{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:34:58Z","timestamp":1757619298991,"version":"3.44.0"},"publisher-location":"Singapore","reference-count":42,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819500321"},{"type":"electronic","value":"9789819500338"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-95-0033-8_12","type":"book-chapter","created":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T08:01:34Z","timestamp":1753344094000},"page":"135-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Multicenter Medical Model Inference from Homomorphic Encryption"],"prefix":"10.1007","author":[{"given":"Jingwei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Chen","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yuwen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kunhua","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Wenqiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenyuan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Yi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,25]]},"reference":[{"issue":"7880","key":"12_CR1","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1038\/s41586-021-03922-4","volume":"598","author":"HA Elmarakeby","year":"2021","unstructured":"Elmarakeby, H.A., et al.: Biologically informed deep neural network for prostate cancer discovery. Nature 598(7880), 348\u2013352 (2021)","journal-title":"Nature"},{"issue":"12","key":"12_CR2","doi-asserted-by":"publisher","first-page":"6278","DOI":"10.1172\/JCI139597","volume":"130","author":"X Chen","year":"2020","unstructured":"Chen, X., et al.: Urine DNA methylation assay enables early detection and recurrence monitoring for bladder cancer. J. Clin. Investig. 130(12), 6278\u20136289 (2020)","journal-title":"J. Clin. Investig."},{"doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Theory and application of trapdoor functions. In: FOCS 1982, pp. 80\u201391 (1982)","key":"12_CR3","DOI":"10.1109\/SFCS.1982.45"},{"doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In ICALP 2006, 2006, LNCS 4052, pp. 1\u201312 (2006)","key":"12_CR4","DOI":"10.1007\/11787006_1"},{"doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, pp. 169\u2013178. ACM, New York (2009)","key":"12_CR5","DOI":"10.1145\/1536414.1536440"},{"doi-asserted-by":"crossref","unstructured":"Sabt, M., et al.: Trusted execution environment: what it is, and what it is not. In: 2015 IEEE Trust-Com\/BigDataSE\/ISPA, vol. 1, pp. 57\u201364. IEEE (2015)","key":"12_CR6","DOI":"10.1109\/Trustcom.2015.357"},{"doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan V.: (Leveled) fully homomorphic encryption without bootstrapping. In: ITCS2012, pp. 309\u2013325. ACM, New York (2012)","key":"12_CR7","DOI":"10.1145\/2090236.2090262"},{"doi-asserted-by":"publisher","unstructured":"Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical GapSVP. In: CRYPTO 2012, LNCS 7417, pp. 868\u2013886. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_50","key":"12_CR8","DOI":"10.1007\/978-3-642-32009-5_50"},{"unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive https:\/\/eprint.iacr.org\/2012\/144 (2012)","key":"12_CR9"},{"doi-asserted-by":"publisher","unstructured":"Ducas, L., Micciancio, D.: FHEW: bootstrapping homomorphic encryption in less than a second. In: EUROCRYPT 2015, LNCS 9056, pp. 617\u2013640. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_24","key":"12_CR10","DOI":"10.1007\/978-3-662-46800-5_24"},{"issue":"1","key":"12_CR11","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","volume":"33","author":"I Chillotti","year":"2020","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. 33(1), 34\u201391 (2020)","journal-title":"J. Cryptol."},{"doi-asserted-by":"publisher","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017, pp. 409\u2013437. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15","key":"12_CR12","DOI":"10.1007\/978-3-319-70694-8_15"},{"doi-asserted-by":"crossref","unstructured":"Tibshirani, R.: Regression shrinkage and selection via the lasso. J. Royal Stat. Soc. Ser. B (Methodol.) 