2020
DOI: 10.1155/2020/3910250
|View full text |Cite
|
Sign up to set email alerts
|

Applying Deep Neural Networks over Homomorphic Encrypted Medical Data

Abstract: In recent years, powered by state-of-the-art achievements in a broad range of areas, machine learning has received considerable attention from the healthcare sector. Despite their ability to provide solutions within personalized medicine, strict regulations on the confidentiality of patient health information have in many cases hindered the adoption of deep learning-based solutions in clinical workflows. To allow for the processing of sensitive health information without disclosing the underlying data, we prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(40 citation statements)
references
References 50 publications
0
38
0
Order By: Relevance
“…Privacy-Preserving Training of Neural Networks. A number of works focus on centralized solutions to enable privacy-preserving learning of NNs [103], [8], [115], [109], [85], [51]. Some of them, e.g., [103], [8], [115], employ differentially private techniques to execute the stochastic gradient descent while training a NN in order to derive models that are protected from inference attacks [102].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Privacy-Preserving Training of Neural Networks. A number of works focus on centralized solutions to enable privacy-preserving learning of NNs [103], [8], [115], [109], [85], [51]. Some of them, e.g., [103], [8], [115], employ differentially private techniques to execute the stochastic gradient descent while training a NN in order to derive models that are protected from inference attacks [102].…”
Section: Related Workmentioning
confidence: 99%
“…However, they assume that the training data is available to a trusted party that applies the noise required during the training steps. Other works, e.g., [109], [85], [51], rely on HE to outsource the training of multilayer perceptrons to a central server. These solutions either employ cryptographic parameters that are far from realistic [109], [85], or yield impractical performance [51].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To encrypt facial features for emotion recognition [68] , an encrypted facial recognition algorithm called Wasserstein generative adversarial network encryption can be used. A demonstration of using full HE called MORE (matrix operation for randomization or encryption) shows [69] that the training can take place on an encrypted dataset, and finally the inferencing algorithm can classify the encrypted X-ray images. The proposed end-to-end encryption algorithm was applied on the MNIST dataset, and the performance was satisfactory compared with plain text deep learning.…”
Section: Literature Reviewmentioning
confidence: 99%
“…If corresponds to only a single operation like addition or multiplication, such a scheme is called partially homomorphic. Several partially homomorphic encryption schemes were proposed and successfully used in the applications such as oblivious polynomial evaluation, electronic voting, multiparty computation, private information retrieval, Deep Learning systems, Big data systems, medical applications and so on (5)(6)(7)(8). However, in order to perform arbitrary computations over the encrypted data so that the scheme is suitable for any application in general, it must support both addition and multiplication operations over the ciphertexts unlimitedly.…”
Section: Introductionmentioning
confidence: 99%