{"id":"https://openalex.org/W4411216177","doi":"https://doi.org/10.32604/cmc.2025.066270","title":"Adversarial Perturbation for Sensor Data Anonymization: Balancing Privacy and Utility","display_name":"Adversarial Perturbation for Sensor Data Anonymization: Balancing Privacy and Utility","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411216177","doi":"https://doi.org/10.32604/cmc.2025.066270"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.066270","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066270","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.066270","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076418964","display_name":"Tatsuhito Hasegawa","orcid":"https://orcid.org/0000-0002-0768-1406"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tatsuhito Hasegawa","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5118126149","display_name":"Kyosuke Fujino","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kyosuke Fujino","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076418964"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07110182,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"2","first_page":"2429","last_page":"2454"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9751999974250793,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9480000138282776,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8518143892288208},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6122340559959412},{"id":"https://openalex.org/keywords/perturbation","display_name":"Perturbation (astronomy)","score":0.4520081579685211},{"id":"https://openalex.org/keywords/data-anonymization","display_name":"Data anonymization","score":0.4423958361148834},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3955855965614319},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3865155875682831},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3764006197452545},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.13111811876296997},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10021588206291199}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8518143892288208},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6122340559959412},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.4520081579685211},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.4423958361148834},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3955855965614319},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3865155875682831},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3764006197452545},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.13111811876296997},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10021588206291199},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.066270","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066270","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.066270","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.066270","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W123295786","https://openalex.org/W568266233","https://openalex.org/W2017634428","https://openalex.org/W2076552240","https://openalex.org/W2087176861","https://openalex.org/W2160553465","https://openalex.org/W2262216404","https://openalex.org/W2304267454","https://openalex.org/W2555209581","https://openalex.org/W2789868604","https://openalex.org/W2792118706","https://openalex.org/W2911378276","https://openalex.org/W2911844256","https://openalex.org/W2950108307","https://openalex.org/W3035141008","https://openalex.org/W3149848108","https://openalex.org/W3160384549","https://openalex.org/W3162538709","https://openalex.org/W3203348450","https://openalex.org/W3213901238","https://openalex.org/W4207033168","https://openalex.org/W4316036090","https://openalex.org/W4381616395","https://openalex.org/W4386699348","https://openalex.org/W4387410922","https://openalex.org/W4390704501","https://openalex.org/W4391116744","https://openalex.org/W4392523452","https://openalex.org/W4394859121","https://openalex.org/W4396850208","https://openalex.org/W4401725391","https://openalex.org/W4402435840"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W3186420513","https://openalex.org/W2777883117","https://openalex.org/W2604278997","https://openalex.org/W2907745422"],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2,242,284],"wearable":[3],"devices":[4],"have":[5],"enabled":[6],"large-scale":[7],"collection":[8],"of":[9,43,63,116,282],"sensor":[10,90],"data":[11,44,91],"across":[12],"healthcare,":[13],"sports,":[14],"and":[15,71,198,201,245,260,280],"other":[16,172],"domains":[17],"but":[18],"this":[19],"has":[20],"also":[21],"raised":[22],"critical":[23],"privacy":[24],"concerns,":[25],"especially":[26],"under":[27],"tightening":[28],"regulations":[29],"such":[30,53,126],"as":[31,54,127],"the":[32,41,55,61,109,114,154,187,223,237,243,250,253,278],"General":[33],"Data":[34],"Protection":[35],"Regulation":[36],"(GDPR),":[37],"which":[38],"explicitly":[39],"restrict":[40],"processing":[42],"that":[45,162,192,292],"can":[46,59],"re-identify":[47],"individuals.":[48],"Although":[49],"existing":[50],"anonymization":[51,92,190],"approaches":[52],"Anonymizing":[56],"AutoEncoder":[57],"(AAE)":[58],"reduce":[60],"risk":[62],"re-identification,":[64],"they":[65],"often":[66],"introduce":[67],"substantial":[68],"waveform":[69,262],"distortions":[70],"fail":[72],"to":[73,99,134,171,184,231],"preserve":[74],"information":[75],"beyond":[76],"a":[77,88,208,267,289],"single":[78,209],"classification":[79,118],"task":[80,258],"(e.g.,":[81,145],"human":[82],"activity":[83],"recognition).":[84],"This":[85],"study":[86],"proposes":[87],"novel":[89],"method":[93,111,225,255],"based":[94],"on":[95,143,207,216],"Adversarial":[96],"Perturbations":[97],"(AP)":[98],"address":[100],"these":[101],"limitations.":[102],"By":[103],"generating":[104],"minimal":[105],"yet":[106],"targeted":[107],"noise,":[108],"proposed":[110,181,224,254],"significantly":[112],"degrades":[113],"accuracy":[115,228],"identity":[117,295],"while":[119,167,235,296],"retaining":[120,297],"essential":[121],"features":[122,166],"for":[123],"multiple":[124],"tasks":[125,174],"activity,":[128],"gender,":[129],"or":[130],"device-position":[131],"recognition.":[132],"Moreover,":[133],"enhance":[135],"robustness":[136],"against":[137,196],"frequency-domain":[138,199],"analysis,":[139],"additional":[140,272],"models":[141],"trained":[142],"transformed":[144],"short-time":[146],"Fourier":[147],"transform":[148],"(STFT))":[149],"representations":[150],"are":[151],"incorporated":[152],"into":[153],"perturbation":[155],"process.":[156],"A":[157],"multi-task":[158],"formulation":[159],"is":[160],"introduced":[161],"selectively":[163],"suppresses":[164],"person-identifying":[165],"reinforcing":[168],"those":[169],"relevant":[170],"desired":[173],"without":[175,271],"retraining":[176],"large":[177],"autoencoder-based":[178],"architectures.":[179],"The":[180],"framework":[182],"is,":[183],"our":[185],"knowledge,":[186],"first":[188],"AP-based":[189],"technique":[191],"(i)":[193],"defends":[194],"simultaneously":[195],"time-":[197],"attacks":[200],"(ii)":[202],"allows":[203],"per-task":[204],"trade-off":[205,270],"control":[206],"forward-back-propagation":[210],"run,":[211],"enabling":[212],"real-time,":[213],"on-device":[214],"deployment":[215],"commodity":[217],"hardware.":[218],"On":[219],"three":[220],"public":[221],"datasets,":[222],"reduces":[226],"person-identification":[227],"from":[229],"60\u201390%":[230],"near-chance":[232],"levels":[233],"(%)":[234],"preserving":[236],"original":[238],"activity-recognition":[239],"F1":[240,259],"both":[241],"time":[244],"frequency":[246],"domains.":[247],"Compared":[248],"with":[249],"baseline":[251],"AAE,":[252],"improves":[256],"downstream":[257],"lowers":[261],"mean":[263],"squared":[264],"error,":[265],"demonstrating":[266],"better":[268],"privacy-utility":[269],"model":[273],"retraining.":[274],"These":[275],"findings":[276],"underscore":[277],"effectiveness":[279],"flexibility":[281],"AP":[283],"privacy-preserving":[285],"sensor-data":[286],"processing,":[287],"offering":[288],"practical":[290],"solution":[291],"safeguards":[293],"user":[294],"rich,":[298],"application-critical":[299],"information.":[300]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
