2020 IEEE Second Workshop on Machine Learning on Edge in Sensor Systems (SenSys-ML) 2020
DOI: 10.1109/sensysml50931.2020.00009
|View full text |Cite
|
Sign up to set email alerts
|

Latent Representation Learning and Manipulation for Privacy-Preserving Sensor Data Analytics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…These solutions are usually tailored to specific use cases and are incapable of preventing the leak of private information while maintaining the utility of data. The latter category includes federated learning frameworks [28], differential privacy algorithms [7,31], cryptographic solutions based on homomorphic encryption and compressive sensing [1,34], and privacy-preserving techniques that transform data to a subspace where private attributes can be easily identified and altered [8,11,24]. Federated learning addresses the problem of training a model given data from many users without transferring them to a server.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…These solutions are usually tailored to specific use cases and are incapable of preventing the leak of private information while maintaining the utility of data. The latter category includes federated learning frameworks [28], differential privacy algorithms [7,31], cryptographic solutions based on homomorphic encryption and compressive sensing [1,34], and privacy-preserving techniques that transform data to a subspace where private attributes can be easily identified and altered [8,11,24]. Federated learning addresses the problem of training a model given data from many users without transferring them to a server.…”
Section: Related Workmentioning
confidence: 99%
“…This approach provides a reasonable trade-off between utility and privacy by minimizing the leak of private information while preserving the information content of the input data. However, the data anonymized by these networks is shown to be susceptible to the re-identification attack [11]. To address this shortcoming, a probabilistic transformation technique is proposed in [11] which manipulates private attributes such that the anonymized data is less vulnerable to the re-identification attack.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations