<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMU</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Mhealth Uhealth</journal-id>
      <journal-title>JMIR mHealth and uHealth</journal-title>
      <issn pub-type="epub">2291-5222</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v9i3e23728</article-id>
      <article-id pub-id-type="pmid">33783362</article-id>
      <article-id pub-id-type="doi">10.2196/23728</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Learning From Others Without Sacrificing Privacy: Simulation Comparing Centralized and Federated Machine Learning on Mobile Health Data</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Buis</surname>
            <given-names>Lorraine</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Xiong</surname>
            <given-names>Li</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Friedrich</surname>
            <given-names>Christoph</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>Jessica Chia</given-names>
          </name>
          <degrees>MA</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Statistics</institution>
            <institution>University of Michigan</institution>
            <addr-line>1085 South University Ave</addr-line>
            <addr-line>Ann Arbor, MI, 48109</addr-line>
            <country>United States</country>
            <phone>1 7346474820</phone>
            <email>liujess@umich.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6194-7415</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Goetz</surname>
            <given-names>Jack</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-9954-9460</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Sen</surname>
            <given-names>Srijan</given-names>
          </name>
          <degrees>MD, PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-4495-495X</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Tewari</surname>
            <given-names>Ambuj</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6969-7844</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Statistics</institution>
        <institution>University of Michigan</institution>
        <addr-line>Ann Arbor, MI</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Molecular and Behavioral Neuroscience Institute</institution>
        <institution>University of Michigan</institution>
        <addr-line>Ann Arbor, MI</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Department of Psychiatry</institution>
        <institution>University of Michigan</institution>
        <addr-line>Ann Arbor, MI</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Jessica Chia Liu <email>liujess@umich.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>3</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>30</day>
        <month>3</month>
        <year>2021</year>
      </pub-date>
      <volume>9</volume>
      <issue>3</issue>
      <elocation-id>e23728</elocation-id>
      <history>
        <date date-type="received">
          <day>21</day>
          <month>8</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>18</day>
          <month>11</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>10</day>
          <month>12</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>25</day>
          <month>2</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Jessica Chia Liu, Jack Goetz, Srijan Sen, Ambuj Tewari. Originally published in JMIR mHealth and uHealth (http://mhealth.jmir.org), 30.03.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mHealth and uHealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://mhealth.jmir.org/2021/3/e23728" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The use of wearables facilitates data collection at a previously unobtainable scale, enabling the construction of complex predictive models with the potential to improve health. However, the highly personal nature of these data requires strong privacy protection against data breaches and the use of data in a way that users do not intend. One method to protect user privacy while taking advantage of sharing data across users is federated learning, a technique that allows a machine learning model to be trained using data from all users while only storing a user’s data on that user’s device. By keeping data on users’ devices, federated learning protects users’ private data from data leaks and breaches on the researcher’s central server and provides users with more control over how and when their data are used. However, there are few rigorous studies on the effectiveness of federated learning in the mobile health (mHealth) domain. </p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>We review federated learning and assess whether it can be useful in the mHealth field, especially for addressing common mHealth challenges such as privacy concerns and user heterogeneity. The aims of this study are to describe federated learning in an mHealth context, apply a simulation of federated learning to an mHealth data set, and compare the performance of federated learning with the performance of other predictive models. </p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We applied a simulation of federated learning to predict the affective state of 15 subjects using physiological and motion data collected from a chest-worn device for approximately 36 minutes. We compared the results from this federated model with those from a centralized or server model and with the results from training individual models for each subject.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>In a 3-class classification problem using physiological and motion data to predict whether the subject was undertaking a neutral, amusing, or stressful task, the federated model achieved 92.8% accuracy on average, the server model achieved 93.2% accuracy on average, and the individual model achieved 90.2% accuracy on average. </p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Our findings support the potential for using federated learning in mHealth. The results showed that the federated model performed better than a model trained separately on each individual and nearly as well as the server model. As federated learning offers more privacy than a server model, it may be a valuable option for designing sensitive data collection methods.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>privacy</kwd>
        <kwd>data protection</kwd>
        <kwd>machine learning</kwd>
        <kwd>mobile health</kwd>
        <kwd>wearable electronic devices</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Mobile Health Data</title>
        <p>The ubiquitous nature of wearables generates considerable potential for data collection and analysis but comes with the issue of protecting user privacy. Some important privacy considerations are protecting patient confidentiality [<xref ref-type="bibr" rid="ref1">1</xref>], protecting against security breaches [<xref ref-type="bibr" rid="ref2">2</xref>], and protecting against researchers using user data in a way that the user did not intend [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>]. Individuals may be more willing to participate in studies and disclose information if these concerns are alleviated [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref6">6</xref>]. Privacy breaches can occur when data servers are compromised but can also occur when data are shared for legitimate purposes by well-intentioned members of the medical community [<xref ref-type="bibr" rid="ref7">7</xref>]. In this paper, we use privacy to denote the aspects related to protecting the identity, personal information, and use of the data of users.</p>
        <p>Mobile health (mHealth) data are often related to the cognitive, behavioral, and affective states of users, making such data highly sensitive. Therefore, we want to ensure that individuals’ confidential health information is not leaked to others. Wearables passively record a range of medically relevant data, such as temperature, heart rate, and electrodermal activity (EDA). As people may carry these items with them throughout the day, this allows for high-frequency collection of data from more people, who may have a greater variety of health conditions, than ever before. Such rich data collection opens up the possibility of using increasingly powerful but data hungry machine learning methods in the analysis of these data [<xref ref-type="bibr" rid="ref8">8</xref>].</p>
        <p>In this paper, we apply predictive machine learning models on the publicly available <italic>Wearable Stress and Affect Detection</italic> (WESAD) data set published by Schmidt et al [<xref ref-type="bibr" rid="ref9">9</xref>]. In particular, we focus on models that can be trained by fitting a function, potentially nonlinear, to the data using gradient descent and variants thereof. Many of these models make few assumptions about the structure of the underlying data-generating process. To improve privacy, we propose leaving each user’s data on their personal device and training our models using federated learning. In federated learning, there is no single server that contains all users’ information. Instead, model training occurs on each individual’s device, and only model parameter updates leave the user’s device. This allows for more user privacy by maintaining data only on individual user devices. In addition, as explained later, federated learning is still able to take advantage of some shared information across individuals. Thus, it can alleviate some of the concerns in analyzing mHealth data, such as user heterogeneity and privacy preservation.</p>
      </sec>
      <sec>
        <title>Federated Learning</title>
        <p>Before further describing federated learning, we establish some common terminology. The goal is to produce a model, often a neural network, trained using data from many individuals. Each individual will have a mobile device, which we call a <italic>user device</italic>—in the networking literature, these are called <italic>clients</italic>—and we will not make a distinction between an individual and their user device. Each user device has its own private data, and the data will never leave the user device. Storing private data on each user device instead of uploading them centrally is the source of improved privacy provided by federated learning. We will also have a single device controlled by the researchers that can communicate with each user device, and we will call the former device the <italic>server.</italic> The server will coordinate the training procedure and store a copy of the model but will not have any private data uploaded onto it. The training process is iterative, as is common for many machine learning models. Each time the model parameters on the server change, we will call that one server training round (or server training iteration).</p>
        <p>In <xref rid="figure1" ref-type="fig">Figure 1</xref>, we compare how a model is trained on a central server (top) with how a model is trained using federated learning (bottom). In federated learning, one server training round comprises the following three distinct parts:</p>
        <list list-type="order">
          <list-item>
