Skip to main content
Top
Published in: Neural Processing Letters 3/2023

10-03-2023

Secure Multi-Party Computation for Personalized Human Activity Recognition

Authors: David Melanson, Ricardo Maia, Hee-Seok Kim, Anderson Nascimento, Martine De Cock

Published in: Neural Processing Letters | Issue 3/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Calibrating Human Activity Recognition (HAR) models to end-users with Transfer Learning (TL) often yields significant accuracy improvements. Such TL is by design done based on very personal data collected by sensors worn close to the human body. To protect the users’ privacy, we therefore introduce Secure Multi-Party Computation (MPC) protocols for personalization of HAR models, and for secure activity recognition with the personalized models. Our MPC protocols do not require the end-users to reveal their sensitive data in an unencrypted manner, nor do they require the application developer to disclose their trained model parameters or any other sensitive or proprietary information with anyone in plaintext. Through experiments on HAR benchmark datasets, we demonstrate that our privacy-preserving solution yields the same accuracy gains as TL in-the-clear, i.e. when no measures to protect privacy are in place, and that our approach is fast enough for use in practice.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Throughout this paper, we use the terms “secure” and “privacy-preserving” as synonyms.
 
Literature
1.
go back to reference Pan SJ, Yang Q (2009) A survey on transfer learning. IEEE Trans Knowl Data Eng 22(10):1345–1359CrossRef Pan SJ, Yang Q (2009) A survey on transfer learning. IEEE Trans Knowl Data Eng 22(10):1345–1359CrossRef
2.
go back to reference Yang Q, Zhang Y, Dai W, Pan SJ (2020) Transfer learning. Cambridge University Press, UKCrossRef Yang Q, Zhang Y, Dai W, Pan SJ (2020) Transfer learning. Cambridge University Press, UKCrossRef
3.
go back to reference Zhuang F, Qi Z, Duan K, Xi D, Zhu Y, Zhu H, Xiong H, He Q (2021) A comprehensive survey on transfer learning. Proc IEEE 109(1):43–76CrossRef Zhuang F, Qi Z, Duan K, Xi D, Zhu Y, Zhu H, Xiong H, He Q (2021) A comprehensive survey on transfer learning. Proc IEEE 109(1):43–76CrossRef
4.
go back to reference Hernandez N, Lundström J, Favela J, McChesney I, Arnrich B (2020) Literature review on transfer learning for human activity recognition using mobile and wearable devices with environmental technology. Springer Nature Computer Science 1(66) Hernandez N, Lundström J, Favela J, McChesney I, Arnrich B (2020) Literature review on transfer learning for human activity recognition using mobile and wearable devices with environmental technology. Springer Nature Computer Science 1(66)
5.
go back to reference Mehrang S, Pietila J, Tolonen J, Helander E, Jimison H, Pavel M, Korhonen I (2017) Human activity recognition using a single optical heart rate monitoring wristband equipped with triaxial accelerometer. In: Joint conference of the European Medical and Biological Engineering Conference (EMBEC) and the nordic-baltic conference on biomedical engineering and medical physics (NBC), pp 587–590 Mehrang S, Pietila J, Tolonen J, Helander E, Jimison H, Pavel M, Korhonen I (2017) Human activity recognition using a single optical heart rate monitoring wristband equipped with triaxial accelerometer. In: Joint conference of the European Medical and Biological Engineering Conference (EMBEC) and the nordic-baltic conference on biomedical engineering and medical physics (NBC), pp 587–590
6.
go back to reference Shoaib M, Bosch S, Incel O, Scholten H, Havinga P (2014) Fusion of smartphone motion sensors for physical activity recognition. Sensors 14:10146–10176CrossRef Shoaib M, Bosch S, Incel O, Scholten H, Havinga P (2014) Fusion of smartphone motion sensors for physical activity recognition. Sensors 14:10146–10176CrossRef
7.
