2022
DOI: 10.1109/tmc.2021.3078086
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Sensitive Information Leakage From Mobile Sensor Signals via Integrative Transformation

Abstract: Ubiquitous mobile sensors on human activity recognition pose the threat of leaking personal information that is explicitly contained within the time-series sensor signals and can be extracted by attackers. Existing protective methods only support specific sensitive attributes and require massive relevant sensitive ground truth for training, which is unfavourable to users. To fill this gap, we propose a novel data transformation framework for prohibiting the leakage of sensitive information from sensor data. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…proposed a new framework for activity recognition and privacypreserving of sensitive data [26]. The authors wanted to avoid the need for massive collection of sensitive data for model training.…”
Section: Privacy-preserving Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…proposed a new framework for activity recognition and privacypreserving of sensitive data [26]. The authors wanted to avoid the need for massive collection of sensitive data for model training.…”
Section: Privacy-preserving Methodsmentioning
confidence: 99%
“…3.2). For the training of GaitPrivacyON, we adapted the key aspects presented in the image style transformation field [26]. The details are explained in Sec.…”
Section: Proposed Approach: Gaitprivacyonmentioning
confidence: 99%
See 2 more Smart Citations
“…Another common fraudulent method involves telephone fraud [7]. Based on the information leaked from communication applications on mobile [8], the fraudsters will investigate an individual's net worth, age, graduate school, circle of friends, and other details to determine whether it is worth defrauding them.…”
Section: Impact Of Personal Data Leakagementioning
confidence: 99%