58(1), 267\u2013288 (1996)","key":"12_CR13","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"issue":"14","key":"12_CR14","doi-asserted-by":"publisher","first-page":"11571","DOI":"10.1007\/s00521-022-07044-4","volume":"34","author":"Y Chen","year":"2022","unstructured":"Chen, Y., Liu, J.: Polynomial dendritic neural networks. Neural Comput. Appl. 34(14), 11571\u201311588 (2022)","journal-title":"Neural Comput. Appl."},{"issue":"6","key":"12_CR15","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1037\/h0042519","volume":"65","author":"F Rosenblatt","year":"1958","unstructured":"Rosenblatt, F.: The perceptron: a probabilistic model for information storage and organization in the brain. Psychol. Rev. 65(6), 386\u2013408 (1958)","journal-title":"Psychol. Rev."},{"unstructured":"Liu, Z., et al.: KAN: Kolmogorov-Arnold networks. arXiv:2404.19756 (2024)","key":"12_CR16"},{"unstructured":"EPFL-LDS and Tune-Insight. Lattigo v5.0.2. https:\/\/github.com\/tuneinsight\/lattigo","key":"12_CR17"},{"doi-asserted-by":"crossref","unstructured":"Akhavan Mahdavi, R., et al.: Level Up: Private non-interactive decision tree evaluation using levelled homomorphic encryption. In: CCS 2023, pp. 2945\u20132958. ACM, New York (2023)","key":"12_CR18","DOI":"10.1145\/3576915.3623095"},{"doi-asserted-by":"publisher","unstructured":"Chen, J., Feng, Y., et al.: Non-interactive privacy-preserving na\u00efve Bayes classifier using homomorphic encryption. In: Shi, W., Chen, X., Choo, KK.R. (eds.) EAI SPNCE 2021, pp. 192\u2013203. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-96791-8_14","key":"12_CR19","DOI":"10.1007\/978-3-030-96791-8_14"},{"doi-asserted-by":"crossref","unstructured":"Yang, C., Chen, J., Wu, W., Feng, Y.: Optimized privacy-preserving clustering with fully homomorphic encryption. In: SecureComm 2024, Springer (2024)","key":"12_CR20","DOI":"10.1007\/978-3-031-94445-1_5"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"2175","DOI":"10.1109\/TIFS.2023.3263631","volume":"18","author":"D Kim","year":"2023","unstructured":"Kim, D., Guyot, C.: Optimized privacy-preserving CNN inference with fully homomorphic encryption. IEEE Trans. Info Forensic Secur. 18, 2175\u20132187 (2023)","journal-title":"IEEE Trans. Info Forensic Secur."},{"unstructured":"LeCun, Y., Cortes, C., Burges, C.J.C.: The MNIST database of handwritten digit (1998). http:\/\/yann.lecun.com\/exdb\/mnist\/","key":"12_CR22"},{"unstructured":"Krizhevsky, A., Nair, V., Hinton, G.: The CIFAR-10 dataset (2009). https:\/\/www.cs.toronto.edu\/~kriz\/cifar.html","key":"12_CR23"},{"doi-asserted-by":"publisher","unstructured":"Guerra-Manzanares, A., et al.: Privacy-preserving machine learning for healthcare: open challenges and future perspectives. In: Chen, H., Luo, L. (eds.) TML4H 2023, pp. 25\u201340. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-39539-0_3","key":"12_CR24","DOI":"10.1007\/978-3-031-39539-0_3"},{"issue":"1","key":"12_CR25","doi-asserted-by":"publisher","first-page":"1199","DOI":"10.1007\/s10462-023-10556-7","volume":"56","author":"VS Naresh","year":"2023","unstructured":"Naresh, V.S., et al.: Privacy-preserving deep learning in medical informatics: applications, challenges, and solutions. Artif. Intell. Rev. 56(1), 1199\u20131241 (2023)","journal-title":"Artif. Intell. Rev."},{"doi-asserted-by":"crossref","unstructured":"Anamaria Vizitiu, et al. Towards privacy-preserving deep learning based medical imaging applications. In 2019 MeMeA, pages 1\u20136. IEEE, 2019","key":"12_CR26","DOI":"10.1109\/MeMeA.2019.8802193"},{"doi-asserted-by":"crossref","unstructured":"Yue, Z., et al.: Privacy-preserving time-series medical images analysis using a hybrid deep learning framework. ACM Trans. Internet Technol. 