go back to reference Lin C-Y, Marculescu R (2020) Model personalization for human activity recognition. In: 2020 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops) Lin C-Y, Marculescu R (2020) Model personalization for human activity recognition. In: 2020 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops)
8.
go back to reference Lin Y-P, Jung T-P (2017) Improving EEG-based emotion classification using conditional transfer learning. Front Hum Neurosci 11:334CrossRef Lin Y-P, Jung T-P (2017) Improving EEG-based emotion classification using conditional transfer learning. Front Hum Neurosci 11:334CrossRef
9.
go back to reference Wu D, Xu Y, Lu B.-L (2020) Transfer learning for EEG-based brain-computer interfaces: a review of progress made since 2016. IEEE Trans Cognit Dev Syst, pp 4–19 Wu D, Xu Y, Lu B.-L (2020) Transfer learning for EEG-based brain-computer interfaces: a review of progress made since 2016. IEEE Trans Cognit Dev Syst, pp 4–19
10.
go back to reference Carlini N, Liu C, Erlingsson Ú, Kos J, Song D (2019) The secret sharer: evaluating and testing unintended memorization in neural networks. In: 28th USENIX security symposium, pp 267–284 Carlini N, Liu C, Erlingsson Ú, Kos J, Song D (2019) The secret sharer: evaluating and testing unintended memorization in neural networks. In: 28th USENIX security symposium, pp 267–284
11.
go back to reference Balli S, Saǧbaş EA, Peker M (2019) Human activity recognition from smart watch sensor data using a hybrid of principal component analysis and random forest algorithm. Meas Control 52(1–2):37–45CrossRef Balli S, Saǧbaş EA, Peker M (2019) Human activity recognition from smart watch sensor data using a hybrid of principal component analysis and random forest algorithm. Meas Control 52(1–2):37–45CrossRef
12.
go back to reference Cramer R, Damgard I, Nielsen J (2015) Secure multiparty computation and secret sharing. Cambridge University Press, New York Cramer R, Damgard I, Nielsen J (2015) Secure multiparty computation and secret sharing. Cambridge University Press, New York
13.
go back to reference Kairouz P, McMahan HB, Avent B, Bellet A, Bennis M, Bhagoji AN, Bonawitz K, Charles Z, Cormode G, Cummings R, D’Oliveira RGL, Eichner H, Rouayheb SE, Evans D, Gardner J, Garrett Z, Gascón A, Ghazi B, Gibbons PB, Gruteser M, Harchaoui Z, He C, He L, Huo Z, Hutchinson B, Hsu J, Jaggi M, Javidi T, Joshi G, Khodak M, Konecný J, Korolova A, Koushanfar F, Koyejo S, Lepoint T, Liu Y, Mittal P, Mohri M, Nock R, Özgür A, Pagh R, Qi H, Ramage D, Raskar R, Raykova M, Song D, Song W, Stich SU, Sun Z, Suresh AT, Tramèr F, Vepakomma P, Wang J, Xiong L, Xu Z, Yang Q, Yu FX, Yu H, Zhao S (2021) Advances and open problems in federated learning. Found Trends Mach Learn 14(1–2):1–210 Kairouz P, McMahan HB, Avent B, Bellet A, Bennis M, Bhagoji AN, Bonawitz K, Charles Z, Cormode G, Cummings R, D’Oliveira RGL, Eichner H, Rouayheb SE, Evans D, Gardner J, Garrett Z, Gascón A, Ghazi B, Gibbons PB, Gruteser M, Harchaoui Z, He C, He L, Huo Z, Hutchinson B, Hsu J, Jaggi M, Javidi T, Joshi G, Khodak M, Konecný J, Korolova A, Koushanfar F, Koyejo S, Lepoint T, Liu Y, Mittal P, Mohri M, Nock R, Özgür A, Pagh R, Qi H, Ramage D, Raskar R, Raykova M, Song D, Song W, Stich SU, Sun Z, Suresh AT, Tramèr F, Vepakomma P, Wang J, Xiong L, Xu Z, Yang Q, Yu FX, Yu H, Zhao S (2021) Advances and open problems in federated learning. Found Trends Mach Learn 14(1–2):1–210
14.