            <p>Broadcast: A small number of user devices will be selected at random, and the current server model will be transmitted to that cohort of user devices.</p>
          </list-item>
          <list-item>
            <p>Local update: Each of these user devices will perform a small amount of training of the model they received, using the data from the user device.</p>
          </list-item>
          <list-item>
            <p>Update aggregation: Each user device in this cohort will then transmit a copy of their (locally updated) model parameters to the server. The server then averages these parameters and replaces the server model parameters with these new averaged parameters.</p>
          </list-item>
        </list>
        <p>The server then repeats this process by selecting a new cohort of user devices for each server training round. Thus, the data from every user device contribute to the training of the model. Algorithm 1 (<xref rid="figure2" ref-type="fig">Figure 2</xref>) presents the pseudocode, and a full algorithmic description is provided in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Diagram comparing central and federated learning workflows. Color abstractly represents the private information content at different locations, with red, blue, and green colors representing private information for different user devices. When training on a central server, user data are uploaded onto the server once. In federated learning, model parameters are updated on the user device, producing updates that contain less private information than the data themselves. The updates from many users are then aggregated, further mixing the contribution from each individual user.</p>
          </caption>
          <graphic xlink:href="mhealth_v9i3e23728_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Pseudocode for federated learning algorithm 1.</p>
          </caption>
          <graphic xlink:href="mhealth_v9i3e23728_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>The model trains using updates from the data on all user devices; however, individual, private, data remain only with each user device. This protects the privacy of users in several ways. Under federated learning, private data are significantly less vulnerable to the central server being compromised. The server never contains any raw private data and generally contains only the current model parameters. This protects users from being subject to adverse consequences of failings in the server’s security. Another benefit for users under federated learning is private data cannot be reused for other purposes at a later date. It cannot be shared or released either accidentally or in good faith but with inadequate anonymization measures. Finally, federated learning gives users the freedom to withdraw access to their data—both past and future—at any time without relying on guarantees from the researchers that any previously collected data will be deleted.</p>
        <p>Federated learning has been successfully applied in complex real-world applications, most notably in training the next-word prediction model for Google’s Keyboard [<xref ref-type="bibr" rid="ref10">10</xref>]. We refer interested readers to excellent surveys of federated learning [<xref ref-type="bibr" rid="ref11">11</xref>-<xref ref-type="bibr" rid="ref13">13</xref>] and federated learning software and data sets [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
      </sec>
      <sec>
        <title>Previous Work</title>
        <p>There has been substantial research on privacy in mHealth and mood prediction using machine learning. Protecting the data of individual users stored in mHealth apps is important because the apps contain personal information about the user, information used to make treatment decisions, and information that could be misused for financial gain, among other concerns [<xref ref-type="bibr" rid="ref4">4</xref>]. Users’ willingness to disclose personal information in mobile data varies according to their demographics and personal characteristics [<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref16">16</xref>]. Concerns about privacy vary among different age groups; for example, some older people are less willing to use mHealth services [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref14">14</xref>] and are more likely to cite privacy concerns [<xref ref-type="bibr" rid="ref6">6</xref>]. As such, it is important to consider the target population when considering the amount of privacy guarantee needed. Increased privacy concerns about health information technologies reduce patients’ willingness to share information and reduce their positive attitudes toward the technologies [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. In the same vein, reducing privacy concerns makes patients more comfortable in sharing their health information [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. Sometimes, individuals are willing to give up some privacy if they consider mHealth technology as beneficial; however, this depends on the sensitivity of the information they are providing [<xref ref-type="bibr" rid="ref18">18</xref>]. Due to these privacy concerns, there are many innovations for increasing patient trust and privacy protection [<xref ref-type="bibr" rid="ref19">19</xref>].</p>
        <p>Many researchers have used machine learning methods, including neural networks, random forests, and support vector machines, to predict outcomes such as depression, mood, and stress using mobile data [<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref26">26</xref>]. Various physiological and behavioral features help predict these outcomes, such as skin temperature, EDA, 3-axis accelerometer data, mobility, sleep, and self-reported histories [<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. Detecting aberrations in some of these measures can help identify early signs of mental illness [<xref ref-type="bibr" rid="ref16">16</xref>].</p>
        <p>Personalization techniques in machine learning allow parts of a model to be specific to each user while other parts are shared between users, allowing both the sharing of data to estimate certain parameters and fitting to unmeasured covariates of each individual. To an extent, both unique traits among different individuals and commonalities across users are helpful in prediction. Some studies have taken advantage of this and grouped users based on common traits, finding that this improved mood prediction accuracy [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]. In the same vein, accounting for individual user differences is valuable in prediction using machine learning [<xref ref-type="bibr" rid="ref8">8</xref>]. There is growing recognition within the mHealth literature [<xref ref-type="bibr" rid="ref30">30</xref>] that there are trade-offs between individual and centrally trained models and that often there are reasons to make them work in tandem.</p>
        <p>In the Methods section, we describe federated learning in the context of mHealth by addressing some of the issues raised in the mHealth literature. Specifically, we discuss the application of federated learning using neural networks to make predictions from mHealth data. We address practical considerations for researchers who consider using federated learning for their study. We then evaluate the performance of federated learning on an mHealth data set to predict subjects’ affective states.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Federated Learning in mHealth</title>
        <p>Federated learning is a nascent field within machine learning [<xref ref-type="bibr" rid="ref31">31</xref>], which arose, at least partially, in response to the opportunities and difficulties presented by personal devices that can record information and perform computation [<xref ref-type="bibr" rid="ref11">11</xref>]. As such, many practical challenges in mHealth, such as privacy [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>], user heterogeneity [<xref ref-type="bibr" rid="ref34">34</xref>], user hardware constraints [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>], and even incentivizing voluntary participation [<xref ref-type="bibr" rid="ref37">37</xref>], are already being studied by the machine learning community. The medical science community has also proposed ways to share information while preserving privacy, such as developing models in a distributed manner [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>], using a federated patient hashing framework for similar patient matching [<xref ref-type="bibr" rid="ref40">40</xref>], and using collaborative privacy-preserving training to detect protected health information in text [<xref ref-type="bibr" rid="ref41">41</xref>]. A recent paper describes how federated learning can be useful to various stakeholders in the mHealth field [<xref ref-type="bibr" rid="ref42">42</xref>].</p>
        <p>Federated learning provides a middle ground between extremes in privacy and data utilization. One extreme is collecting data centrally on the server and performing all analyses and training there. The other extreme is individual training, in which each user device trains a completely separate model on its own data.</p>
        <p>In centralized learning, we take all individual users’ raw data and store them in one location. This unlimited access gives researchers the most flexibility when analyzing the data—clearly any analysis that can be performed with limited data access can be performed with unlimited data access—and the best chance of extracting useful insights from the data. However, it is likely that some individuals are reluctant to have all of their raw data stored in a central location, as the central location could be hacked or because individuals feel that their data are too sensitive to be released. A model trained using federated learning is useful because it is trained without putting all individuals’ raw data together in one place. Not only does this help alleviate concerns about data privacy, but it can also help potential subjects be more willing to engage in studies, as their raw data will not be sent to a foreign central location. As we show in our case study, a model trained in a federated way performs almost as well as a centrally trained model. We refer to the former as the federated model and the latter as the server model.</p>
        <p>In individual training, each user device trains a separate model using only their own data; therefore, no information, besides potentially their final model, leaves the user device. We refer to this as the individual model. This provides a very high level of privacy. However, it prevents information sharing across users during model training. Federated learning takes advantage of the information shared across users, which can be especially useful when analyzing health care data. Each person’s characteristics and health care need personalization; however, there is also a lot of useful information that can be shared across people, as every person’s distribution is not entirely different. In training, the algorithm can learn from similar users and apply this knowledge when predicting another user’s outcome. It is significantly easier to use a federated model to make predictions for a new patient because there is a single model that is trained using data from many people, and we do not need previous data from the new patient. In this way, the federated model can do better than the individual model. Thus, federated learning can help improve the prediction accuracy while preserving privacy.</p>
