{"id":"https://openalex.org/W4292055785","doi":"https://doi.org/10.1109/csr54599.2022.9850328","title":"Privacy Preserving Human Activity Recognition Using Microaggregated Generative Deep Learning","display_name":"Privacy Preserving Human Activity Recognition Using Microaggregated Generative Deep Learning","publication_year":2022,"publication_date":"2022-07-27","ids":{"openalex":"https://openalex.org/W4292055785","doi":"https://doi.org/10.1109/csr54599.2022.9850328"},"language":"en","primary_location":{"id":"doi:10.1109/csr54599.2022.9850328","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr54599.2022.9850328","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060546610","display_name":"Ahmed Aleroud","orcid":"https://orcid.org/0000-0003-4337-1488"},"institutions":[{"id":"https://openalex.org/I4210087454","display_name":"Augusta University Health","ror":"https://ror.org/007rawr89","country_code":"US","type":"healthcare","lineage":["https://openalex.org/I4210087454"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ahmed Aleroud","raw_affiliation_strings":["Augusta University,School of Computer and Cyber Sciences,Augusta,Georgia,USA","School of Computer and Cyber Sciences, Augusta University, Augusta, Georgia, USA"],"affiliations":[{"raw_affiliation_string":"Augusta University,School of Computer and Cyber Sciences,Augusta,Georgia,USA","institution_ids":["https://openalex.org/I4210087454"]},{"raw_affiliation_string":"School of Computer and Cyber Sciences, Augusta University, Augusta, Georgia, USA","institution_ids":["https://openalex.org/I4210087454"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009278697","display_name":"Majd Shariah","orcid":null},"institutions":[{"id":"https://openalex.org/I85507684","display_name":"Yarmouk University","ror":"https://ror.org/004mbaj56","country_code":"JO","type":"education","lineage":["https://openalex.org/I85507684"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Majd Shariah","raw_affiliation_strings":["Yarmouk University,Department of Information Systems,Irbid,Jordan","Department of Information Systems, Yarmouk University, Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"Yarmouk University,Department of Information Systems,Irbid,Jordan","institution_ids":["https://openalex.org/I85507684"]},{"raw_affiliation_string":"Department of Information Systems, Yarmouk University, Irbid, Jordan","institution_ids":["https://openalex.org/I85507684"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083964684","display_name":"Rami Malkawi","orcid":"https://orcid.org/0000-0002-4556-0162"},"institutions":[{"id":"https://openalex.org/I85507684","display_name":"Yarmouk University","ror":"https://ror.org/004mbaj56","country_code":"JO","type":"education","lineage":["https://openalex.org/I85507684"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Rami Malkawi","raw_affiliation_strings":["Yarmouk University,Department of Information Systems,Irbid,Jordan","Department of Information Systems, Yarmouk University, Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"Yarmouk University,Department of Information Systems,Irbid,Jordan","institution_ids":["https://openalex.org/I85507684"]},{"raw_affiliation_string":"Department of Information Systems, Yarmouk University, Irbid, Jordan","institution_ids":["https://openalex.org/I85507684"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060546610"],"corresponding_institution_ids":["https://openalex.org/I4210087454"],"apc_list":null,"apc_paid":null,"fwci":0.3977,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66545596,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"357","last_page":"363"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9625999927520752,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8235390186309814},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.5763601064682007},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.5689694881439209},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5410704612731934},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5293123126029968},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.48850691318511963},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.48752066493034363},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4833950102329254},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4509137272834778},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.44343307614326477},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.42042669653892517},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.41858065128326416},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4167187809944153},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17421260476112366}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