Skip to main content

Showing 1–19 of 19 results for author: Bettini, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.13864  [pdf, other

    cs.HC cs.CY

    Personal Data Protection in Smart Home Activity Monitoring for Digital Health: A Case Study

    Authors: Claudio Bettini, Azin Moradbeikie, Gabriele Civitarese

    Abstract: Researchers in pervasive computing have worked for decades on sensor-based human activity recognition (HAR). Among the digital health applications, the recognition of activities of daily living (ADL) in smart home environments enables the identification of behavioral changes that clinicians consider as a digital bio-marker of early stages of cognitive decline. The real deployment of sensor-based H… ▽ More

    Submitted 27 March, 2025; originally announced April 2025.

    Comments: This paper has been accepted and presented at the TELMED 2025 workshop. It will appear in the 2025 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) proceedings

  2. arXiv:2504.08877  [pdf, other

    cs.LG cs.CY

    The SERENADE project: Sensor-Based Explainable Detection of Cognitive Decline

    Authors: Gabriele Civitarese, Michele Fiori, Andrea Arighi, Daniela Galimberti, Graziana Florio, Claudio Bettini

    Abstract: Mild Cognitive Impairment (MCI) affects 12-18% of individuals over 60. MCI patients exhibit cognitive dysfunctions without significant daily functional loss. While MCI may progress to dementia, predicting this transition remains a clinical challenge due to limited and unreliable indicators. Behavioral changes, like in the execution of Activities of Daily Living (ADLs), can signal such progression.… ▽ More

    Submitted 11 April, 2025; originally announced April 2025.

  3. arXiv:2503.16622  [pdf, other

    cs.CL

    Leveraging Large Language Models for Explainable Activity Recognition in Smart Homes: A Critical Evaluation

    Authors: Michele Fiori, Gabriele Civitarese, Priyankar Choudhary, Claudio Bettini

    Abstract: Explainable Artificial Intelligence (XAI) aims to uncover the inner reasoning of machine learning models. In IoT systems, XAI improves the transparency of models processing sensor data from multiple heterogeneous devices, ensuring end-users understand and trust their outputs. Among the many applications, XAI has also been applied to sensor-based Activities of Daily Living (ADLs) recognition in sma… ▽ More

    Submitted 20 March, 2025; originally announced March 2025.

  4. arXiv:2502.17999  [pdf, other

    cs.AI cs.LG

    GNN-XAR: A Graph Neural Network for Explainable Activity Recognition in Smart Homes

    Authors: Michele Fiori, Davide Mor, Gabriele Civitarese, Claudio Bettini

    Abstract: Sensor-based Human Activity Recognition (HAR) in smart home environments is crucial for several applications, especially in the healthcare domain. The majority of the existing approaches leverage deep learning models. While these approaches are effective, the rationale behind their outputs is opaque. Recently, eXplainable Artificial Intelligence (XAI) approaches emerged to provide intuitive explan… ▽ More

    Submitted 25 February, 2025; originally announced February 2025.

    Comments: This is a preprint. Paper accepted for publication at the 21st EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous)

  5. arXiv:2408.06352  [pdf, other

    cs.HC cs.AI

    Using Large Language Models to Compare Explainable Models for Smart Home Human Activity Recognition

    Authors: Michele Fiori, Gabriele Civitarese, Claudio Bettini

    Abstract: Recognizing daily activities with unobtrusive sensors in smart environments enables various healthcare applications. Monitoring how subjects perform activities at home and their changes over time can reveal early symptoms of health issues, such as cognitive decline. Most approaches in this field use deep learning models, which are often seen as black boxes mapping sensor data to activities. Howeve… ▽ More

    Submitted 24 July, 2024; originally announced August 2024.

    Comments: Accepted for publication at UbiComp / ISWC 2024's XAIforU workshop

  6. arXiv:2407.01238  [pdf, other

    cs.AI cs.CL eess.SP

    Large Language Models are Zero-Shot Recognizers for Activities of Daily Living

    Authors: Gabriele Civitarese, Michele Fiori, Priyankar Choudhary, Claudio Bettini

    Abstract: The sensor-based recognition of Activities of Daily Living (ADLs) in smart home environments enables several applications in the areas of energy management, safety, well-being, and healthcare. ADLs recognition is typically based on deep learning methods requiring large datasets to be trained. Recently, several studies proved that Large Language Models (LLMs) effectively capture common-sense knowle… ▽ More

    Submitted 20 March, 2025; v1 submitted 1 July, 2024; originally announced July 2024.