go back to reference Presotto R, Civitarese G, Bettini C (2022) FedCLAR: federated clustering for personalized sensor-based human activity recognition. In: 2022 IEEE international conference on pervasive computing and communications (PerCom), pp 227–236 Presotto R, Civitarese G, Bettini C (2022) FedCLAR: federated clustering for personalized sensor-based human activity recognition. In: 2022 IEEE international conference on pervasive computing and communications (PerCom), pp 227–236
15.
go back to reference Chen Y, Qin X, Wang J, Yu C, Gao W (2020) FedHealth: a federated transfer learning framework for wearable healthcare. IEEE Intell Syst 35(4):83–93CrossRef Chen Y, Qin X, Wang J, Yu C, Gao W (2020) FedHealth: a federated transfer learning framework for wearable healthcare. IEEE Intell Syst 35(4):83–93CrossRef
16.
go back to reference Hu R, Guo Y, Li H, Pei Q, Gong Y (2020) Personalized federated learning with differential privacy. IEEE Internet Things J 7(10):9530–9539CrossRef Hu R, Guo Y, Li H, Pei Q, Gong Y (2020) Personalized federated learning with differential privacy. IEEE Internet Things J 7(10):9530–9539CrossRef
17.
go back to reference Liu S, Wang J, Zhang W (2021) Federated personalized random forest for human activity recognition. Math Biosci Eng 19:953–971CrossRefMATH Liu S, Wang J, Zhang W (2021) Federated personalized random forest for human activity recognition. Math Biosci Eng 19:953–971CrossRefMATH
18.
go back to reference Dwork C, Roth A (2014) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3–4):211–407MathSciNetMATH Dwork C, Roth A (2014) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3–4):211–407MathSciNetMATH
19.
go back to reference Hashemian M, Razzazi F, Zarrabi H, Moin MS (2019) A privacy-preserving distributed transfer learning in activity recognition. Telecommun Syst: Model Anal Des Manag 72(1):69–79CrossRef Hashemian M, Razzazi F, Zarrabi H, Moin MS (2019) A privacy-preserving distributed transfer learning in activity recognition. Telecommun Syst: Model Anal Des Manag 72(1):69–79CrossRef
20.
go back to reference Hashemian M, Razzazi F, Zarrabi H, Moin M (2021) Semi-supervised and unsupervised privacy-preserving distributed transfer learning approach in HAR systems. Wirel Pers Commun 117:1–18CrossRef Hashemian M, Razzazi F, Zarrabi H, Moin M (2021) Semi-supervised and unsupervised privacy-preserving distributed transfer learning approach in HAR systems. Wirel Pers Commun 117:1–18CrossRef
21.
go back to reference Evans D, Kolesnikov V, Rosulek M (2018) A pragmatic introduction to secure multi-party computation. Found Trends Privacy Secur 2(2–3):70–246CrossRef Evans D, Kolesnikov V, Rosulek M (2018) A pragmatic introduction to secure multi-party computation. Found Trends Privacy Secur 2(2–3):70–246CrossRef
22.
go back to reference Dalskov A, Escudero D, Keller M (2020) Secure evaluation of quantized neural networks. Proc Privacy Enh Technol 2020(4):355–375 Dalskov A, Escudero D, Keller M (2020) Secure evaluation of quantized neural networks. Proc Privacy Enh Technol 2020(4):355–375
23.
go back to reference De Cock M, Dowsley R, Horst C, Katti R, Nascimento A, Poon W-S, Truex S (2019) Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation. IEEE Trans Dependable Secure Comput 16(2):217–230CrossRef De Cock M, Dowsley R, Horst C, Katti R, Nascimento A, Poon W-S, Truex S (2019) Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation. IEEE Trans Dependable Secure Comput 16(2):217–230CrossRef
24.