8235390186309814},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.5763601064682007},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.5689694881439209},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5410704612731934},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5293123126029968},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.48850691318511963},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48752066493034363},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4833950102329254},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4509137272834778},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.44343307614326477},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.42042669653892517},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.41858065128326416},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4167187809944153},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17421260476112366},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr54599.2022.9850328","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr54599.2022.9850328","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1542655808","https://openalex.org/W1655894887","https://openalex.org/W1966517804","https://openalex.org/W1991603091","https://openalex.org/W1995875735","https://openalex.org/W2013724238","https://openalex.org/W2020422256","https://openalex.org/W2023044001","https://openalex.org/W2084085041","https://openalex.org/W2121008057","https://openalex.org/W2153689444","https://openalex.org/W2159024459","https://openalex.org/W2219995598","https://openalex.org/W2622363068","https://openalex.org/W2773408865","https://openalex.org/W2783006270","https://openalex.org/W2789226849","https://openalex.org/W2801823547","https://openalex.org/W2889815322","https://openalex.org/W2911915417","https://openalex.org/W2962183193","https://openalex.org/W3006107559","https://openalex.org/W3098698560","https://openalex.org/W3176551993","https://openalex.org/W4231750372","https://openalex.org/W4293568373","https://openalex.org/W6748503580","https://openalex.org/W6773990954","https://openalex.org/W6780248173"],"related_works":["https://openalex.org/W3156291593","https://openalex.org/W3024390022","https://openalex.org/W4313479464","https://openalex.org/W4367722749","https://openalex.org/W3198184493","https://openalex.org/W3000617323","https://openalex.org/W4316035501","https://openalex.org/W2901368259","https://openalex.org/W4293053803","https://openalex.org/W4200453266"],"abstract_inverted_index":{"Internet":[0],"of":[1,9,12,20,36,72,107,115,132,168,178],"Things":[2],"(IoT)":[3],"allow":[4],"data":[5,21,64,66,96],"collection":[6],"and":[7,68,101,147,150],"sharing":[8],"many":[10],"aspects":[11],"our":[13],"daily":[14],"life.":[15],"With":[16],"the":[17,34,37,73,82,105,113,116,133,156,171,176,179],"huge":[18],"amount":[19],"transferred":[22],"via":[23],"IoT":[24,53,95,184],"devices,":[25],"privacy":[26,45,159,172,188],"concerns":[27],"need":[28],"to":[29,93,124,182],"be":[30],"addressed":[31],"while":[32,103],"preserving":[33,46,104,160],"usefulness":[35],"shared":[38],"data.":[39,54],"This":[40],"research":[41],"proposes":[42],"a":[43,90,154,163],"microaggregation-generative":[44],"model":[47],"for":[48,63],"human":[49],"activity":[50],"recognition":[51],"in":[52,166],"While":[55],"generative":[56,86],"deep":[57,84],"neural":[58],"networks":[59],"have":[60],"been":[61],"used":[62],"perturbation,":[65],"leakage":[67],"disclosing":[69],"private":[70],"information":[71],"training":[74],"sample":[75],"is":[76],"still":[77],"an":[78,121],"issue":[79],"when":[80],"applying":[81],"traditional":[83],"learning":[85],"models.":[87],"We":[88],"proposed":[89,134,157,180],"novel":[91],"approach":[92,111,135,181],"perturb":[94],"using":[97,138],"Generative":[98],"Adversarial":[99],"Networks":[100],"Microaggregation":[102],"utility":[106],"its":[108],"features.":[109],"Our":[110],"reduces":[112],"size":[114],"original":[117],"dataset":[118],"by":[119],"employing":[120],"entropy-preserving":[122],"measure":[123],"discard":[125],"noisy":[126],"records":[127],"after":[128,151],"anonymization.":[129,152],"The":[130],"performance":[131,165],"was":[136,173],"measured":[137],"several":[139],"criteria":[140],"such":[141],"as":[142],"classification":[143],"accuracy,":[144],"precision,":[145],"recall,":[146],"F-score":[148],"before":[149],"As":[153],"result,":[155],"GAN-Microaggregation":[158],"technique":[161],"showed":[162],"remarkable":[164],"term":[167],"accuracy.":[169],"Moreover,":[170],"measured,":[174],"showing":[175],"benefits":[177],"share":[183],"datasets":[185],"with":[186],"minimal":[187],"attacking":[189],"surface.":[190]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
