[HTML][HTML] Privacy-preserving artificial intelligence in healthcare: Techniques and applications
There has been an increasing interest in translating artificial intelligence (AI) research into
clinically-validated applications to improve the performance, capacity, and efficacy of …
clinically-validated applications to improve the performance, capacity, and efficacy of …
Towards a universal privacy model for electronic health record systems: an ontology and machine learning approach
This paper proposed a novel privacy model for Electronic Health Records (EHR) systems
utilizing a conceptual privacy ontology and Machine Learning (ML) methodologies. It …
utilizing a conceptual privacy ontology and Machine Learning (ML) methodologies. It …
SHARP: A short-word hierarchical accelerator for robust and practical fully homomorphic encryption
Fully homomorphic encryption (FHE) is an emerging cryptographic technology that
guarantees the privacy of sensitive user data by enabling direct computations on encrypted …
guarantees the privacy of sensitive user data by enabling direct computations on encrypted …
From accuracy to approximation: A survey on approximate homomorphic encryption and its applications
W Liu, L You, Y Shao, X Shen, G Hu, J Shi… - Computer Science …, 2025 - Elsevier
Due to the increasing popularity of application scenarios such as cloud computing, and the
growing concern of users about the security and privacy of their data, information security …
growing concern of users about the security and privacy of their data, information security …
Private pathological assessment via machine learning and homomorphic encryption
Purpose The objective of this research is to explore the applicability of machine learning and
fully homomorphic encryption (FHE) in the private pathological assessment, with a focus on …
fully homomorphic encryption (FHE) in the private pathological assessment, with a focus on …
Potential of homomorphic encryption for cloud computing use cases in manufacturing
Homomorphic encryption enables secure cloud computing over the complete data lifecycle.
As so-called in-use encryption methodology, it allows using encrypted data for, eg, data …
As so-called in-use encryption methodology, it allows using encrypted data for, eg, data …
Crypto makes ai evolve
Adopting cryptography has given rise to a significant? evolution in AI. This chapter studies
the path and stages of this evolution. We start with reviewing existing relevant surveys …
the path and stages of this evolution. We start with reviewing existing relevant surveys …
SigML: supervised log anomaly with fully homomorphic encryption
Security (and Audit) log collection and storage is a crucial process for enterprises around the
globe. Log analysis helps identify potential security breaches and, in some cases, is …
globe. Log analysis helps identify potential security breaches and, in some cases, is …
Privacy-preserving machine learning for healthcare: open challenges and future perspectives
Abstract Machine Learning (ML) has recently shown tremendous success in modeling
various healthcare prediction tasks, ranging from disease diagnosis and prognosis to patient …
various healthcare prediction tasks, ranging from disease diagnosis and prognosis to patient …
SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation
Security log collection and storage are essential for organizations worldwide. Log analysis
can help recognize probable security breaches and is often required by law. However, many …
can help recognize probable security breaches and is often required by law. However, many …