      </sec>
      <sec>
        <title>Practical Considerations for Using Federated Learning</title>
        <p>The decision to use federated learning must be made when designing the study so that one leaves the data on the user devices and trains the model using federated learning. If data have already been collected from each user device and stored together on a server, privacy has been violated, and we cannot use federated learning to retroactively make the experiment privacy preserving. A small burden might need to be placed on user devices to use federated learning. To minimize disruptive usage of user device bandwidth and compute resources, the local update on the user device should take place while the user device is connected to a nonmetered internet such as Wi-Fi, and the device should be idle and plugged into a charger. To avoid inducing bias in the training process by the overuse or underuse of certain user devices because of their passive adherence to these restrictions, we may need to request that user devices be available for local training during certain times of the day. The structuring of these times should be considered during the experimental design phase. In addition, the server should follow certain protocols to minimize the privacy loss. The model updates may contain some information about the data on the user device; however, the privacy loss from these updates can be mitigated by not storing or viewing any locally updated parameters during each server training round. Similarly, information about when each user device participated in the training should also not be stored.</p>
        <p>Although concerns about user privacy deter users from sharing health information, the perceived effectiveness of information security reduces these concerns [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. However, federated learning is not the only tool for privacy, and it does not alone provide perfect privacy. Depending on the privacy requirements of the study, federated learning may or may not be the best method to use. We provide a few examples to illustrate cases where federated learning may not be the correct method.</p>
        <list list-type="bullet">
          <list-item>
            <p>Low privacy: If a doctor is collecting data from his or her patients and the patients completely trust their doctor and the security of their server, then there is no need to collect data using federated learning—the doctor can simply take all of his or her patients’ raw data. However, the more assured patients are about their information security, the more willing they are to disclose information and the higher their perceived quality of care [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
          </list-item>
          <list-item>
            <p>Verifiable privacy: If patients completely distrust the researcher, they may insist on formal guarantees of privacy. This could manifest itself as requiring privacy protection from an honest-but-curious server, wherein the server will attempt to learn anything it can from the information it receives. Under such a requirement, we cannot simply transmit model parameters back to the server, as an individual’s model parameters may reveal information about the user. It requires significant technical expertise and engineering effort to implement federated learning under such a strong privacy requirement [<xref ref-type="bibr" rid="ref43">43</xref>], which may be beyond the resources available in a clinical trial.</p>
          </list-item>
          <list-item>
            <p>Privacy under model access: Even if no user device data are transmitted to the server, it may be possible to infer information about the data used to train the model, given sufficient access to the model itself, including the reconstruction of specific data points used to train the model [<xref ref-type="bibr" rid="ref44">44</xref>]. Protection against such attacks is particularly important if the model will be made available to those beyond trusted researchers; in the most extreme cases, researchers themselves may not be trusted. Federated learning provides no guarantees of protection against such attacks; complementary forms of privacy protection, such as differential privacy [<xref ref-type="bibr" rid="ref45">45</xref>], may be required.</p>
          </list-item>
        </list>
        <p>Federated learning is not a silver bullet against privacy loss, and it is not a black-box tool that can be simply tacked onto an existing study. However, when properly integrated into the study design, federated learning can significantly reduce the loss in users’ privacy while incurring only a small reduction in model accuracy.</p>
      </sec>
      <sec>
        <title>Evaluation of Federated Learning on mHealth Data</title>
        <p>To assess the practicality of using federated learning on mHealth data, we compared its predictive performance with that of other predictive machine learning models. We used the WESAD data set for this purpose [<xref ref-type="bibr" rid="ref9">9</xref>]. We had a 3-class classification problem using physiological and motion data to predict whether each subject was, at the time, performing a task designed to elicit a neutral, stressed, or amused affective state.</p>
        <p>We used the WESAD data set because it is publicly available and thus easily accessible by other interested researchers, and it is in the University of California, Irvine, Machine Learning Repository as a data set that measures stress in users using wearables. The data were collected from 15 subjects and contained physiological and motion data measured simultaneously by a wrist device and a chest device during specific tasks designed to capture 3 different affective states: neutral, stress, and amusement. There was approximately 36 minutes of data for each subject. Using 30-second windows for all 15 subjects, 1087 windows were generated in total. Of these windows, 53.45% (581/1087) were collected during the baseline task, 29.99% (326/1087) during the task designed to elicit stress, and 16.56% (180/1087) during the task designed to elicit amusement.</p>
        <p>The authors of the data set found that using physiological and motion data from the chest-worn device was more informative than using physiological and motion data from the wrist-worn device in the 3-class classification problem [<xref ref-type="bibr" rid="ref9">9</xref>]. The chest-worn and wrist-worn devices differed slightly in the modalities they measured. Thus, we restricted our analysis to the data collected using the chest-worn device. These include electrocardiogram, EDA, electromyogram, respiration, body temperature, and 3-axis acceleration (x-axis, y-axis, and z-axis) measurements collected at 700 Hz. For additional information, we refer interested readers to the original WESAD paper [<xref ref-type="bibr" rid="ref9">9</xref>].</p>
        <p>The authors of the WESAD paper used feature extraction to identify useful features for their predictive models, which often included the mean, SD, minimum, and maximum of measurements. For simplicity, we used these four summary statistics, calculated over 30-second windows, of each of the 8 measurements for each subject as the features in our models. The code to extract our features was derived from Matthew Johnson’s GitHub repository [<xref ref-type="bibr" rid="ref46">46</xref>]. The limitations of our analysis include whether the subject was in the intended affective state and the set of features used.</p>
        <p>As we had access to each subject’s data, we were able to use a server model. However, in many situations, researchers may not want to access each subject’s raw data for privacy reasons. As true federated learning would not store raw data on a central server, we could not use a true federated model and instead use simulated federated learning. Nonetheless, we saw this as a feature and not a limitation. As we had the server data, we could compare the accuracy between our simulated federated model and the truth in the centralized data.  If we had implemented true federated learning, we would not be able to compare performance with the centralized, or server, model, or compare performance with the individual model. Much of published federated learning research uses federated learning simulations for experimental results [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref36">36</xref>].</p>
        <sec>
          <title>Data Preprocessing</title>
          <p>Of the 15 participants, 12 were male and the remaining 3 were female. <xref ref-type="table" rid="table1">Table 1</xref> shows the demographics of the subjects in the WESAD study. <xref ref-type="table" rid="table2">Table 2</xref> shows the summary statistics of some of the features used. The full table of summary statistics for the features used is provided in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>.</p>
          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Demographic characteristics of the participants in the study (N=15).</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="500"/>
              <col width="500"/>
              <thead>
                <tr valign="top">
                  <td>Characteristic</td>
                  <td>Value, mean (SD)</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Age (years)</td>
                  <td>27.5 (2.4)</td>
                </tr>
                <tr valign="top">
                  <td>Height (cm)</td>
                  <td>177.6 (6.7)</td>
                </tr>
                <tr valign="top">
                  <td>Weight (kg)</td>
                  <td>73.1 (10.3)</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <table-wrap position="float" id="table2">
            <label>Table 2</label>
            <caption>
              <p>Summary statistics of a subset of features.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="200"/>
              <col width="200"/>
              <col width="200"/>
              <col width="200"/>
              <col width="200"/>
              <thead>
                <tr valign="top">
                  <td>Feature</td>
                  <td>Participants, first quartile</td>
                  <td>Participants, median</td>
                  <td>Participants, mean (SD)</td>
                  <td>Participants, third quartile</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Mean EDA<sup>a</sup></td>
                  <td>2.0</td>
                  <td>3.7</td>
                  <td>4.6 (3.4)</td>
                  <td>6.3</td>
                </tr>
                <tr valign="top">
                  <td>Mean ECG<sup>b</sup></td>
                  <td>7.2E−04</td>
                  <td>1.1E−03</td>
                  <td>1.1E−03 (7.8E−04)</td>
                  <td>1.5E−03</td>
                </tr>
                <tr valign="top">
                  <td>Mean EMG<sup>c</sup></td>
                  <td>−3.5E−03</td>
                  <td>−3.0E−03</td>
