances in Neural Information Processing Systems"},{"key":"1688_CR59","doi-asserted-by":"crossref","unstructured":"Widmann N, Verberne S (2017) Graph-based semi-supervised learning for text classification. In: Proceedings of the ACM SIGIR international conference on theory of information retrieval. pp 59\u201366","DOI":"10.1145\/3121050.3121055"},{"key":"1688_CR60","doi-asserted-by":"crossref","unstructured":"Vavoulas G, Chatzaki C, Malliotakis T, Pediaditis M, Tsiknakis M (2016) The mobiact dataset: Recognition of activities of daily living using smartphones. In: ICT4AgeingWell. pp 143\u2013151","DOI":"10.5220\/0005792401430151"},{"key":"1688_CR61","unstructured":"Kingma DP, Ba J (2017) Adam: A method for stochastic optimization"},{"issue":"2","key":"1688_CR62","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1007\/s11036-019-01445-x","volume":"25","author":"S Wan","year":"2020","unstructured":"Wan S, Qi L, Xu X, Tong C, Gu Z (2020) Deep learning models for real-time human activity recognition with smartphones. Mobile Networks and Applications 25(2):743\u2013755","journal-title":"Mobile Networks and Applications"},{"key":"1688_CR63","unstructured":"Nasr M, Shokri R, Houmansadr A (2018) Comprehensive privacy analysis of deep learning: Stand-alone and federated learning under passive and active white-box inference attacks. arXiv:1812.00910"},{"key":"1688_CR64","doi-asserted-by":"crossref","unstructured":"Shokri R, Stronati M, Song C, Shmatikov V (2017) Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE, pp 3\u201318","DOI":"10.1109\/SP.2017.41"},{"key":"1688_CR65","unstructured":"Bhowmick A, Duchi J, Freudiger J, Kapoor G, Rogers R (2018) Protection against reconstruction and its applications in private federated learning. arXiv:1812.00984"},{"key":"1688_CR66","doi-asserted-by":"crossref","unstructured":"Cramer R, Damg\u00e5ard I, Maurer U (2000) General secure multi-party computation from any linear secret-sharing scheme. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 316\u2013334","DOI":"10.1007\/3-540-45539-6_22"},{"key":"1688_CR67","unstructured":"Agarwal N, Suresh AT, Yu FXX, Kumar S, McMahan B (2018) cpsgd: Communication-efficient and differentially-private distributed sgd. In: Advances in neural information processing systems. pp, 7564\u20137575"},{"key":"1688_CR68","doi-asserted-by":"crossref","unstructured":"Dwork C (2008) Differential privacy: A survey of results. In: International conference on theory and applications of models of computation. Springer, pp 1\u201319","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"1688_CR69","doi-asserted-by":"crossref","unstructured":"Truex S, Baracaldo N, Anwar A, Steinke T, Ludwig H, Zhang R, Zhou Y (2019) A hybrid approach to privacy-preserving federated learning. In: Proceedings of the 12th ACM workshop on artificial intelligence and security. pp 1\u201311","DOI":"10.1145\/3338501.3357370"},{"key":"1688_CR70","doi-asserted-by":"crossref","unstructured":"Lane ND, Bhattacharya S, Georgiev P, Forlivesi C, Jiao L, Qendro L, Kawsar F (2016) Deepx: A software accelerator for low-power deep learning inference on mobile devices. In: 2016 15th ACM\/IEEE international conference on information processing in sensor networks (IPSN). IEEE, pp 1\u201312","DOI":"10.1109\/IPSN.2016.7460664"},{"issue":"3","key":"1688_CR71","doi-asserted-by":"publisher","first-page":"2224","DOI":"10.1109\/COMST.2019.2904897","volume":"21","author":"C Zhang","year":"2019","unstructured":"Zhang C, Patras P, Haddadi H (2019) Deep learning in mobile and wireless networking: A survey. IEEE Communications Surveys & Tutorials 21(3):2224\u20132287","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1688_CR72","doi-asserted-by":"crossref","unstructured":"Ignatov A, Timofte R, Kulik A, Yang S, Wang K, Baum F, Wu M, Xu L, Van Gool L (2019) Ai benchmark: All about deep learning on smartphones in 2019. In: 2019 IEEE\/CVF international conference on computer vision workshop (ICCVW). IEEE, pp 3617\u20133635","DOI":"10.1109\/ICCVW.2019.00447"},{"key":"1688_CR73","doi-asserted-by":"crossref","unstructured":"Briggs C, Fan Z, Andras P (2020) Federated learning with hierarchical clustering of local updates to improve training on non-iid data. In: 2020 international joint conference on neural networks (IJCNN). IEEE, pp 1\u20139.","DOI":"10.1109\/IJCNN48605.2020.9207469"},{"key":"1688_CR74","doi-asserted-by":"crossref","unstructured":"Sztyler T, Stuckenschmidt H (2017) Online personalization of cross-subjects based activity recognition models on wearable devices. In: 2017 IEEE international conference on pervasive computing and communications (PerCom). IEEE, pp 180\u2013189","DOI":"10.1109\/PERCOM.2017.7917864"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-022-01688-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-022-01688-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-022-01688-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T06:11:10Z","timestamp":1662790270000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-022-01688-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,23]]},"references-count":74,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["1688"],"URL":"https:\/\/doi.org\/10.1007\/s00779-022-01688-8","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,23]]},"assertion":[{"value":"15 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}