{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:26:35Z","timestamp":1740122795085,"version":"3.37.3"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T00:00:00Z","timestamp":1678406400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T00:00:00Z","timestamp":1678406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11063-023-11182-8","type":"journal-article","created":{"date-parts":[[2023,3,26]],"date-time":"2023-03-26T21:23:12Z","timestamp":1679865792000},"page":"2127-2153","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Secure Multi-Party Computation for Personalized Human Activity Recognition"],"prefix":"10.1007","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9786-4782","authenticated-orcid":false,"given":"David","family":"Melanson","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Maia","sequence":"additional","affiliation":[]},{"given":"Hee-Seok","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8298-6250","authenticated-orcid":false,"given":"Anderson","family":"Nascimento","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7917-0771","authenticated-orcid":false,"given":"Martine","family":"De Cock","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,10]]},"reference":[{"issue":"10","key":"11182_CR1","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2009","unstructured":"Pan SJ, Yang Q (2009) A survey on transfer learning. IEEE Trans Knowl Data Eng 22(10):1345\u20131359","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"11182_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/9781139061773","volume-title":"Transfer learning","author":"Q Yang","year":"2020","unstructured":"Yang Q, Zhang Y, Dai W, Pan SJ (2020) Transfer learning. Cambridge University Press, UK"},{"issue":"1","key":"11182_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/JPROC.2020.3004555","volume":"109","author":"F Zhuang","year":"2021","unstructured":"Zhuang F, Qi Z, Duan K, Xi D, Zhu Y, Zhu H, Xiong H, He Q (2021) A comprehensive survey on transfer learning. Proc IEEE 109(1):43\u201376","journal-title":"Proc IEEE"},{"key":"11182_CR4","doi-asserted-by":"crossref","unstructured":"Hernandez N, Lundstr\u00f6m J, Favela J, McChesney I, Arnrich B (2020) Literature review on transfer learning for human activity recognition using mobile and wearable devices with environmental technology. Springer Nature Computer Science 1(66)","DOI":"10.1007\/s42979-020-0070-4"},{"key":"11182_CR5","doi-asserted-by":"crossref","unstructured":"Mehrang S, Pietila J, Tolonen J, Helander E, Jimison H, Pavel M, Korhonen I (2017) Human activity recognition using a single optical heart rate monitoring wristband equipped with triaxial accelerometer. In: Joint conference of the European Medical and Biological Engineering Conference (EMBEC) and the nordic-baltic conference on biomedical engineering and medical physics (NBC), pp 587\u2013590","DOI":"10.1007\/978-981-10-5122-7_147"},{"key":"11182_CR6","doi-asserted-by":"publisher","first-page":"10146","DOI":"10.3390\/s140610146","volume":"14","author":"M Shoaib","year":"2014","unstructured":"Shoaib M, Bosch S, Incel O, Scholten H, Havinga P (2014) Fusion of smartphone motion sensors for physical activity recognition. Sensors 14:10146\u201310176","journal-title":"Sensors"},{"key":"11182_CR7","doi-asserted-by":"crossref","unstructured":"Lin C-Y, Marculescu R (2020) Model personalization for human activity recognition. In: 2020 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops)","DOI":"10.1109\/PerComWorkshops48775.2020.9156229"},{"key":"11182_CR8","doi-asserted-by":"publisher","first-page":"334","DOI":"10.3389\/fnhum.2017.00334","volume":"11","author":"Y-P Lin","year":"2017","unstructured":"Lin Y-P, Jung T-P (2017) Improving EEG-based emotion classification using conditional transfer learning. Front Hum Neurosci 11:334","journal-title":"Front Hum Neurosci"},{"key":"11182_CR9","doi-asserted-by":"crossref","unstructured":"Wu D, Xu Y, Lu B.