                  <td>−3.0E−03 (9.2E−04)</td>
                  <td>−2.5E−03</td>
                </tr>
                <tr valign="top">
                  <td>Mean respiration</td>
                  <td>−0.02</td>
                  <td>0.05</td>
                  <td>5.4E−02 (2.0E−01)</td>
                  <td>0.13</td>
                </tr>
                <tr valign="top">
                  <td>Mean temperature</td>
                  <td>34</td>
                  <td>34</td>
                  <td>34 (1.3)</td>
                  <td>35</td>
                </tr>
                <tr valign="top">
                  <td>Mean ACC_X<sup>d</sup></td>
                  <td>0.73</td>
                  <td>0.86</td>
                  <td>8.0E−01 (1.3E−01)</td>
                  <td>0.90</td>
                </tr>
                <tr valign="top">
                  <td>Mean ACC_Y<sup>e</sup></td>
                  <td>−0.06</td>
                  <td>−0.02</td>
                  <td>−3.1E−02 (1.0E−01)</td>
                  <td>0.02</td>
                </tr>
                <tr valign="top">
                  <td>Mean ACC_Z<sup>f</sup></td>
                  <td>−0.54</td>
                  <td>−0.31</td>
                  <td>−3.5E−01 (2.6E−01)</td>
                  <td>−0.17</td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table2fn1">
                <p><sup>a</sup>EDA: electrodermal activity.</p>
              </fn>
              <fn id="table2fn2">
                <p><sup>b</sup>ECG: electrocardiogram.</p>
              </fn>
              <fn id="table2fn3">
                <p><sup>c</sup>EMG: electromyogram.</p>
              </fn>
              <fn id="table2fn4">
                <p><sup>d</sup>ACC_X: 3-axis acceleration (x-axis).</p>
              </fn>
              <fn id="table2fn5">
                <p><sup>e</sup>ACC_Y: 3-axis acceleration (y-axis).</p>
              </fn>
              <fn id="table2fn6">
                <p><sup>f</sup>ACC_Z: 3-axis acceleration (z-axis).</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
        </sec>
        <sec>
          <title>Neural Network Architecture</title>
          <p>We tuned the hyperparameters for the individual, federated, and server models separately. We used 3-fold cross-validation to jointly tune the number of epochs and learning rate for the individual and server models. For the federated model, because it involves more hyperparameters, we jointly tuned the number of epochs, learning rate, number of clients sampled per round, number of local updates per round, and step size. The training set consisted of the first two-thirds of the data from each task for each user. The test set consisted of the remaining third of the data from each task for each user. Within each training set, one-third of the training data were used for validation, that is, to tune the hyperparameters.</p>
          <p>Our neural networks had 1 dense input layer with 12 hidden units, followed by a dense layer with 10 hidden units, and then followed by a dense layer with 8 hidden units. These layers used the leaky rectified linear unit (leaky ReLU) activation function with a slope of 0.01 where the x-axis is negative. The output layer was a dense layer with 3 hidden nodes and used a softmax activation with categorical cross-entropy loss. We used Adam as the optimizer. We standardized our training data and applied that same standardization to our test set. By privately calculating the mean and SD, standardization can preserve privacy [<xref ref-type="bibr" rid="ref47">47</xref>]. Our code, which uses Python TensorFlow, and the best hyperparameters chosen by our cross-validation process are available on the authors’ GitHub repository [<xref ref-type="bibr" rid="ref48">48</xref>]. The transformed data are available on GitHub and in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref> [<xref ref-type="bibr" rid="ref9">9</xref>].</p>
          <p>We tested augmentations in the architecture to allow for model personalization. The simplest example of adding personalization to a model is a fixed effects model for linear regression, where each user is given a user-specific intercept, and the other parameters are estimated jointly. This is mathematically equivalent to augmenting each data point by adding a single covariate, where the covariate’s value is the same for all data points from the user, and the value is learned by the model-fitting process. We add personalization to our neural network in a similar way, in which we augment each data point by adding a user embedding<italic>,</italic> with <italic>u</italic> extra covariates that are the same for all data from that user and learned by the model-fitting process (<xref rid="figure3" ref-type="fig">Figure 3</xref>). Note that if we solely use user embeddings, then each prediction for the same user would be exactly the same, and the best possible prediction would be the user mean for all data points. This is a very simple example of collaborative personalization [<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref50">50</xref>]; in the same way fixed effects models can be extended, there are many extensions of collaborative personalization. However, this simple method is sufficient for our study.</p>
          <fig id="figure3" position="float">
            <label>Figure 3</label>
            <caption>
              <p>Comparison between the architecture of nonpersonalized and personalized versions of our models. The green blocks represent trained model parameters, and the blue blocks represent the input covariates. Note the user ID is removed from the covariates once it is used to attach the correct parameters, which represent that user’s embedding.</p>
            </caption>
            <graphic xlink:href="mhealth_v9i3e23728_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>User embeddings often encode unmeasured user-specific covariates, meaning that access to user embeddings from a trained model has the potential to expose information about that user. However, a small change in the federated learning protocol can prevent such privacy loss. As user embeddings are user-specific and only updated by training with the user’s data, there is no need to transmit gradients for updating any user embeddings to the server. Thus, each person’s user embedding may be kept only on that user’s device, preventing the server from using that embedding to learn private information about that user.</p>
          <p>To choose the dimension of the user embedding for the personalized federated and personalized server models, we used 3-fold cross-validation, as described earlier, with 1D, 2D, and 3D user embeddings. We used the same number of dimensions for both personalized models each time. Using a 2D user embedding achieved the highest accuracy on the validation set for the personalized server model. As such, we used 2D user embeddings in our final personalized federated and personalized server models.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <p>In this section, we present the results for evaluating federated learning on the WESAD data set and compare them with the performance of a server model and an individual model. We include results of personalized federated and server models as well as nonpersonalized federated and server models.</p>
      <p>There is inherent variation each time we run a neural network because the initial weights are randomized, and there is randomness in stochastic gradient descent as the neural network tries to find the local minimum. Further, there is variation each time we run a federated model because federated learning takes a random sample of user devices per round of training. As such, we ran each of our models 15 times, using different seed settings each time. We report the median and mean accuracy over 15 tests in <xref ref-type="table" rid="table3">Table 3</xref>. The distribution of the results over 15 tests and graphs of the average prediction accuracy after each epoch of training of the neural network are presented in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>.</p>
      <table-wrap position="float" id="table3">
        <label>Table 3</label>
        <caption>
          <p>Median and mean accuracy of each model over 15 tests.</p>
        </caption>
        <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
          <col width="350"/>
          <col width="300"/>
          <col width="350"/>
          <thead>
            <tr valign="top">
              <td>Model</td>
              <td>Accuracy, median</td>
              <td>Accuracy, mean (SD)</td>
            </tr>
          </thead>
          <tbody>
            <tr valign="top">
              <td>Personalized server</td>
              <td>0.929</td>
              <td>0.932 (0.019)</td>
            </tr>
            <tr valign="top">
              <td>Server</td>
              <td>0.897</td>
              <td>0.888 (0.028)</td>
            </tr>
            <tr valign="top">
              <td>Personalized federated</td>
              <td>0.929</td>
              <td>0.928 (0.018)</td>
            </tr>
            <tr valign="top">
              <td>Federated</td>
              <td>0.853</td>
              <td>0.859 (0.021)</td>
            </tr>
            <tr valign="top">
              <td>Individual</td>
              <td>0.899</td>
              <td>0.902 (0.021)</td>
            </tr>
          </tbody>
        </table>
      </table-wrap>
      <p>The personalized server model achieved the highest accuracy. The personalized federated model came in second, performing nearly as well as the personalized server model. Thus, the personalized server model and the personalized federated model beat their nonpersonalized counterparts.</p>
      <p>The individual model outperformed both the nonpersonalized server and nonpersonalized federated models. The individual model is trained separately on each user, whereas the server model takes the data of all individuals at once and cannot adjust for each user. For comparison, a model that always predicts the majority class would attain 53% accuracy on the data set.</p>