21(3), 57:1\u201321, (2021)","key":"12_CR27","DOI":"10.1145\/3383779"},{"doi-asserted-by":"crossref","unstructured":"T\u2019Jonck, K., et al.: Privacy preserving classification via machine learning model inference on homomorphic encrypted medical data. In: ET, pp. 1\u20136. IEEE (2022)","key":"12_CR28","DOI":"10.1109\/ET55967.2022.9920289"},{"issue":"1","key":"12_CR29","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1038\/s41598-023-28481-8","volume":"13","author":"E Sarkar","year":"2023","unstructured":"Sarkar, E., et al.: Privacy-preserving cancer type prediction with homomorphic encryption. Sci. Rep. 13(1), 1661 (2023)","journal-title":"Sci. Rep."},{"issue":"1","key":"12_CR30","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.cels.2019.06.006","volume":"9","author":"GF Gao","year":"2019","unstructured":"Gao, G.F., et al.: Before and after: Comparison of legacy and harmonized TCGA genomic data commons\u2019 data. Cell Syst. 9(1), 24-34.e10 (2019)","journal-title":"Cell Syst."},{"doi-asserted-by":"crossref","unstructured":"Ron Edgar, M. Domrachev, Lash, A.E.: Gene expression omnibus: NCBI gene expression and hybridization array data repository. Nucleic Acids Res. 30(1), 207\u2013210 (2002)","key":"12_CR31","DOI":"10.1093\/nar\/30.1.207"},{"unstructured":"Dua, D., Graff, C.: UCI machine learning repository (2017). http:\/\/archive.ics.uci.edu\/ml","key":"12_CR32"},{"unstructured":"Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In Foundations of Secure Computation, pp. 165\u2013179. Academic Press, Atlanta (1978)","key":"12_CR33"},{"doi-asserted-by":"publisher","unstructured":"Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In CRYPTO 2013, LNCS 8042, pp. 75\u201392. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_5","key":"12_CR34","DOI":"10.1007\/978-3-642-40041-4_5"},{"doi-asserted-by":"crossref","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 34:1\u201340 (2009)","key":"12_CR35","DOI":"10.1145\/1568318.1568324"},{"doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. J. ACM, 60(6), 43:1\u201335 (2013)","key":"12_CR36","DOI":"10.1145\/2535925"},{"doi-asserted-by":"crossref","unstructured":"Goldreich, O.: Foundations of Cryptography-Volume II. Cambridge University Press (2004)","key":"12_CR37","DOI":"10.1017\/CBO9780511721656"},{"issue":"1","key":"12_CR38","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1137\/0202007","volume":"2","author":"MS Paterson","year":"1973","unstructured":"Paterson, M.S., Stockmeyer, L.J.: On the number of nonscalar multiplications necessary to evaluate polynomials. SIAM J. Comput. 2(1), 60\u201366 (1973)","journal-title":"SIAM J. Comput."},{"doi-asserted-by":"publisher","unstructured":"Chen, H., Chillotti, I., Song, Y.: Improved bootstrapping for approximate homomorphic encryption. In: EUROCRYPT 2019, LNCS 11477, pp. 34\u201354. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17656-3_2","key":"12_CR39","DOI":"10.1007\/978-3-030-17656-3_2"},{"unstructured":"Albrecht, M., et al.: Homomorphic encryption security standard. Technical report, HomomorphicEncryption.org, Toronto, Canada (2018)","key":"12_CR40"},{"issue":"3","key":"12_CR41","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1515\/jmc-2015-0016","volume":"9","author":"MR Albrecht","year":"2015","unstructured":"Albrecht, M.R., Player, R., Scott, S.: On the concrete hardness of learning with errors. J. Math. Cryptol. 9(3), 169\u2013203 (2015)","journal-title":"J. Math. Cryptol."},{"unstructured":"Lai, Z., Zhou, Y., Zheng, P., Chen, L.: Efficient privacy-preserving KAN inference using homomorphic encryption (2024). https:\/\/arxiv.org\/abs\/2409.07751","key":"12_CR42"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-0033-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T21:10:19Z","timestamp":1757279419000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-0033-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819500321","9789819500338"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-0033-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}