{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:ASLCVELXB366RDJUZ4BCAKBIAB","short_pith_number":"pith:ASLCVELX","schema_version":"1.0","canonical_sha256":"04962a91770efde88d34cf02202828007295959e0491ebc160907aab10bddbe5","source":{"kind":"arxiv","id":"1802.09359","version":1},"attestation_state":"computed","paper":{"title":"A Deep Learning Approach for Privacy Preservation in Assisted Living","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG"],"primary_cat":"eess.SP","authors_text":"Andreas Holzinger, Deepika Singh, Erinc Merdivan, Feng Chen, Ismini Psychoula, Johannes Kropf, Liming Chen, Matthieu Geist, Sten Hanke","submitted_at":"2018-02-22T15:19:54Z","abstract_excerpt":"In the era of Internet of Things (IoT) technologies the potential for privacy invasion is becoming a major concern especially in regards to healthcare data and Ambient Assisted Living (AAL) environments. Systems that offer AAL technologies make extensive use of personal data in order to provide services that are context-aware and personalized. This makes privacy preservation a very important issue especially since the users are not always aware of the privacy risks they could face. A lot of progress has been made in the deep learning field, however, there has been lack of research on privacy p"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1802.09359","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.SP","submitted_at":"2018-02-22T15:19:54Z","cross_cats_sorted":["cs.LG"],"title_canon_sha256":"a208cdeaf3f8fdd13a102cd92b7c6af3be211feefd6eeb92db171fa9118022e6","abstract_canon_sha256":"db6216bcac9dba2680ff7c1119d829b439dde72a86b46ee47a621319e5936d66"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:22:33.914497Z","signature_b64":"jPyWE7aFW0cTAmp3TT7aavVS50VjpuMoqUrOoFDtyyWORpTD7I2gVQcbvCABr+vZcCm7RivCvz3iBRxy9BpBCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"04962a91770efde88d34cf02202828007295959e0491ebc160907aab10bddbe5","last_reissued_at":"2026-05-18T00:22:33.913805Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:22:33.913805Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"A Deep Learning Approach for Privacy Preservation in Assisted Living","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG"],"primary_cat":"eess.SP","authors_text":"Andreas Holzinger, Deepika Singh, Erinc Merdivan, Feng Chen, Ismini Psychoula, Johannes Kropf, Liming Chen, Matthieu Geist, Sten Hanke","submitted_at":"2018-02-22T15:19:54Z","abstract_excerpt":"In the era of Internet of Things (IoT) technologies the potential for privacy invasion is becoming a major concern especially in regards to healthcare data and Ambient Assisted Living (AAL) environments. Systems that offer AAL technologies make extensive use of personal data in order to provide services that are context-aware and personalized. This makes privacy preservation a very important issue especially since the users are not always aware of the privacy risks they could face. A lot of progress has been made in the deep learning field, however, there has been lack of research on privacy p"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1802.09359","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1802.09359","created_at":"2026-05-18T00:22:33.913894+00:00"},{"alias_kind":"arxiv_version","alias_value":"1802.09359v1","created_at":"2026-05-18T00:22:33.913894+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1802.09359","created_at":"2026-05-18T00:22:33.913894+00:00"},{"alias_kind":"pith_short_12","alias_value":"ASLCVELXB366","created_at":"2026-05-18T12:32:13.499390+00:00"},{"alias_kind":"pith_short_16","alias_value":"ASLCVELXB366RDJU","created_at":"2026-05-18T12:32:13.499390+00:00"},{"alias_kind":"pith_short_8","alias_value":"ASLCVELX","created_at":"2026-05-18T12:32:13.499390+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":1,"internal_anchor_count":0,"sample":[{"citing_arxiv_id":"2605.03069","citing_title":"Distributed Deep Variational Approach for Privacy-preserving Data Release","ref_index":27,"is_internal_anchor":false}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/ASLCVELXB366RDJUZ4BCAKBIAB","json":"https://pith.science/pith/ASLCVELXB366RDJUZ4BCAKBIAB.json","graph_json":"https://pith.science/api/pith-number/ASLCVELXB366RDJUZ4BCAKBIAB/graph.json","events_json":"https://pith.science/api/pith-number/ASLCVELXB366RDJUZ4BCAKBIAB/events.json","paper":"https://pith.science/paper/ASLCVELX"},"agent_actions":{"view_html":"https://pith.science/pith/ASLCVELXB366RDJUZ4BCAKBIAB","download_json":"https://pith.science/pith/ASLCVELXB366RDJUZ4BCAKBIAB.json","view_paper":"https://pith.science/paper/ASLCVELX","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1802.09359&json=true","fetch_graph":"https://pith.science/api/pith-number/ASLCVELXB366RDJUZ4BCAKBIAB/graph.json","fetch_events":"https://pith.science/api/pith-number/ASLCVELXB366RDJUZ4BCAKBIAB/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/ASLCVELXB366RDJUZ4BCAKBIAB/action/timestamp_anchor","attest_storage":"https://pith.science/pith/ASLCVELXB366RDJUZ4BCAKBIAB/action/storage_attestation","attest_author":"https://pith.science/pith/ASLCVELXB366RDJUZ4BCAKBIAB/action/author_attestation","sign_citation":"https://pith.science/pith/ASLCVELXB366RDJUZ4BCAKBIAB/action/citation_signature","submit_replication":"https://pith.science/pith/ASLCVELXB366RDJUZ4BCAKBIAB/action/replication_record"}},"created_at":"2026-05-18T00:22:33.913894+00:00","updated_at":"2026-05-18T00:22:33.913894+00:00"}