      <p>These results provide evidence that using personalization, which takes into account individual differences, helped improve the prediction accuracy of the models. This is reasonable for the WESAD data set, considering that each person has varying baseline physiological measurements.</p>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>This paper discusses the advantages and challenges of using federated learning as a predictive model in mHealth data collection and demonstrates an empirical example in which federated learning could have been effective. Furthermore, it shows empirical evidence that a federated model can make accurate predictions, is compatible with personalization, and has the added privacy advantage of not storing raw data from individual users. The personalized server model performed the best on the chosen data set, followed closely by the personalized federated model. As a federated model offers more privacy for users than a server model, there is evidence to suggest that federated learning may be a valuable option for collecting and analyzing sensitive mHealth data.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>The decision of whether to use federated learning is based on a combination of factors, including how much privacy is required, how much data are available, and what resources are available to implement the federated model. Each of the models we tested has advantages and disadvantages. The server model uses all raw data stored in one place for easy access and future use. However, this poses the risk of breaching user privacy if the server is compromised and the risk of the data being accessed and used in a way that the users did not intend. An individual model can maintain user privacy by keeping the data on the user’s device and requires less engineering to implement than a federated model. However, the individual model did not perform as well as the personalized server model and personalized federated model in our tests. Nonetheless, if a researcher has a lot of data from each user, using an individual model can be useful for prediction, and a federated model may be unnecessary. The federated model provides more privacy than a server model, as well as reasonably accurate predictions, but it requires some design work before collecting data and software engineering to implement. Moreover, although federated learning provides an added degree of privacy, it does not guarantee privacy, as explained in the Methods section. To achieve stronger privacy guarantees in federated learning, a substantial amount of software engineering is needed.</p>
        <p>Federated learning is used for predictive modeling; therefore, implementing it limits the research questions that can be answered from the data. Researchers may often wish to pursue research questions aside from prediction; in the future, it would be interesting to extend federated learning to estimate treatment effects. Other future work includes developing ways to handle missing data for time series in the context of federated learning. In addition, Python TensorFlow has recently released capabilities to apply federated learning in their TensorFlow Federated package, and it would be interesting to compare it with our implementation.</p>
      </sec>
      <sec>
        <title>Comparison With Previous Work</title>
        <p>Previous research in the mHealth field has explored privacy-preserving methods. Some of these studies do not involve neural networks and federated learning [<xref ref-type="bibr" rid="ref38">38</xref>-<xref ref-type="bibr" rid="ref40">40</xref>]. One study applied a methodology similar to federated learning [<xref ref-type="bibr" rid="ref41">41</xref>], although it selectively updated parameters from individual users, whereas we used multiple local updates between transmission rounds. As federated learning started in the machine learning community, there have been papers in the computer science and engineering fields regarding collaborative privacy-preserving learning tested on mHealth data [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref51">51</xref>]. Our work bridges the mHealth and machine learning communities by discussing practical considerations for mHealth researchers who want to consider implementing federated learning. Furthermore, we evaluate the effectiveness of federated learning on a publicly available mHealth data set. Our code is available on GitHub to encourage reproducibility of our results.</p>
        <p>As mentioned earlier, many mHealth researchers have applied machine learning methods to predict mood and stress [<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. Research has shown that accounting for both unique traits among different individuals and commonalities across users is valuable in prediction [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]. We demonstrate the use of federated learning as a privacy-preserving method that also has these advantages.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>This paper discusses federated learning and its importance in the field of mHealth. For example, federated learning provides added protection to preserve patient confidentiality and inhibits the use of data in a way that the participants in a study did not intend. As federated learning does not store raw data from individual users on a central server, there is no possibility of a central server being hacked and raw data leaked. This provides more privacy to users when recording sensitive data.</p>
        <p>Protecting user privacy is critical in mHealth. Having more privacy protection measures in place may encourage people to participate in a study and to be more willing to disclose information that is useful for treatment and research. Federated learning offers additional data privacy and can overcome some common challenges in mHealth data by addressing user heterogeneity and taking advantage of commonalities across users. As such, federated learning has considerable potential to help advance mHealth research.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Federated learning algorithm, summary statistics, and additional figures.</p>
        <media xlink:href="mhealth_v9i3e23728_app1.pdf" xlink:title="PDF File  (Adobe PDF File), 576 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Transformed data.</p>
        <media xlink:href="mhealth_v9i3e23728_app2.zip" xlink:title="ZIP File  (Zip Archive), 293 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">EDA</term>
          <def>
            <p>electrodermal activity</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">WESAD</term>
          <def>
            <p>Wearable Stress and Affect Detection</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>SS was supported by the National Institute of Mental Health (grant number: R01MH101459). AT was supported in part by the National Science Foundation CAREER (grant number: IIS-1452099). JG was supported by the National Science Foundation Research Training Groups in the Mathematical Sciences (grant number: DMS-1646108). JL and JG implemented federated learning and performed data analysis with guidance from AT. JL and JG wrote the Introduction and Methods sections, and JL wrote the Results and Discussion sections. SS provided subject matter expertise and guidance on the methods. All authors have reviewed and revised the manuscript and have read and approved the final version of the manuscript.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mechanic</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The functions and limitations of trust in the provision of medical care</article-title>
          <source>J Health Polit Policy Law</source>
          <year>1998</year>
          <month>08</month>
          <volume>23</volume>
          <issue>4</issue>
          <fpage>661</fpage>
          <lpage>86</lpage>
          <pub-id pub-id-type="doi">10.1215/03616878-23-4-661</pub-id>
          <pub-id pub-id-type="medline">9718518</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Müthing</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Jäschke</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Friedrich</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2017</year>
          <month>10</month>
          <day>18</day>
          <volume>5</volume>
          <issue>10</issue>
          <fpage>e147</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2017/10/e147/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.7791</pub-id>
          <pub-id pub-id-type="medline">29046271</pub-id>
          <pub-id pub-id-type="pii">v5i10e147</pub-id>
          <pub-id pub-id-type="pmcid">PMC5666225</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Müthing</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Brüngel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Friedrich</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>Server-Focused Security Assessment of Mobile Health Apps for Popular Mobile Platforms</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>01</month>
          <day>23</day>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>e9818</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/1/e9818/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.9818</pub-id>
          <pub-id pub-id-type="medline">30672738</pub-id>
          <pub-id pub-id-type="pii">v21i1e9818</pub-id>
          <pub-id pub-id-type="pmcid">PMC6364205</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dehling</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Schneider</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2015</year>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>e8</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://mhealth.jmir.org/2015/1/e8/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.3672</pub-id>
          <pub-id pub-id-type="medline">25599627</pub-id>
          <pub-id pub-id-type="pii">v3i1e8</pub-id>
          <pub-id pub-id-type="pmcid">PMC4319144</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Damschroder</surname>
              <given-names>LJ</given-names>
            </name>
            <name name-style="western">
              <surname>Pritts</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Neblo</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Kalarickal</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Creswell</surname>
              <given-names>JW</given-names>
            </name>
            <name name-style="western">
              <surname>Hayward</surname>
              <given-names>RA</given-names>
            </name>
          </person-group>
          <article-title>Patients, privacy and trust: patients' willingness to allow researchers to access their medical records</article-title>
          <source>Soc Sci Med</source>
          <year>2007</year>
          <month>01</month>
          <volume>64</volume>
          <issue>1</issue>
          <fpage>223</fpage>
          <lpage>35</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://linkinghub.elsevier.com/retrieve/pii/S0277-9536(06)00444-8"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.socscimed.2006.08.045</pub-id>
          <pub-id pub-id-type="medline">17045717</pub-id>
          <pub-id pub-id-type="pii">S0277-9536(06)00444-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>James</surname>
              <given-names>DC</given-names>
            </name>
            <name name-style="western">
              <surname>Harville</surname>
              <given-names>C 2nd</given-names>
            </name>
            <name name-style="western">
              <surname>Whitehead</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Stellefson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dodani</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sears</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Willingness of African American Women to Participate in e-Health/m-Health Research</article-title>
          <source>Telemed J E Health</source>
          <year>2016</year>
          <month>03</month>
          <volume>22</volume>
          <issue>3</issue>
          <fpage>191</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1089/tmj.2015.0071</pub-id>
          <pub-id pub-id-type="medline">26313323</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ohm</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Broken promises of privacy: Responding to the surprising failure of anonymization</article-title>