go back to reference Fritchman K, Saminathan K, Dowsley R, Hughes T, De Cock M, Nascimento A, Teredesai A (2018) Privacy-preserving scoring of tree ensembles: a novel framework for AI in healthcare. In: Proceedings of 2018 IEEE BigData, pp 2412–2421 Fritchman K, Saminathan K, Dowsley R, Hughes T, De Cock M, Nascimento A, Teredesai A (2018) Privacy-preserving scoring of tree ensembles: a novel framework for AI in healthcare. In: Proceedings of 2018 IEEE BigData, pp 2412–2421
25.
go back to reference Juvekar C, Vaikuntanathan V, Chandrakasan A (2018) GAZELLE: a low latency framework for secure neural network inference. In: 27th USENIX security symposium, pp 1651–1669 Juvekar C, Vaikuntanathan V, Chandrakasan A (2018) GAZELLE: a low latency framework for secure neural network inference. In: 27th USENIX security symposium, pp 1651–1669
26.
go back to reference Kumar N, Rathee M, Chandran N, Gupta D, Rastogi A, Sharma R (2020) CrypTFlow: secure TensorFlow inference. In: 41st IEEE symposium on security and privacy, pp 336–353 Kumar N, Rathee M, Chandran N, Gupta D, Rastogi A, Sharma R (2020) CrypTFlow: secure TensorFlow inference. In: 41st IEEE symposium on security and privacy, pp 336–353
27.
go back to reference Liu J, Juuti M, Lu Y, Asokan N (2017) Oblivious neural network predictions via MiniONN transformations. In: ACM SIGSAC conference on computer and communications security, pp 619–631 Liu J, Juuti M, Lu Y, Asokan N (2017) Oblivious neural network predictions via MiniONN transformations. In: ACM SIGSAC conference on computer and communications security, pp 619–631
28.
go back to reference Reich D, Todoki A, Dowsley R, De Cock M, Nascimento A (2019) Privacy-preserving classification of personal text messages with secure multi-party computation. In: Advances in neural information processing systems (NeurIPS), vol 32, pp 3752–3764 Reich D, Todoki A, Dowsley R, De Cock M, Nascimento A (2019) Privacy-preserving classification of personal text messages with secure multi-party computation. In: Advances in neural information processing systems (NeurIPS), vol 32, pp 3752–3764
29.
go back to reference Riazi S, Weinert C, Tkachenko O, Songhori E.M, Schneider T, Koushanfar F (2018) Chameleon: A hybrid secure computation framework for machine learning applications. In: Asia conference on computer and communications security, pp 707–721. ACM Riazi S, Weinert C, Tkachenko O, Songhori E.M, Schneider T, Koushanfar F (2018) Chameleon: A hybrid secure computation framework for machine learning applications. In: Asia conference on computer and communications security, pp 707–721. ACM
30.
go back to reference Rouhani B.D, Riazi M.S, Koushanfar F (2018) DeepSecure: scalable provably-secure deep learning. In: 55th Annual design automation conference (DAC) Rouhani B.D, Riazi M.S, Koushanfar F (2018) DeepSecure: scalable provably-secure deep learning. In: 55th Annual design automation conference (DAC)
31.
go back to reference Agarwal A, Dowsley R, McKinney ND, Wu D, Lin C-T, De Cock M, Nascimento A (2019) Protecting privacy of users in brain-computer interface applications. IEEE Trans Neural Syst Rehabil Eng 27(8):1546–1555CrossRef Agarwal A, Dowsley R, McKinney ND, Wu D, Lin C-T, De Cock M, Nascimento A (2019) Protecting privacy of users in brain-computer interface applications. IEEE Trans Neural Syst Rehabil Eng 27(8):1546–1555CrossRef
32.
