[HTML][HTML] Privacy-preserving artificial intelligence in healthcare: Techniques and applications

N Khalid, A Qayyum, M Bilal, A Al-Fuqaha… - Computers in Biology and …, 2023 - Elsevier
There has been an increasing interest in translating artificial intelligence (AI) research into
clinically-validated applications to improve the performance, capacity, and efficacy of …

Towards a universal privacy model for electronic health record systems: an ontology and machine learning approach

R Nowrozy, K Ahmed, H Wang, T Mcintosh - Informatics, 2023 - mdpi.com
This paper proposed a novel privacy model for Electronic Health Records (EHR) systems
utilizing a conceptual privacy ontology and Machine Learning (ML) methodologies. It …

SHARP: A short-word hierarchical accelerator for robust and practical fully homomorphic encryption

J Kim, S Kim, J Choi, J Park, D Kim… - Proceedings of the 50th …, 2023 - dl.acm.org
Fully homomorphic encryption (FHE) is an emerging cryptographic technology that
guarantees the privacy of sensitive user data by enabling direct computations on encrypted …

From accuracy to approximation: A survey on approximate homomorphic encryption and its applications

W Liu, L You, Y Shao, X Shen, G Hu, J Shi… - Computer Science …, 2025 - Elsevier
Due to the increasing popularity of application scenarios such as cloud computing, and the
growing concern of users about the security and privacy of their data, information security …

Private pathological assessment via machine learning and homomorphic encryption

A Al Badawi, M Faizal Bin Yusof - BioData Mining, 2024 - Springer
Purpose The objective of this research is to explore the applicability of machine learning and
fully homomorphic encryption (FHE) in the private pathological assessment, with a focus on …

Potential of homomorphic encryption for cloud computing use cases in manufacturing

R Kiesel, M Lakatsch, A Mann, K Lossie… - … of Cybersecurity and …, 2023 - mdpi.com
Homomorphic encryption enables secure cloud computing over the complete data lifecycle.
As so-called in-use encryption methodology, it allows using encrypted data for, eg, data …

Crypto makes ai evolve

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
Adopting cryptography has given rise to a significant? evolution in AI. This chapter studies
the path and stages of this evolution. We start with reviewing existing relevant surveys …

SigML: supervised log anomaly with fully homomorphic encryption

D Trivedi, A Boudguiga, N Triandopoulos - International Symposium on …, 2023 - Springer
Security (and Audit) log collection and storage is a crucial process for enterprises around the
globe. Log analysis helps identify potential security breaches and, in some cases, is …

Privacy-preserving machine learning for healthcare: open challenges and future perspectives

A Guerra-Manzanares, LJL Lopez… - … on Trustworthy Machine …, 2023 - Springer
Abstract Machine Learning (ML) has recently shown tremendous success in modeling
various healthcare prediction tasks, ranging from disease diagnosis and prognosis to patient …

SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation

D Trivedi, A Boudguiga, N Kaaniche, N Triandopoulos - Cryptography, 2023 - mdpi.com
Security log collection and storage are essential for organizations worldwide. Log analysis
can help recognize probable security breaches and is often required by law. However, many …