          <source>UCLA Law Review</source>
          <year>2010</year>
          <volume>57</volume>
          <issue>6</issue>
          <fpage>1701</fpage>
          <lpage>1778</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Jaques</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Nosakhare</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Sano</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Picard</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Personalized Multitask Learning for Predicting Tomorrow's Mood, Stress, and Health</article-title>
          <source>IEEE Transactions on Affective Computing</source>
          <year>2020</year>
          <volume>11</volume>
          <issue>2</issue>
          <fpage>200</fpage>
          <lpage>213</lpage>
          <pub-id pub-id-type="doi">10.1109/TAFFC.2017.2784832</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schmidt</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Reiss</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Duerichen</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Marberger</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Van Laerhoven</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Introducing WESAD, a Multimodal Dataset for Wearable Stress and Affect Detection</article-title>
          <year>2018</year>
          <conf-name>20th ACM International Conference on Multimodal Interaction</conf-name>
          <conf-date>October 16-20, 2018</conf-date>
          <conf-loc>Boulder, CO, USA</conf-loc>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>400</fpage>
          <lpage>408</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://archive.ics.uci.edu/ml/datasets/WESAD+%28Wearable+Stress+and+Affect+Detection%29"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3242969.3242985</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hard</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rao</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Mathews</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ramaswamy</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Beaufays</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Augenstein</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Eichner</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kiddon</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ramage</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <source>Federated Learning for Mobile Keyboard Prediction</source>
          <year>2018</year>
          <access-date>2021-03-11</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/1811.03604">https://arxiv.org/abs/1811.03604</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Sahu</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Talwalkar</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Federated Learning: Challenges, Methods, and Future Directions</article-title>
          <source>IEEE Signal Processing Magazine</source>
          <year>2020</year>
          <month>5</month>
          <volume>37</volume>
          <issue>3</issue>
          <fpage>50</fpage>
          <lpage>60</lpage>
          <pub-id pub-id-type="doi">10.1109/msp.2020.2975749</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Tong</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Federated Machine Learning: Concept and Applications</article-title>
          <source>ACM Trans. Intell. Syst. Technol</source>
          <year>2019</year>
          <month>02</month>
          <volume>10</volume>
          <issue>2</issue>
          <pub-id pub-id-type="doi">10.1145/3298981</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kairouz</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>McMahan</surname>
              <given-names>HB</given-names>
            </name>
          </person-group>
          <article-title>Advances and Open Problems in Federated Learning</article-title>
          <source>FNT in Machine Learning</source>
          <year>2021</year>
          <volume>14</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.1561/2200000083</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>The privacy–personalization paradox in mHealth services acceptance of different age groups</article-title>
          <source>Electronic Commerce Research and Applications</source>
          <year>2016</year>
          <volume>16</volume>
          <fpage>55</fpage>
          <lpage>65</lpage>
          <pub-id pub-id-type="doi">10.1016/j.elerap.2015.11.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Perentis</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Vescovi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Leonardi</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Moiso</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Musolesi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pianesi</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Lepri</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Anonymous or Not? Understanding the Factors Affecting Personal Mobile Data Disclosure</article-title>
          <source>ACM Trans. Internet Technol</source>
          <year>2017</year>
          <month>05</month>
          <volume>17</volume>
          <issue>2</issue>
          <pub-id pub-id-type="doi">10.1145/3017431</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Insel</surname>
              <given-names>TR</given-names>
            </name>
          </person-group>
          <article-title>Digital phenotyping: a global tool for psychiatry</article-title>
          <source>World Psychiatry</source>
          <year>2018</year>
          <month>10</month>
          <volume>17</volume>
          <issue>3</issue>
          <fpage>276</fpage>
          <lpage>277</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1002/wps.20550"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/wps.20550</pub-id>
          <pub-id pub-id-type="medline">30192103</pub-id>
          <pub-id pub-id-type="pmcid">PMC6127813</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kisekka</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Giboney</surname>
              <given-names>JS</given-names>
            </name>
          </person-group>
          <article-title>The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>04</month>
          <day>11</day>
          <volume>20</volume>
          <issue>4</issue>
          <fpage>e107</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/4/e107/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.9014</pub-id>
          <pub-id pub-id-type="medline">29643052</pub-id>
          <pub-id pub-id-type="pii">v20i4e107</pub-id>
          <pub-id pub-id-type="pmcid">PMC5917085</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Atienza</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Zarcadoolas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Vaughon</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Hughes</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Chou</surname>
              <given-names>WY</given-names>
            </name>
            <name name-style="western">
              <surname>Pritts</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings From a Mixed-Methods Study</article-title>
          <source>J Health Commun</source>
          <year>2015</year>
          <volume>20</volume>
          <issue>6</issue>
          <fpage>673</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1080/10810730.2015.1018560</pub-id>
          <pub-id pub-id-type="medline">25868685</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Boyd</surname>
              <given-names>AD</given-names>
            </name>
            <name name-style="western">
              <surname>Hosner</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Hunscher</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>Athey</surname>
              <given-names>BD</given-names>
            </name>
            <name name-style="western">
              <surname>Clauw</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Green</surname>
              <given-names>LA</given-names>
            </name>
          </person-group>
          <article-title>An 'Honest Broker' mechanism to maintain privacy for patient care and academic medical research</article-title>
          <source>Int J Med Inform</source>
          <year>2007</year>
          <volume>76</volume>
          <issue>5-6</issue>
          <fpage>407</fpage>
          <lpage>11</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1386-5056(06)00209-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2006.09.004</pub-id>
          <pub-id pub-id-type="medline">17081800</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(06)00209-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Umematsu</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Sano</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Picard</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Improving Students' Daily Life Stress Forecasting using LSTM Neural Networks</article-title>
          <year>2019</year>
          <conf-name>IEEE EMBS International Conference on Biomedical &#38; Health Informatics (BHI)</conf-name>
          <conf-date>May 19-22, 2019</conf-date>
          <conf-loc>Chicago, IL, USA</conf-loc>
          <fpage>1</fpage>
          <lpage>4</lpage>
          <pub-id pub-id-type="doi">10.1109/bhi.2019.8834624</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pratap</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Atkins</surname>
              <given-names>DC</given-names>
            </name>
            <name name-style="western">
              <surname>Renn</surname>
              <given-names>BN</given-names>
            </name>
            <name name-style="western">
              <surname>Tanana</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Mooney</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Anguera</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Areán</surname>
              <given-names>PA</given-names>
            </name>
          </person-group>
          <article-title>The accuracy of passive phone sensors in predicting daily mood</article-title>
          <source>Depress Anxiety</source>
          <year>2019</year>
          <month>01</month>
          <volume>36</volume>
          <issue>1</issue>
          <fpage>72</fpage>
          <lpage>81</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://smj.sma.org.sg/5101/5101sa1.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/da.22822</pub-id>
          <pub-id pub-id-type="medline">30129691</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Suhara</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Pentland</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>DeepMood: Forecasting Depressed Mood Based on Self-Reported Histories via Recurrent Neural Networks</article-title>
          <year>2017</year>
          <conf-name>26th International Conference on World Wide Web</conf-name>
          <conf-date>April 2017</conf-date>
          <conf-loc>Perth, Australia</conf-loc>
          <fpage>715</fpage>
          <lpage>724</lpage>