    Comments: Paper accepted for publication in the ACM Transactions on Intelligent Systems and Technology (TIST) journal

  7. arXiv:2404.15331  [pdf, other

    eess.SP cs.HC

    Comparing Self-Supervised Learning Techniques for Wearable Human Activity Recognition

    Authors: Sannara Ek, Riccardo Presotto, Gabriele Civitarese, François Portet, Philippe Lalanda, Claudio Bettini

    Abstract: Human Activity Recognition (HAR) based on the sensors of mobile/wearable devices aims to detect the physical activities performed by humans in their daily lives. Although supervised learning methods are the most effective in this task, their effectiveness is constrained to using a large amount of labeled data during training. While collecting raw unlabeled data can be relatively easy, annotating d… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    ACM Class: I.2

  8. arXiv:2403.06586  [pdf, other

    cs.LG cs.AI cs.CL

    ContextGPT: Infusing LLMs Knowledge into Neuro-Symbolic Activity Recognition Models

    Authors: Luca Arrotta, Claudio Bettini, Gabriele Civitarese, Michele Fiori

    Abstract: Context-aware Human Activity Recognition (HAR) is a hot research area in mobile computing, and the most effective solutions in the literature are based on supervised deep learning models. However, the actual deployment of these systems is limited by the scarcity of labeled data that is required for training. Neuro-Symbolic AI (NeSy) provides an interesting research direction to mitigate this issue… ▽ More

    Submitted 20 March, 2025; v1 submitted 11 March, 2024; originally announced March 2024.

  9. arXiv:2306.13735  [pdf, other

    cs.CV cs.LG

    Combining Public Human Activity Recognition Datasets to Mitigate Labeled Data Scarcity

    Authors: Riccardo Presotto, Sannara Ek, Gabriele Civitarese, François Portet, Philippe Lalanda, Claudio Bettini

    Abstract: The use of supervised learning for Human Activity Recognition (HAR) on mobile devices leads to strong classification performances. Such an approach, however, requires large amounts of labeled data, both for the initial training of the models and for their customization on specific clients (whose data often differ greatly from the training data). This is actually impractical to obtain due to the co… ▽ More

    Submitted 23 June, 2023; originally announced June 2023.

    Comments: IEEE SMARTCOMP 2023

  10. arXiv:2306.05058  [pdf, other

    cs.LG cs.AI eess.SP

    Neuro-Symbolic Approaches for Context-Aware Human Activity Recognition

    Authors: Luca Arrotta, Gabriele Civitarese, Claudio Bettini

    Abstract: Deep Learning models are a standard solution for sensor-based Human Activity Recognition (HAR), but their deployment is often limited by labeled data scarcity and models' opacity. Neuro-Symbolic AI (NeSy) provides an interesting research direction to mitigate these issues by infusing knowledge about context information into HAR deep learning classifiers. However, existing NeSy methods for context-… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

  11. arXiv:2304.09530  [pdf, other

    cs.LG cs.AI cs.HC eess.SP

    SelfAct: Personalized Activity Recognition based on Self-Supervised and Active Learning

    Authors: Luca Arrotta, Gabriele Civitarese, Samuele Valente, Claudio Bettini

    Abstract: Supervised Deep Learning (DL) models are currently the leading approach for sensor-based Human Activity Recognition (HAR) on wearable and mobile devices. However, training them requires large amounts of labeled data whose collection is often time-consuming, expensive, and error-prone. At the same time, due to the intra- and inter-variability of activity execution, activity models should be persona… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

  12. arXiv:2211.12089  [pdf, other

    eess.IV cs.CV

    Ultrasound Detection of Subquadricipital Recess Distension

    Authors: Marco Colussi, Gabriele Civitarese, Dragan Ahmetovic, Claudio Bettini, Roberta Gualtierotti, Flora Peyvandi, Sergio Mascetti

    Abstract: Joint bleeding is a common condition for people with hemophilia and, if untreated, can result in hemophilic arthropathy. Ultrasound imaging has recently emerged as an effective tool to diagnose joint recess distension caused by joint bleeding. However, no computer-aided diagnosis tool exists to support the practitioner in the diagnosis process. This paper addresses the problem of automatically det… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

  13. Personalized Semi-Supervised Federated Learning for Human Activity Recognition

    Authors: Claudio Bettini, Gabriele Civitarese, Riccardo Presotto

    Abstract: The most effective data-driven methods for human activities recognition (HAR) are based on supervised learning applied to the continuous stream of sensors data. However, these methods perform well on restricted sets of activities in domains for which there is a fully labeled dataset. It is still a challenge to cope with the intra- and inter-variability of activity execution among different subject… ▽ More

    Submitted 19 April, 2021; v1 submitted 15 April, 2021; originally announced April 2021.