go back to reference De Cock M, Dowsley R, Nascimento ACA, Newman SC (2015) Fast, privacy preserving linear regression over distributed datasets based on pre-distributed data. In: Proceedings of the 8th ACM workshop on artificial intelligence and security, pp 3–14 De Cock M, Dowsley R, Nascimento ACA, Newman SC (2015) Fast, privacy preserving linear regression over distributed datasets based on pre-distributed data. In: Proceedings of the 8th ACM workshop on artificial intelligence and security, pp 3–14
33.
go back to reference Nikolaenko V, Weinsberg U, Ioannidis S, Joye M, Boneh D, Taft N (2013) Privacy-preserving ridge regression on hundreds of millions of records. In: 2013 IEEE symposium on security and privacy (SP), pp 334–348 Nikolaenko V, Weinsberg U, Ioannidis S, Joye M, Boneh D, Taft N (2013) Privacy-preserving ridge regression on hundreds of millions of records. In: 2013 IEEE symposium on security and privacy (SP), pp 334–348
34.
go back to reference Abspoel M, Escudero D, Volgushev N (2021) Secure training of decision trees with continuous attributes. Proc Privacy Enh Technol 2021(1):167–187 Abspoel M, Escudero D, Volgushev N (2021) Secure training of decision trees with continuous attributes. Proc Privacy Enh Technol 2021(1):167–187
35.
go back to reference de Hoogh S, Schoenmakers B, Chen P, op den Akker H (2014) Practical secure decision tree learning in a teletreatment application. In: International conference on financial cryptography and data security, pp 179–194 de Hoogh S, Schoenmakers B, Chen P, op den Akker H (2014) Practical secure decision tree learning in a teletreatment application. In: International conference on financial cryptography and data security, pp 179–194
36.
go back to reference Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: Annual international cryptology conference, pp 36–54 Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: Annual international cryptology conference, pp 36–54
37.
go back to reference Adams S, Choudhary C, De Cock M, Dowsley R, Melanson D, Nascimento AC, Railsback D, Shen J (2022) Privacy-preserving training of tree ensembles over continuous data. Proc Privacy Enh Technol 2:205–226 Adams S, Choudhary C, De Cock M, Dowsley R, Melanson D, Nascimento AC, Railsback D, Shen J (2022) Privacy-preserving training of tree ensembles over continuous data. Proc Privacy Enh Technol 2:205–226
38.
go back to reference Agrawal N, Shahin Shamsabadi A, Kusner M.J, Gascón A (2019) QUOTIENT: two-party secure neural network training and prediction. In: ACM SIGSAC conference on computer and communications security, pp 1231–1247 Agrawal N, Shahin Shamsabadi A, Kusner M.J, Gascón A (2019) QUOTIENT: two-party secure neural network training and prediction. In: ACM SIGSAC conference on computer and communications security, pp 1231–1247
39.
go back to reference De Cock M, Dowsley R, Nascimento ACA, Railsback D, Shen J, Todoki A (2021) High performance logistic regression for privacy-preserving genome analysis. BMC Med Genomics 14(1):23CrossRef De Cock M, Dowsley R, Nascimento ACA, Railsback D, Shen J, Todoki A (2021) High performance logistic regression for privacy-preserving genome analysis. BMC Med Genomics 14(1):23CrossRef
40.
go back to reference Guo C, Hannun A, Knott B, van der Maaten L, Tygert M, Zhu R (2021) Secure multiparty computations in floating-point arithmetic. Inf Inference: J IMA 11(1):103–135MathSciNetCrossRefMATH Guo C, Hannun A, Knott B, van der Maaten L, Tygert M, Zhu R (2021) Secure multiparty computations in floating-point arithmetic. Inf Inference: J IMA 11(1):103–135MathSciNetCrossRefMATH
41.
go back to reference Mohassel P, Zhang Y (2017) SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE symposium on security and privacy (SP), pp 19–38 Mohassel P, Zhang Y (2017) SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE symposium on security and privacy (SP), pp 19–38
42.