          <pub-id pub-id-type="doi">10.1145/3038912.3052676</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Spathis</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Servia-Rodriguez</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Farrahi</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Mascolo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Rentfrow</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Passive mobile sensing and psychological traits for large scale mood prediction</article-title>
          <year>2019</year>
          <conf-name>13th EAI International Conference on Pervasive Computing Technologies for Healthcare</conf-name>
          <conf-date>May 2019</conf-date>
          <conf-loc>Trento, Italy</conf-loc>
          <fpage>272</fpage>
          <lpage>281</lpage>
          <pub-id pub-id-type="doi">10.1145/3329189.3329213</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mikus</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hoogendoorn</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rocha</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gama</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ruwaard</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Riper</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Predicting short term mood developments among depressed patients using adherence and ecological momentary assessment data</article-title>
          <source>Internet Interv</source>
          <year>2017</year>
          <month>10</month>
          <day>07</day>
          <volume>12</volume>
          <fpage>105</fpage>
          <lpage>110</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://linkinghub.elsevier.com/retrieve/pii/S2214-7829(17)30079-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.invent.2017.10.001</pub-id>
          <pub-id pub-id-type="medline">30135774</pub-id>
          <pub-id pub-id-type="pii">S2214-7829(17)30079-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC6096213</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Acikmese</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Alptekin</surname>
              <given-names>SE</given-names>
            </name>
          </person-group>
          <article-title>Prediction of stress levels with LSTM and passive mobile sensors</article-title>
          <source>Procedia Computer Science</source>
          <year>2019</year>
          <volume>159</volume>
          <fpage>658</fpage>
          <lpage>667</lpage>
          <pub-id pub-id-type="doi">10.1016/j.procs.2019.09.221</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kornfield</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Sarma</surname>
              <given-names>PK</given-names>
            </name>
            <name name-style="western">
              <surname>Shah</surname>
              <given-names>DV</given-names>
            </name>
            <name name-style="western">
              <surname>McTavish</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Landucci</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Pe-Romashko</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Gustafson</surname>
              <given-names>DH</given-names>
            </name>
          </person-group>
          <article-title>Detecting Recovery Problems Just in Time: Application of Automated Linguistic Analysis and Supervised Machine Learning to an Online Substance Abuse Forum</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>06</month>
          <day>12</day>
          <volume>20</volume>
          <issue>6</issue>
          <fpage>e10136</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/6/e10136/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/10136</pub-id>
          <pub-id pub-id-type="medline">29895517</pub-id>
          <pub-id pub-id-type="pii">v20i6e10136</pub-id>
          <pub-id pub-id-type="pmcid">PMC6019846</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>DeMasi</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Feygin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dembo</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Aguilera</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Recht</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Well-Being Tracking via Smartphone-Measured Activity and Sleep: Cohort Study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2017</year>
          <month>10</month>
          <day>05</day>
          <volume>5</volume>
          <issue>10</issue>
          <fpage>e137</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://mhealth.jmir.org/2017/10/e137/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.7820</pub-id>
          <pub-id pub-id-type="medline">28982643</pub-id>
          <pub-id pub-id-type="pii">v5i10e137</pub-id>
          <pub-id pub-id-type="pmcid">PMC5649042</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>NeCamp</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Sen</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Frank</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Walton</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Ionides</surname>
              <given-names>EL</given-names>
            </name>
            <name name-style="western">
              <surname>Fang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Tewari</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Assessing Real-Time Moderation for Developing Adaptive Mobile Health Interventions for Medical Interns: Micro-Randomized Trial</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>03</month>
          <day>31</day>
          <volume>22</volume>
          <issue>3</issue>
          <fpage>e15033</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://czasopisma.viamedica.pl/ait/article/view/43370"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/15033</pub-id>
          <pub-id pub-id-type="medline">32229469</pub-id>
          <pub-id pub-id-type="pii">v22i3e15033</pub-id>
          <pub-id pub-id-type="pmcid">PMC7157494</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Klerman</surname>
              <given-names>EB</given-names>
            </name>
            <name name-style="western">
              <surname>Picard</surname>
              <given-names>RW</given-names>
            </name>
            <name name-style="western">
              <surname>Sano</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Personalized Wellbeing Prediction using Behavioral, Physiological and Weather Data</article-title>
          <year>2019</year>
          <conf-name>IEEE EMBS International Conference on Biomedical &#38; Health Informatics (BHI)</conf-name>
          <conf-date>2019</conf-date>
          <conf-loc>Chicago, IL, USA</conf-loc>
          <fpage>1</fpage>
          <lpage>4</lpage>
          <pub-id pub-id-type="doi">10.1109/bhi.2019.8834456</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schueller</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Aguilera</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Mohr</surname>
              <given-names>DC</given-names>
            </name>
          </person-group>
          <article-title>Ecological momentary interventions for depression and anxiety</article-title>
          <source>Depress Anxiety</source>
          <year>2017</year>
          <month>06</month>
          <volume>34</volume>
          <issue>6</issue>
          <fpage>540</fpage>
          <lpage>545</lpage>
          <pub-id pub-id-type="doi">10.1002/da.22649</pub-id>
          <pub-id pub-id-type="medline">28494123</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McMahan</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Moore</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Ramage</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Hampson</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Agüera y Arcas</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Communication-Efficient Learning of Deep Networks from Decentralized Data</article-title>
          <source>Proceedings of Machine Learning Research</source>
          <year>2017</year>
          <conf-name>20th International Conference on Artificial Intelligence and Statistics (AISTATS)</conf-name>
          <conf-date>Apr 20-22, 2017</conf-date>
          <conf-loc>Fort Lauderdale, FL, USA</conf-loc>
          <fpage>1273</fpage>
          <lpage>1282</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bhowmick</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Duchi</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Freudiger</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kapoor</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <source>Protection Against Reconstruction and Its Applications in Private Federated Learning</source>
          <year>2019</year>
          <access-date>2021-03-11</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/1812.00984">https://arxiv.org/abs/1812.00984</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Badokhon</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wei</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>A Collaborative Privacy-Preserving Deep Learning System in Distributed Mobile Environment</article-title>
          <year>2016</year>
          <conf-name>International Conference on Computational Science and Computational Intelligence (CSCI)</conf-name>
          <conf-date>2016</conf-date>
          <conf-loc>Las Vegas, NV, USA</conf-loc>
          <fpage>192</fpage>
          <lpage>197</lpage>
          <pub-id pub-id-type="doi">10.1109/csci.2016.0043</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lai</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Suda</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Civin</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Chandra</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <source>Federated Learning with Non-IID Data</source>
          <year>2018</year>
          <access-date>2021-03-11</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/1806.00582">https://arxiv.org/abs/1806.00582</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tuor</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Salonidis</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Leung</surname>
              <given-names>KK</given-names>
            </name>
            <name name-style="western">
              <surname>Makaya</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>He</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Chan</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Adaptive Federated Learning in Resource Constrained Edge Computing Systems</article-title>
          <source>IEEE J. Select. Areas Commun</source>
          <year>2019</year>
          <month>6</month>
          <volume>37</volume>
          <issue>6</issue>
          <fpage>1205</fpage>
          <lpage>1221</lpage>
          <pub-id pub-id-type="doi">10.1109/jsac.2019.2904348</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nishio</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Yonetani</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Client Selection for Federated Learning with Heterogeneous Resources in Mobile Edge</article-title>
          <year>2019</year>
