{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:56:25Z","timestamp":1763344585542,"version":"3.45.0"},"reference-count":57,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066270","type":"journal-article","created":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T05:02:36Z","timestamp":1749618156000},"page":"2429-2454","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Perturbation for Sensor Data Anonymization: Balancing Privacy and Utility"],"prefix":"10.32604","volume":"84","author":[{"given":"Tatsuhito","family":"Hasegawa","sequence":"first","affiliation":[]},{"given":"Kyosuke","family":"Fujino","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"372","DOI":"10.3390\/bios11100372","article-title":"Recent advances on IoT-assisted wearable sensor systems for healthcare monitoring","volume":"11","author":"Mamdiwar","year":"2021","journal-title":"Biosensors"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"0172","DOI":"10.34133\/cbsystems.0172","article-title":"Advances in biointegrated wearable and implantable optoelectronic devices for cardiac healthcare","volume":"5","author":"Li","year":"2024","journal-title":"Cyb Bionic Syst"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"0160","DOI":"10.34133\/cbsystems.0160","article-title":"Sensors and devices guided by artificial intelligence for personalized pain medicine","volume":"5","author":"Xing","year":"2024","journal-title":"Cyb Bionic Syst"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/B978-1-78242-229-7.00008-4","author":"Lam Po Tang","year":"2015","journal-title":"Textiles for sportswear. Woodhead publishing series in textiles"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1109\/THMS.2019.2919702","article-title":"Designing wearable systems for sports: a review of trends and opportunities in human-computer interaction","volume":"49","author":"Mencarini","year":"2019","journal-title":"IEEE Trans Hum Mach Syst"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/978-3-662-48051-9_17","author":"Motti","year":"2015","journal-title":"Financial Cryptography and Data Security: FC 2015"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2334","DOI":"10.1109\/JBHI.2021.3128775","article-title":"Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical WSNs","volume":"27","author":"Xu","year":"2023","journal-title":"IEEE J Biomed Health Inform"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"e34384","DOI":"10.2196\/34384","article-title":"The impact of wearable technologies in health research: scoping review","volume":"10","author":"Huhn","year":"2022","journal-title":"JMIR Mhealth Uhealth"},{"key":"ref9","series-title":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing","first-page":"909","article-title":"Assessing the availability of users to engage in just-in-time intervention in the natural environment","author":"Sarker","year":"2014 Sep 13\u201317"},{"key":"ref10","series-title":"2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2023","first-page":"634","article-title":"Differential privacy with weighted for privacy-preservation in human activity recognition","author":"Fujimoto","year":"2023"},{"key":"ref11","first-page":"103204","article-title":"PGAN framework for synthesizing sensor data privately","volume":"67","author":"Menasria","year":"2022","journal-title":"J Inf Secur Appl"},{"key":"ref12","series-title":"Proceedings of the International Conference on Internet of Things Design and Implementation","first-page":"49","article-title":"Mobile sensor data anonymization","author":"Malekzadeh"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"101189","DOI":"10.1016\/j.iot.2024.101189","article-title":"Privacy preservation in sensor-based human activity recognition through autoencoders for low-power IoT devices","volume":"26","author":"Bigelli","year":"2024","journal-title":"Internet of Things"},{"key":"ref14","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, et al. Intriguing properties of neural networks. arXiv:1312.6199. 2013."},{"key":"ref15","series-title":"Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems","first-page":"1","article-title":"Protecting sensory data against sensitive inferences","author":"Malekzadeh","year":"2018 Apr 23\u201326"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/978-3-319-13105-4_14","author":"Banos","year":"2014","journal-title":"Ambient assisted living and daily activities"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.3390\/app7101101","article-title":"UniMiB SHAR: a dataset for human activity recognition using acceleration data from smartphones","volume":"7","author":"Micucci","year":"2017","journal-title":"Appl Sci"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1016\/j.comcom.2020.06.004","article-title":"Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment","volume":"160","author":"Xu","year":"2020","journal-title":"Comput Commun"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"55465","DOI":"10.1109\/ACCESS.2021.3070905","article-title":"IoT and big data applications in smart cities: recent advances, challenges, and critical issues","volume":"9","author":"Talebkhah","year":"2021","journal-title":"IEEE Access"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1007\/s00779-011-0403-3","article-title":"A single tri-axial accelerometer-based real-time personal life log system capable of human activity recognition and exercise information generation","volume":"15","author":"Lee","year":"2011","journal-title":"Personal Ubiquitous Comput"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"16217","DOI":"10.1109\/ACCESS.2019.2894184","article-title":"Activity recognition method for home-based elderly care service based on random forest and activity similarity","volume":"7","author":"Xu","year":"2019","journal-title":"IEEE Access"},{"key":"ref22","first-page":"853","article-title":"Recognizing and understanding nursing activities for a whole day with a big dataset","volume":"24","author":"Inoue","year":"2016","journal-title":"J Inf Process"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/1964897.1964918","article-title":"Activity recognition using cell phone accelerometers","volume":"12","author":"Kwapisz","year":"2011","journal-title":"SIGKDD Explor"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"426","DOI":"10.3390\/s16040426","article-title":"Complex human activity recognition using smartphone and wrist-worn motion sensors","volume":"16","author":"Shoaib","year":"2016","journal-title":"Sensors"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"458","DOI":"10.3390\/s19030458","article-title":"Human physical activity recognition using smartphone sensors","volume":"19","author":"Voicu","year":"2019","journal-title":"Sensors"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"5571","DOI":"10.1109\/TMC.2023.3314837","volume":"23","author":"Han","year":"2024","journal-title":"IEEE Trans Mob Comput"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"679","DOI":"10.3390\/s18020679","article-title":"Comparison of feature learning methods for human activity recognition using wearable sensors","volume":"18","author":"Li","year":"2018","journal-title":"Sensors"},{"key":"ref28","series-title":"2020 