Sedghighadikolaei et al., 2024 - Google Patents
Privacy-preserving and trustworthy deep learning for medical imagingSedghighadikolaei et al., 2024
View PDF- Document ID
- 13802203279020563085
- Author
- Sedghighadikolaei K
- Yavuz A
- Publication year
- Publication venue
- arXiv preprint arXiv:2407.00538
External Links
Snippet
The shift towards efficient and automated data analysis through Machine Learning (ML) has notably impacted healthcare systems, particularly Radiomics. Radiomics leverages ML to analyze medical images accurately and efficiently for precision medicine. Current methods …
- 238000013135 deep learning 0 title abstract description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/34—Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
- G06F19/345—Medical expert systems, neural networks or other automated diagnosis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kaissis et al. | End-to-end privacy preserving deep learning on multi-institutional medical imaging | |
| US11936632B2 (en) | Homomorphic encryption in a healthcare network environment, system and methods | |
| Naresh et al. | Privacy‐preserving data mining and machine learning in healthcare: Applications, challenges, and solutions | |
| Pati et al. | Privacy preservation for federated learning in health care | |
| Wu et al. | Evaluation of inference attack models for deep learning on medical data | |
| Sedghighadikolaei et al. | Privacy-preserving and trustworthy deep learning for medical imaging | |
| Liu et al. | : Towards secure and lightweight deep learning as a medical diagnostic service | |
| Shukla et al. | Federated learning with differential privacy for breast cancer diagnosis enabling secure data sharing and model integrity | |
| Naresh et al. | Privacy-preserving deep learning in medical informatics: applications, challenges, and solutions | |
| Tang et al. | IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data | |
| Myrzashova et al. | Safeguarding patient data-sharing: Blockchain-enabled federated learning in medical diagnostics | |
| Stripelis et al. | A federated learning architecture for secure and private neuroimaging analysis | |
| Son et al. | Privacy-preserving breast cancer recurrence prediction based on homomorphic encryption and secure two party computation | |
| Gogoi et al. | Privacy-preserving predictive modeling for early detection of chronic kidney disease | |
| Vedaraj et al. | RETRACTED ARTICLE: HERDE-MSNB: a predictive security architecture for IoT health cloud system | |
| Gupta et al. | Applying YOLOv6 as an ensemble federated learning framework to classify breast cancer pathology images | |
| Jiang et al. | Lancelot: Towards efficient and privacy-preserving Byzantine-robust federated learning within fully homomorphic encryption | |
| Al Badawi et al. | Private pathological assessment via machine learning and homomorphic encryption | |
| Swetha et al. | Cloud based secure multimedia medical data using optimized convolutional neural network and cryptography mechanism | |
| Sasirekha et al. | Systematic review on privacy-preserving machine learning techniques for healthcare data | |
| Darzidehkalani | Federated learning in medical image analysis | |
| Preethi et al. | Deep Learning with Blockchain Technology for Secure Data Management in Healthcare Sector using Hybrid Elliptic Curve-Rivest–Shamir–Adleman Cryptography | |
| Mastour et al. | Privacy-preserving Collaborative Computation: Methods, Challenges and Directions | |
| Sharma et al. | Ensuring the privacy of data in modern healthcare systems using adaptive encryption technique and disease prediction via attention-based residual DenseNet with GRU | |
| Deshmukh et al. | A survey on privacy preserving data mining techniques for clinical decision support system |