          <conf-name>IEEE International Conference on Communications (ICC)</conf-name>
          <conf-date>2019</conf-date>
          <conf-loc>Shanghai, China</conf-loc>
          <fpage>1</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1109/icc.2019.8761315</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Xiong</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Niyato</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Liang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>DI</given-names>
            </name>
          </person-group>
          <article-title>Incentive Design for Efficient Federated Learning in Mobile Networks: A Contract Theory Approach</article-title>
          <year>2019</year>
          <conf-name>IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS)</conf-name>
          <conf-date>2019</conf-date>
          <conf-loc>Singapore</conf-loc>
          <fpage>1</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.1109/vts-apwcs.2019.8851649</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ohno-Machado</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Grid Binary LOgistic REgression (GLORE): building shared models without sharing data</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2012</year>
          <volume>19</volume>
          <issue>5</issue>
          <fpage>758</fpage>
          <lpage>64</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22511014"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/amiajnl-2012-000862</pub-id>
          <pub-id pub-id-type="medline">22511014</pub-id>
          <pub-id pub-id-type="pii">amiajnl-2012-000862</pub-id>
          <pub-id pub-id-type="pmcid">PMC3422844</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ji</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Xiong</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Ohno-Machado</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>WebDISCO: a web service for distributed cox model learning without patient-level data sharing</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2015</year>
          <month>11</month>
          <volume>22</volume>
          <issue>6</issue>
          <fpage>1212</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26159465"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocv083</pub-id>
          <pub-id pub-id-type="medline">26159465</pub-id>
          <pub-id pub-id-type="pii">ocv083</pub-id>
          <pub-id pub-id-type="pmcid">PMC5009917</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Jun</surname>
              <given-names>CH</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Privacy-Preserving Patient Similarity Learning in a Federated Environment: Development and Analysis</article-title>
          <source>JMIR Med Inform</source>
          <year>2018</year>
          <month>04</month>
          <day>13</day>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>e20</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.hxkqyxzz.net/fileup/PDF/20120401.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/medinform.7744</pub-id>
          <pub-id pub-id-type="medline">29653917</pub-id>
          <pub-id pub-id-type="pii">v6i2e20</pub-id>
          <pub-id pub-id-type="pmcid">PMC5924379</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Festag</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Spreckelsen</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Privacy-Preserving Deep Learning for the Detection of Protected Health Information in Real-World Data: Comparative Evaluation</article-title>
          <source>JMIR Form Res</source>
          <year>2020</year>
          <month>05</month>
          <day>05</day>
          <volume>4</volume>
          <issue>5</issue>
          <fpage>e14064</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32369025"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/14064</pub-id>
          <pub-id pub-id-type="medline">32369025</pub-id>
          <pub-id pub-id-type="pii">v4i5e14064</pub-id>
          <pub-id pub-id-type="pmcid">PMC7238077</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rieke</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Hancox</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Milletarì</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Roth</surname>
              <given-names>HR</given-names>
            </name>
            <name name-style="western">
              <surname>Albarqouni</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bakas</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Galtier</surname>
              <given-names>MN</given-names>
            </name>
            <name name-style="western">
              <surname>Landman</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Maier-Hein</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Ourselin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sheller</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Summers</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Trask</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Baust</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cardoso</surname>
              <given-names>MJ</given-names>
            </name>
          </person-group>
          <article-title>The future of digital health with federated learning</article-title>
          <source>NPJ Digit Med</source>
          <year>2020</year>
          <month>09</month>
          <day>14</day>
          <volume>3</volume>
          <fpage>119</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/s41746-020-00323-1"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41746-020-00323-1</pub-id>
          <pub-id pub-id-type="medline">33015372</pub-id>
          <pub-id pub-id-type="pii">323</pub-id>
          <pub-id pub-id-type="pmcid">PMC7490367</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bonawitz</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Ivanov</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Kreuter</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Marcedone</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>McMahan</surname>
              <given-names>HB</given-names>
            </name>
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ramage</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Segal</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Seth</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Practical Secure Aggregation for Privacy-Preserving Machine Learning</article-title>
          <year>2017</year>
          <conf-name>ACM SIGSAC Conference on Computer and Communications Security</conf-name>
          <conf-date>October 2017</conf-date>
          <conf-loc>Dallas, TX, USA</conf-loc>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>1175</fpage>
          <lpage>1191</lpage>
          <pub-id pub-id-type="doi">10.1145/3133956.3133982</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>EC</given-names>
            </name>
            <name name-style="western">
              <surname>Liang</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment</article-title>
          <year>2019</year>
          <conf-name>ACM SIGSAC Conference on Computer and Communications Security</conf-name>
          <conf-date>November 2019</conf-date>
          <conf-loc>London, United Kingdom</conf-loc>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>225</fpage>
          <lpage>240</lpage>
          <pub-id pub-id-type="doi">10.1145/3319535.3354261</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dwork</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Roth</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The Algorithmic Foundations of Differential Privacy</article-title>
          <source>FNT in Theoretical Computer Science</source>
          <year>2014</year>
          <volume>9</volume>
          <issue>3-4</issue>
          <fpage>211</fpage>
          <lpage>407</lpage>
          <pub-id pub-id-type="doi">10.1561/0400000042</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>WESAD</article-title>
          <source>GitHub</source>
          <year>2019</year>
          <access-date>2021-03-11</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://github.com/WJMatthew/WESAD">https://github.com/WJMatthew/WESAD</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kamath</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Singhal</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Ullman</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Private Mean Estimation of Heavy-Tailed Distributions</article-title>
          <source>Proceedings of Machine Learning Research</source>
          <year>2020</year>
          <conf-name>33rd Conference on Learning Theory</conf-name>
          <conf-date>July 9-12, 2020</conf-date>
          <conf-loc>Graz, Austria</conf-loc>
          <fpage>2204</fpage>
          <lpage>2235</lpage>
          <pub-id pub-id-type="doi">10.1007/springerreference_205369</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Goetz</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Federated Learning on Mobile Health Data</article-title>
          <source>GitHub</source>
          <year>2020</year>
          <access-date>2021-03-11</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://github.com/liujessica503/federatedLearning">https://github.com/liujessica503/federatedLearning</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ni</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Ou</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Ou</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Zeng</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Si</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Perceive Your Users in Depth: Learning Universal User Representations from Multiple E-commerce Tasks</article-title>
          <year>2018</year>
          <conf-name>24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</conf-name>
          <conf-date>August 2018</conf-date>
          <conf-loc>London, United Kingdom</conf-loc>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>596</fpage>
          <lpage>605</lpage>
          <pub-id pub-id-type="doi">10.1145/3219819.3219828</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Grbovic</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Real-time Personalization using Embeddings for Search Ranking at Airbnb</article-title>
          <year>2018</year>
          <conf-name>24th ACM SIGKDD International Conference on Knowledge Discovery &#38; Data Mining</conf-name>
          <conf-date>August 2018</conf-date>
          <conf-loc>London, United Kingdom</conf-loc>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>311</fpage>
          <lpage>320</lpage>
          <pub-id pub-id-type="doi">10.1145/3219819.3219885</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Qin</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>FedHealth: A Federated Transfer Learning Framework for Wearable Healthcare</article-title>
          <source>IEEE Intell. Syst</source>
          <year>2020</year>
          <volume>35</volume>
          <issue>4</issue>
          <fpage>83</fpage>
          <lpage>93</lpage>
          <pub-id pub-id-type="doi">10.1109/mis.2020.2988604</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