go back to reference Wagh S, Gupta D, Chandran N (2019) SecureNN: 3-party secure computation for neural network training. Proc Privacy Enh Technol 2019(3):26–49 Wagh S, Gupta D, Chandran N (2019) SecureNN: 3-party secure computation for neural network training. Proc Privacy Enh Technol 2019(3):26–49
43.
go back to reference Beaver D (1997) Commodity-based cryptography (extended abstract). In: Proceedings of the twenty-ninth annual ACM symposium on theory of computing. STOC ’97, pp 446–455 Beaver D (1997) Commodity-based cryptography (extended abstract). In: Proceedings of the twenty-ninth annual ACM symposium on theory of computing. STOC ’97, pp 446–455
44.
go back to reference Rabin MO (2008) How to exchange secrets with oblivious transfer. IACR Cryptol. ePrint Arch 2005(187) Rabin MO (2008) How to exchange secrets with oblivious transfer. IACR Cryptol. ePrint Arch 2005(187)
45.
go back to reference Araki T, Furukawa J, Lindell Y, Nof A, Ohara K (2016) High-throughput semi-honest secure three-party computation with an honest majority. In: ACM SIGSAC Conference on computer and communications security, pp 805–817 Araki T, Furukawa J, Lindell Y, Nof A, Ohara K (2016) High-throughput semi-honest secure three-party computation with an honest majority. In: ACM SIGSAC Conference on computer and communications security, pp 805–817
46.
go back to reference Keller M (2020) MP-SPDZ: a versatile framework for multi-party computation. In: Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, pp 1575–1590 Keller M (2020) MP-SPDZ: a versatile framework for multi-party computation. In: Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, pp 1575–1590
47.
go back to reference Mishra P, Lehmkuhl R, Srinivasan A, Zheng W, Popa RA (2020) Delphi: a cryptographic inference service for neural networks. In: 29th USENIX security symposium, pp 2505–2522 Mishra P, Lehmkuhl R, Srinivasan A, Zheng W, Popa RA (2020) Delphi: a cryptographic inference service for neural networks. In: 29th USENIX security symposium, pp 2505–2522
48.
go back to reference Adams S, Melanson D, De Cock M (2021) Private text classification with convolutional neural networks. In: Proceedings of the third workshop on privacy in natural language processing (NAACL Workshops), pp 53–58 Adams S, Melanson D, De Cock M (2021) Private text classification with convolutional neural networks. In: Proceedings of the third workshop on privacy in natural language processing (NAACL Workshops), pp 53–58
49.
go back to reference Escudero D, Ghosh S, Keller M, Rachuri R, Scholl P (2020) Improved primitives for MPC over mixed arithmetic-binary circuits. In: Annual international cryptology conference, pp 823–852 Escudero D, Ghosh S, Keller M, Rachuri R, Scholl P (2020) Improved primitives for MPC over mixed arithmetic-binary circuits. In: Annual international cryptology conference, pp 823–852
50.
go back to reference Barshan B, Yüksek MC (2014) Recognizing daily and sports activities in two open source machine learning environments using body-worn sensor units. Comput J 57(11):1649–1667CrossRef Barshan B, Yüksek MC (2014) Recognizing daily and sports activities in two open source machine learning environments using body-worn sensor units. Comput J 57(11):1649–1667CrossRef
Metadata
Title
Secure Multi-Party Computation for Personalized Human Activity Recognition
Authors
David Melanson
Ricardo Maia
Hee-Seok Kim
Anderson Nascimento
Martine De Cock
Publication date
10-03-2023
Publisher
Springer US
Published in
Neural Processing Letters / Issue 3/2023
Print ISSN: 1370-4621
Electronic ISSN: 1573-773X
DOI
https://doi.org/10.1007/s11063-023-11182-8

Other articles of this Issue 3/2023

Neural Processing Letters 3/2023 Go to the issue