-L (2020) Transfer learning for EEG-based brain-computer interfaces: a review of progress made since 2016. IEEE Trans Cognit Dev Syst, pp 4\u201319","DOI":"10.1109\/TCDS.2020.3007453"},{"key":"11182_CR10","unstructured":"Carlini N, Liu C, Erlingsson \u00da, Kos J, Song D (2019) The secret sharer: evaluating and testing unintended memorization in neural networks. In: 28th USENIX security symposium, pp 267\u2013284"},{"issue":"1\u20132","key":"11182_CR11","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/0020294018813692","volume":"52","author":"S Balli","year":"2019","unstructured":"Balli S, Sa\u01e7ba\u015f EA, Peker M (2019) Human activity recognition from smart watch sensor data using a hybrid of principal component analysis and random forest algorithm. Meas Control 52(1\u20132):37\u201345","journal-title":"Meas Control"},{"key":"11182_CR12","doi-asserted-by":"crossref","unstructured":"Cramer R, Damgard I, Nielsen J (2015) Secure multiparty computation and secret sharing. Cambridge University Press, New York","DOI":"10.1017\/CBO9781107337756"},{"key":"11182_CR13","doi-asserted-by":"crossref","unstructured":"Kairouz P, McMahan HB, Avent B, Bellet A, Bennis M, Bhagoji AN, Bonawitz K, Charles Z, Cormode G, Cummings R, D\u2019Oliveira RGL, Eichner H, Rouayheb SE, Evans D, Gardner J, Garrett Z, Gasc\u00f3n A, Ghazi B, Gibbons PB, Gruteser M, Harchaoui Z, He C, He L, Huo Z, Hutchinson B, Hsu J, Jaggi M, Javidi T, Joshi G, Khodak M, Konecn\u00fd J, Korolova A, Koushanfar F, Koyejo S, Lepoint T, Liu Y, Mittal P, Mohri M, Nock R, \u00d6zg\u00fcr A, Pagh R, Qi H, Ramage D, Raskar R, Raykova M, Song D, Song W, Stich SU, Sun Z, Suresh AT, Tram\u00e8r F, Vepakomma P, Wang J, Xiong L, Xu Z, Yang Q, Yu FX, Yu H, Zhao S (2021) Advances and open problems in federated learning. Found Trends Mach Learn 14(1\u20132):1\u2013210","DOI":"10.1561\/9781680837896"},{"key":"11182_CR14","doi-asserted-by":"crossref","unstructured":"Presotto R, Civitarese G, Bettini C (2022) FedCLAR: federated clustering for personalized sensor-based human activity recognition. In: 2022 IEEE international conference on pervasive computing and communications (PerCom), pp 227\u2013236","DOI":"10.1109\/PerCom53586.2022.9762352"},{"issue":"4","key":"11182_CR15","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MIS.2020.2988604","volume":"35","author":"Y Chen","year":"2020","unstructured":"Chen Y, Qin X, Wang J, Yu C, Gao W (2020) FedHealth: a federated transfer learning framework for wearable healthcare. IEEE Intell Syst 35(4):83\u201393","journal-title":"IEEE Intell Syst"},{"issue":"10","key":"11182_CR16","doi-asserted-by":"publisher","first-page":"9530","DOI":"10.1109\/JIOT.2020.2991416","volume":"7","author":"R Hu","year":"2020","unstructured":"Hu R, Guo Y, Li H, Pei Q, Gong Y (2020) Personalized federated learning with differential privacy. IEEE Internet Things J 7(10):9530\u20139539","journal-title":"IEEE Internet Things J"},{"key":"11182_CR17","doi-asserted-by":"publisher","first-page":"953","DOI":"10.3934\/mbe.2022044","volume":"19","author":"S Liu","year":"2021","unstructured":"Liu S, Wang J, Zhang W (2021) Federated personalized random forest for human activity recognition. Math Biosci Eng 19:953\u2013971","journal-title":"Math Biosci Eng"},{"issue":"3\u20134","key":"11182_CR18","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A (2014) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3\u20134):211\u2013407","journal-title":"Found