Federated Learning for Human Activity Recognition: Overview, Advances, and Challenges

被引:3
作者
Aouedi, Ons [1 ]
Sacco, Alessio [2 ]
Khan, Latif U. [3 ]
Nguyen, Dinh C. [4 ]
Guizani, Mohsen [3 ]
机构
[1] Univ Luxembourg, SnT, L-1359 Luxembourg, Luxembourg
[2] Politecn Torino, DAUIN, I-10129 Turin, Italy
[3] Mohamed bin Zayed Univ Artificial Intelligence, Machine Learning Dept, Abu Dhabi, U Arab Emirates
[4] Univ Alabama Huntsville, Dept Elect & Comp Engn, Huntsville, AL USA
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2024年 / 5卷
关键词
Surveys; Human activity recognition; Training; Data privacy; Data models; Computer architecture; Privacy; Federated learning; Convergence; Monitoring; machine learning; human activity recognition; data privacy; AGGREGATION; PRIVACY; FRAMEWORK;
D O I
10.1109/OJCOMS.2024.3484228
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Human Activity Recognition (HAR) has seen remarkable advances in recent years, driven by the widespread use of wearable devices and the increasing demand for personalized healthcare and activity tracking. Federated Learning (FL) is a promising paradigm for HAR that enables the collaborative training of machine learning models on decentralized devices while preserving data privacy. It improves not only data privacy but also training efficiency as it utilizes the computing power and data of potentially millions of smart devices for parallel training. In addition, it helps end-user devices avoid sending users' private data to the cloud, eliminates the need for a network connection, and saves the latency of back-and-forth communication. FL also offers significant advantages for communication by reducing the amount of data transmitted over the network, alleviating network congestion and reducing communication costs. By distributing the training process across devices, FL minimizes the need for centralized data storage and processing, leading to more scalable and resilient systems. This paper provides a comprehensive survey of the integration of FL into HAR applications. Unlike existing reviews, this paper uniquely focuses on the intersection of FL and HAR, providing an in-depth analysis of recent advances and their practical implications. We explore key advances in FL-based HAR methodologies, including model architectures, optimization techniques, and different applications. Furthermore, we highlight the major challenges and future research questions in this domain, such as model personalization and robustness, privacy concerns, concept drift, and the limited capacity of edge devices.
引用
收藏
页码:7341 / 7367
页数:27
相关论文
共 158 条
[41]  
Ek S., 2021, P WORKSH AI INT THIN, P1
[42]   Evaluation of Federated Learning Aggregation Algorithms [J].
Ek, Sannara ;
Portet, Francois ;
Lalanda, Philippe ;
Vega, German .
UBICOMP/ISWC '20 ADJUNCT: PROCEEDINGS OF THE 2020 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2020 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS, 2020, :638-643
[43]   HeteroSAg: Secure Aggregation With Heterogeneous Quantization in Federated Learning [J].
Elkordy, Ahmed Roushdy ;
Avestimehr, A. Salman .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (04) :2372-2386
[44]  
Ezzeldin YH, 2023, AAAI CONF ARTIF INTE, P7494
[45]   Highly efficient federated learning with strong privacy preservation in cloud computing [J].
Fang, Chen ;
Guo, Yuanbo ;
Wang, Na ;
Ju, Ankang .
COMPUTERS & SECURITY, 2020, 96
[46]  
Fang MH, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1623
[47]   Blockchain Federated Learning for In-Home Health Monitoring [J].
Farooq, Komal ;
Syed, Hassan Jamil ;
Alqahtani, Samar Othman ;
Nagmeldin, Wamda ;
Ibrahim, Ashraf Osman ;
Gani, Abdullah .
ELECTRONICS, 2023, 12 (01)
[48]   Federated Learning via Augmented Knowledge Distillation for Heterogenous Deep Human Activity Recognition Systems [J].
Gad, Gad ;
Fadlullah, Zubair .
SENSORS, 2023, 23 (01)
[49]  
Gao DS, 2020, Arxiv, DOI arXiv:1909.05784
[50]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178