Proceedings of the 18th International Conference on Security and Cryptography 2021
DOI: 10.5220/0010585008060811
|View full text |Cite
|
Sign up to set email alerts
|

User Identification from Time Series of Fitness Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Previous methods focusing on person recognition using gesture data have been reported. 27 , 28 In contrast to our study, previous signature identification research primarily investigated security and safety to avoid unintended intrusions. For instance, 1 group developed RFnet, that is, a multi-branch 1D-CNN network, for classifying gestures using time-series data.…”
Section: Discussionmentioning
confidence: 91%
See 1 more Smart Citation
“…Previous methods focusing on person recognition using gesture data have been reported. 27 , 28 In contrast to our study, previous signature identification research primarily investigated security and safety to avoid unintended intrusions. For instance, 1 group developed RFnet, that is, a multi-branch 1D-CNN network, for classifying gestures using time-series data.…”
Section: Discussionmentioning
confidence: 91%
“… 28 Health and fitness data collected from wearable devices has been studied as a unique identifier of a person, which can pose a potential threat to targeted advertisement and violation of privacy rights. 27 Additionally, current literature on using deep learning methods in surgery sought to characterize surgeon skill level and surgical task identification using one or a combination of video object tracking or detection, spatiotemporal video descriptors, robotic kinematics, and virtual reality interfaces. 29 35 Furthermore, limitations of previous studies include the use of the da Vinci Surgical System on bench-top surgical training models rather than direct manipulation of the surgical tools during clinical cases.…”
Section: Discussionmentioning
confidence: 99%
“…Activity logs themselves often contain information that is derived from an individual's attributes: calories, for instance, are often estimated by combining activity information with physical characteristics such as age, gender, height, and weight [5]. Thus, an ad-versary can leverage additional records that she possesses to find a target user in the dataset, even when personal attributes are removed [6], and glean insights about them. Such insights may include:…”
Section: Privacy Aspects Of Sharing Data From Wearablesmentioning
confidence: 99%