Trends Theor Comput Sci"},{"issue":"1","key":"11182_CR19","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s11235-018-0534-1","volume":"72","author":"M Hashemian","year":"2019","unstructured":"Hashemian M, Razzazi F, Zarrabi H, Moin MS (2019) A privacy-preserving distributed transfer learning in activity recognition. Telecommun Syst: Model Anal Des Manag 72(1):69\u201379","journal-title":"Telecommun Syst: Model Anal Des Manag"},{"key":"11182_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-020-07891-1","volume":"117","author":"M Hashemian","year":"2021","unstructured":"Hashemian M, Razzazi F, Zarrabi H, Moin M (2021) Semi-supervised and unsupervised privacy-preserving distributed transfer learning approach in HAR systems. Wirel Pers Commun 117:1\u201318","journal-title":"Wirel Pers Commun"},{"issue":"2\u20133","key":"11182_CR21","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1561\/3300000019","volume":"2","author":"D Evans","year":"2018","unstructured":"Evans D, Kolesnikov V, Rosulek M (2018) A pragmatic introduction to secure multi-party computation. Found Trends Privacy Secur 2(2\u20133):70\u2013246","journal-title":"Found Trends Privacy Secur"},{"issue":"4","key":"11182_CR22","first-page":"355","volume":"2020","author":"A Dalskov","year":"2020","unstructured":"Dalskov A, Escudero D, Keller M (2020) Secure evaluation of quantized neural networks. Proc Privacy Enh Technol 2020(4):355\u2013375","journal-title":"Proc Privacy Enh Technol"},{"issue":"2","key":"11182_CR23","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/TDSC.2017.2679189","volume":"16","author":"M De Cock","year":"2019","unstructured":"De Cock M, Dowsley R, Horst C, Katti R, Nascimento A, Poon W-S, Truex S (2019) Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation. IEEE Trans Dependable Secure Comput 16(2):217\u2013230","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"11182_CR24","doi-asserted-by":"crossref","unstructured":"Fritchman K, Saminathan K, Dowsley R, Hughes T, De Cock M, Nascimento A, Teredesai A (2018) Privacy-preserving scoring of tree ensembles: a novel framework for AI in healthcare. In: Proceedings of 2018 IEEE BigData, pp 2412\u20132421","DOI":"10.1109\/BigData.2018.8622627"},{"key":"11182_CR25","unstructured":"Juvekar C, Vaikuntanathan V, Chandrakasan A (2018) GAZELLE: a low latency framework for secure neural network inference. In: 27th USENIX security symposium, pp 1651\u20131669"},{"key":"11182_CR26","doi-asserted-by":"crossref","unstructured":"Kumar N, Rathee M, Chandran N, Gupta D, Rastogi A, Sharma R (2020) CrypTFlow: secure TensorFlow inference. In: 41st IEEE symposium on security and privacy, pp 336\u2013353","DOI":"10.1109\/SP40000.2020.00092"},{"key":"11182_CR27","doi-asserted-by":"crossref","unstructured":"Liu J, Juuti M, Lu Y, Asokan N (2017) Oblivious neural network predictions via MiniONN transformations. In: ACM SIGSAC conference on computer and communications security, pp 619\u2013631","DOI":"10.1145\/3133956.3134056"},{"key":"11182_CR28","unstructured":"Reich D, Todoki A, Dowsley R, De Cock M, Nascimento A (2019) Privacy-preserving classification of personal text messages with secure multi-party computation. In: Advances in neural information processing systems (NeurIPS), vol 32, pp 3752\u20133764"},{"key":"11182_CR29","doi-asserted-by":"crossref","unstructured":"Riazi S, Weinert C, Tkachenko O, Songhori E.M, Schneider T, Koushanfar F (2018) Chameleon: A hybrid secure computation framework for machine learning applications. In: Asia conference on computer and communications security, pp 707\u2013721. ACM","DOI":"10.1145\/3196494.3196522"},{"key":"11182_CR30","doi-asserted-by":"crossref","unstructured":"Rouhani