    Journal ref: Personal and Ubiquitous Computing (2022): 1-18

  14. arXiv:1906.03033  [pdf, other

    cs.CV

    Context-driven Active and Incremental Activity Recognition

    Authors: Gabriele Civitarese, Riccardo Presotto, Claudio Bettini

    Abstract: Human activity recognition based on mobile device sensor data has been an active research area in mobile and pervasive computing for several years. While the majority of the proposed techniques are based on supervised learning, semi-supervised approaches are being considered to significantly reduce the size of the training set required to initialize the recognition model. These approaches usually… ▽ More

    Submitted 7 June, 2019; originally announced June 2019.

  15. arXiv:1501.05581  [pdf, other

    cs.OH

    Extended Report: Fine-grained Recognition of Abnormal Behaviors for Early Detection of Mild Cognitive Impairment

    Authors: Daniele Riboni, Claudio Bettini, Gabriele Civitarese, Zaffar Haider Janjua, Rim Helaoui

    Abstract: According to the World Health Organization, the rate of people aged 60 or more is growing faster than any other age group in almost every country, and this trend is not going to change in a near future. Since senior citizens are at high risk of non communicable diseases requiring long-term care, this trend will challenge the sustainability of the entire health system. Pervasive computing can provi… ▽ More

    Submitted 22 January, 2015; originally announced January 2015.

  16. Supporting Temporal Reasoning by Mapping Calendar Expressions to Minimal Periodic Sets

    Authors: C. Bettini, S. Mascetti, X. S. Wang

    Abstract: In the recent years several research efforts have focused on the concept of time granularity and its applications. A first stream of research investigated the mathematical models behind the notion of granularity and the algorithms to manage temporal data based on those models. A second stream of research investigated symbolic formalisms providing a set of algebraic operators to define granularitie… ▽ More

    Submitted 10 October, 2011; originally announced October 2011.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 28, pages 299-348, 2007

  17. arXiv:1010.0924  [pdf, other

    cs.DB

    Preserving Privacy in Sequential Data Release against Background Knowledge Attacks

    Authors: Daniele Riboni, Linda Pareschi, Claudio Bettini

    Abstract: A large amount of transaction data containing associations between individuals and sensitive information flows everyday into data stores. Examples include web queries, credit card transactions, medical exam records, transit database records. The serial release of these data to partner institutions or data analysis centers is a common situation. In this paper we show that, in most domains, correlat… ▽ More

    Submitted 5 October, 2010; originally announced October 2010.

  18. arXiv:1007.0408  [pdf, other

    cs.DB cs.CR

    Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies

    Authors: Sergio Mascetti, Dario Freni, Claudio Bettini, X. Sean Wang, Sushil Jajodia

    Abstract: A major feature of the emerging geo-social networks is the ability to notify a user when one of his friends (also called buddies) happens to be geographically in proximity with the user. This proximity service is usually offered by the network itself or by a third party service provider (SP) using location data acquired from the users. This paper provides a rigorous theoretical and experimental an… ▽ More

    Submitted 6 November, 2010; v1 submitted 2 July, 2010; originally announced July 2010.

  19. arXiv:cs/0611035  [pdf, ps, other

    cs.DB cs.CR

    The Role of Quasi-identifiers in k-Anonymity Revisited

    Authors: Claudio Bettini, X. Sean Wang, Sushil Jajodia

    Abstract: The concept of k-anonymity, used in the recent literature to formally evaluate the privacy preservation of published tables, was introduced based on the notion of quasi-identifiers (or QI for short). The process of obtaining k-anonymity for a given private table is first to recognize the QIs in the table, and then to anonymize the QI values, the latter being called k-anonymization. While k-anony… ▽ More

    Submitted 8 November, 2006; originally announced November 2006.

    Comments: 17 pages. Submitted for publication

    Report number: RT-11-06