IEEE 23rd International Multitopic Conference (INMIC)","first-page":"1","article-title":"HARDenseNet: A 1D densenet inspired convolutional neural network for human activity recognition with inertial sensors","author":"Mehmood","year":"2020 Nov 5\u20137"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"68985","DOI":"10.1109\/ACCESS.2021.3078184","article-title":"iSPLInception: an inception-resnet deep learning architecture for human activity recognition","volume":"9","author":"Ronald","year":"2021","journal-title":"IEEE Access"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"106412","DOI":"10.1016\/j.bspc.2024.106412","article-title":"Human activity recognition and fall detection using convolutional neural network and transformer-based architecture","volume":"95","author":"Al-qaness","year":"2024","journal-title":"Biomed Signal Process Control"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"6800","DOI":"10.1109\/TCE.2024.3373824","article-title":"A hybrid transformer framework for efficient activity recognition using consumer electronics","volume":"70","author":"Hussain","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"5515","DOI":"10.1007\/s00521-023-09362-7","article-title":"Modeling transformer architecture with attention layer for human activity recognition","volume":"36","author":"Pareek","year":"2024","journal-title":"Neural Comput Appl"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"261","DOI":"10.3233\/JCS-210089","article-title":"Data privacy in the Internet of Things based on anonymization: a review","volume":"31","author":"Neves","year":"2023","journal-title":"J Comput Secur"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"100204","DOI":"10.1016\/j.hcc.2024.100204","article-title":"Privacy-preserving human activity sensing: a survey","volume":"4","author":"Yang","year":"2024","journal-title":"High-Confid Comput"},{"key":"ref35","series-title":"2020 28th European Signal Processing Conference (EUSIPCO)","first-page":"1707","article-title":"Motion sensor data anonymization by time-frequency filtering","author":"Debs","year":"2021 Jan 18\u201321"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"100324","DOI":"10.1016\/j.array.2023.100324","article-title":"Efficient perturbation techniques for preserving privacy of multivariate sensitive data","volume":"20","author":"Rahman","year":"2023","journal-title":"Array"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1109\/TKDE.2011.249","article-title":"Supporting pattern-preserving anonymization for time-series data","volume":"25","author":"Shou","year":"2013","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref38","series-title":"Proceedings of the 1998 IEEE Symposium on Research in Security and Privacy (S&P)","article-title":"Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression","author":"Samarati","year":"1998 May 3\u20136"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"4945152","DOI":"10.1155\/2018\/4945152","article-title":"A clustering K-anonymity privacy-preserving method for wearable IoT devices","volume":"2018","author":"Liu","year":"2018","journal-title":"Secur Commun Netw"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TKDE.2006.14","article-title":"Random projection-based multiplicative data perturbation for privacy preserving distributed data mining","volume":"18","author":"Liu","year":"2006","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref41","volume":"27","author":"Goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref42","first-page":"17","author":"Hallyburton","year":"2025","journal-title":"Pattern recognition"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"2117","DOI":"10.1007\/s10586-023-04063-1","article-title":"A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data","volume":"27","author":"Aleroud","year":"2024","journal-title":"Cluster Comput"},{"key":"ref44","series-title":"Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence","article-title":"Privacy issues regarding the application of DNNs to activity-recognition using wearables and its countermeasures by use of adversarial training","author":"Iwasawa","year":"2017 Aug 19\u201325"},{"key":"ref45","series-title":"Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. ASIA CCS \u201921","first-page":"672","article-title":"DySan: dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks","author":"Boutet","year":"2021 Jun 7\u201311"},{"key":"ref46","series-title":"2024 IEEE Conference on Communications and Network Security (CNS)","first-page":"1","article-title":"Protecting activity sensing data privacy using hierarchical information dissociation","author":"Wang","year":"2024 Sep 30\u2013Oct 3"},{"key":"ref47","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)","first-page":"11132","article-title":"Person re-identification without identification via event anonymization","author":"Ahmad","year":"2023 Oct 1\u20136"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"4517","DOI":"10.1109\/TMC.2021.3078086","article-title":"Preventing sensitive information leakage from mobile sensor signals via integrative transformation","volume":"21","author":"Zhang","year":"2022","journal-title":"IEEE Trans Mob Comput"},{"key":"ref49","series-title":"International Conference on Learning Representations","article-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2017 Apr 24\u201326"},{"key":"ref50","series-title":"2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"2725","article-title":"Improving transferability of adversarial examples with input diversity","author":"Xie","year":"2019 Jun 15\u201320"},{"key":"ref51","series-title":"2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"4307","article-title":"Evading defenses to transferable adversarial examples by translation-invariant attacks","author":"Dong","year":"2019 Jun 15\u201320"},{"key":"ref52","unstructured":"Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples. arXiv:1412.6572. 2015."},{"key":"ref53","unstructured":"Chung MK. Gaussian kernel smoothing. arXiv:2007.09539. 2021."},{"key":"ref54","series-title":"Proceedings of the 3rd International Conference on Learning Representations (ICLR 2015)","first-page":"1","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2015 May 7\u20139"},{"key":"ref55","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"ref56","series-title":"Springer","first-page":"325","author":"Zheng","year":"2012","journal-title":"Launching the new profile on facebook: understanding the triggers and outcomes of users\u2019 privacy concerns"},{"key":"ref57","series-title":"2016 IEEE Symposium on Security and Privacy (SP)","first-page":"397","article-title":"Inferring user routes and locations using zero-permission mobile sensors","author":"Narain","year":"2016 May 22\u201326"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_66270\/TSP_CMC_66270.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:53:39Z","timestamp":1763344419000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":57,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066270","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}