B.D, Riazi M.S, Koushanfar F (2018) DeepSecure: scalable provably-secure deep learning. In: 55th Annual design automation conference (DAC)","DOI":"10.1145\/3195970.3196023"},{"issue":"8","key":"11182_CR31","doi-asserted-by":"publisher","first-page":"1546","DOI":"10.1109\/TNSRE.2019.2926965","volume":"27","author":"A Agarwal","year":"2019","unstructured":"Agarwal A, Dowsley R, McKinney ND, Wu D, Lin C-T, De Cock M, Nascimento A (2019) Protecting privacy of users in brain-computer interface applications. IEEE Trans Neural Syst Rehabil Eng 27(8):1546\u20131555","journal-title":"IEEE Trans Neural Syst Rehabil Eng"},{"key":"11182_CR32","doi-asserted-by":"crossref","unstructured":"De Cock M, Dowsley R, Nascimento ACA, Newman SC (2015) Fast, privacy preserving linear regression over distributed datasets based on pre-distributed data. In: Proceedings of the 8th ACM workshop on artificial intelligence and security, pp 3\u201314","DOI":"10.1145\/2808769.2808774"},{"key":"11182_CR33","doi-asserted-by":"crossref","unstructured":"Nikolaenko V, Weinsberg U, Ioannidis S, Joye M, Boneh D, Taft N (2013) Privacy-preserving ridge regression on hundreds of millions of records. In: 2013 IEEE symposium on security and privacy (SP), pp 334\u2013348","DOI":"10.1109\/SP.2013.30"},{"issue":"1","key":"11182_CR34","first-page":"167","volume":"2021","author":"M Abspoel","year":"2021","unstructured":"Abspoel M, Escudero D, Volgushev N (2021) Secure training of decision trees with continuous attributes. Proc Privacy Enh Technol 2021(1):167\u2013187","journal-title":"Proc Privacy Enh Technol"},{"key":"11182_CR35","doi-asserted-by":"crossref","unstructured":"de Hoogh S, Schoenmakers B, Chen P, op den Akker H (2014) Practical secure decision tree learning in a teletreatment application. In: International conference on financial cryptography and data security, pp 179\u2013194","DOI":"10.1007\/978-3-662-45472-5_12"},{"key":"11182_CR36","doi-asserted-by":"crossref","unstructured":"Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: Annual international cryptology conference, pp 36\u201354","DOI":"10.1007\/3-540-44598-6_3"},{"key":"11182_CR37","first-page":"205","volume":"2","author":"S Adams","year":"2022","unstructured":"Adams S, Choudhary C, De Cock M, Dowsley R, Melanson D, Nascimento AC, Railsback D, Shen J (2022) Privacy-preserving training of tree ensembles over continuous data. Proc Privacy Enh Technol 2:205\u2013226","journal-title":"Proc Privacy Enh Technol"},{"key":"11182_CR38","doi-asserted-by":"crossref","unstructured":"Agrawal N, Shahin Shamsabadi A, Kusner M.J, Gasc\u00f3n A (2019) QUOTIENT: two-party secure neural network training and prediction. In: ACM SIGSAC conference on computer and communications security, pp 1231\u20131247","DOI":"10.1145\/3319535.3339819"},{"issue":"1","key":"11182_CR39","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1186\/s12920-020-00869-9","volume":"14","author":"M De Cock","year":"2021","unstructured":"De Cock M, Dowsley R, Nascimento ACA, Railsback D, Shen J, Todoki A (2021) High performance logistic regression for privacy-preserving genome analysis. BMC Med Genomics 14(1):23","journal-title":"BMC Med Genomics"},{"issue":"1","key":"11182_CR40","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1093\/imaiai\/iaaa038","volume":"11","author":"C Guo","year":"2021","unstructured":"Guo C, Hannun A, Knott B, van der Maaten L, Tygert M, Zhu R (2021) Secure multiparty computations in floating-point arithmetic. Inf Inference: J IMA 11(1):103\u2013135","journal-title":"Inf Inference: J IMA"},{"key":"11182_CR41","doi-asserted-by":"crossref","unstructured":"Mohassel P, Zhang Y (2017) SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE symposium on security and privacy (SP), pp 19\u201338","DOI":"10.1109\/SP.2017.12"},{"issue":"3","key":"11182_CR42","first-page":"26","volume":"2019","author":"S Wagh","year":"2019","unstructured":"Wagh S, Gupta D, Chandran N (2019) SecureNN: 3-party secure computation for neural network training. Proc Privacy Enh Technol 2019(3):26\u201349","journal-title":"Proc Privacy Enh Technol"},{"key":"11182_CR43","doi-asserted-by":"crossref","unstructured":"Beaver D (1997) Commodity-based cryptography (extended abstract). In: Proceedings of the twenty-ninth annual ACM symposium on theory of computing. STOC \u201997, pp 446\u2013455","DOI":"10.1145\/258533.258637"},{"key":"11182_CR44","unstructured":"Rabin MO (2008) How to exchange secrets with oblivious transfer. IACR Cryptol. ePrint Arch 2005(187)"},{"key":"11182_CR45","doi-asserted-by":"crossref","unstructured":"Araki T, Furukawa J, Lindell Y, Nof A, Ohara K (2016) High-throughput semi-honest secure three-party computation with an honest majority. In: ACM SIGSAC Conference on computer and communications security, pp 805\u2013817","DOI":"10.1145\/2976749.2978331"},{"key":"11182_CR46","doi-asserted-by":"crossref","unstructured":"Keller M (2020) MP-SPDZ: a versatile framework for multi-party computation. In: Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, pp 1575\u20131590","DOI":"10.1145\/3372297.3417872"},{"key":"11182_CR47","doi-asserted-by":"crossref","unstructured":"Mishra P, Lehmkuhl R, Srinivasan A, Zheng W, Popa RA (2020) Delphi: a cryptographic inference service for neural networks. In: 29th USENIX security symposium, pp 2505\u20132522","DOI":"10.1145\/3411501.3419418"},{"key":"11182_CR48","doi-asserted-by":"crossref","unstructured":"Adams S, Melanson D, De Cock M (2021) Private text classification with convolutional neural networks. In: Proceedings of the third workshop on privacy in natural language processing (NAACL Workshops), pp 53\u201358","DOI":"10.18653\/v1\/2021.privatenlp-1.7"},{"key":"11182_CR49","doi-asserted-by":"crossref","unstructured":"Escudero D, Ghosh S, Keller M, Rachuri R, Scholl P (2020) Improved primitives for MPC over mixed arithmetic-binary circuits. In: Annual international cryptology conference, pp 823\u2013852","DOI":"10.1007\/978-3-030-56880-1_29"},{"issue":"11","key":"11182_CR50","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1093\/comjnl\/bxt075","volume":"57","author":"B Barshan","year":"2014","unstructured":"Barshan B, Y\u00fcksek MC (2014) Recognizing daily and sports activities in two open source machine learning environments using body-worn sensor units. Comput J 57(11):1649\u20131667","journal-title":"Comput J"},{"key":"11182_CR51","unstructured":"Zhang A, Lipton ZC, Li M, Smola AJ (2022) Dive into deep learning, https:\/\/d2l.ai"},{"key":"11182_CR52","unstructured":"Chollet F, et al.: Keras. https:\/\/github.com\/fchollet\/keras"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-023-11182-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11063-023-11182-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-023-11182-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,8]],"date-time":"2023-07-08T12:19:57Z","timestamp":1688818797000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11063-023-11182-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,10]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["11182"],"URL":"https:\/\/doi.org\/10.1007\/s11063-023-11182-8","relation":{},"ISSN":["1370-4621","1573-773X"],"issn-type":[{"type":"print","value":"1370-4621"},{"type":"electronic","value":"1573-773X"}],"subject":[],"published":{"date-parts":[[2023,3,10]]},"assertion":[{"value":"1 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}