{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:47:05Z","timestamp":1775746025974,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"29","license":[{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100016999","name":"Western Norway University Of Applied Sciences","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100016999","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In the Internet of Medical Things (IoMT), collaboration among institutes can help complex medical and clinical analysis of disease. Deep neural networks (DNN) require training models on large, diverse patients to achieve expert clinician-level performance. Clinical studies do not contain diverse patient populations for analysis due to limited availability and scale. DNN models trained on limited datasets are thereby constraining their clinical performance upon deployment at a new hospital. Therefore, there is significant value in increasing the availability of diverse training data. This research proposes institutional data collaboration alongside an adversarial evasion method to keep the data secure. The model uses a federated learning approach to share model weights and gradients. The local model first studies the unlabeled samples classifying them as adversarial or normal. The method then uses a centroid-based clustering technique to cluster the sample images. After that, the model predicts the output of the selected images, and active learning methods are implemented to choose the sub-sample of the human annotation task. The expert within the domain takes the input and confidence score and validates the samples for the model\u2019s training. The model re-trains on the new samples and sends the updated weights across the network for collaboration purposes. We use the InceptionV3 and VGG16 model under fabricated inputs for simulating Fast Gradient Signed Method (FGSM) attacks. The model was able to evade attacks and achieve a high accuracy rating of 95%.<\/jats:p>","DOI":"10.1007\/s11042-021-11473-z","type":"journal-article","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T09:08:49Z","timestamp":1657616929000},"page":"41899-41910","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Mitigating adversarial evasion attacks by deep active learning for medical image classification"],"prefix":"10.1007","volume":"81","author":[{"given":"Usman","family":"Ahmed","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8768-9709","authenticated-orcid":false,"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,12]]},"reference":[{"key":"11473_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed U, Lin JCW, Srivastava G (2021) Privacy-preserving deep reinforcement learning in vehicle adhoc networks. IEEE Consum Electron Mag","DOI":"10.1109\/MCE.2021.3088408"},{"issue":"7","key":"11473_CR2","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1093\/neuonc\/noy020","volume":"20","author":"K Aldape","year":"2018","unstructured":"Aldape K et al (2018) Glioma through the looking GLASS: molecular evolution of diffuse gliomas and the glioma longitudinal analysis consortium. Neuro-Oncol 20(7):873\u2013884","journal-title":"Neuro-Oncol"},{"key":"11473_CR3","doi-asserted-by":"crossref","unstructured":"Amich A, Eshete B (2021) Explanation-guided diagnosis of machine learning evasion attacks. arXiv:2106.15820","DOI":"10.1007\/978-3-030-90019-9_11"},{"key":"11473_CR4","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.patcog.2017.03.020","volume":"75","author":"X Bai","year":"2018","unstructured":"Bai X, Yan C, Yang H, Bai L, Zhou J, Hancock ER (2018) Adaptive hash retrieval with kernel based similarity. Pattern Recogn 75:136\u2013148","journal-title":"Pattern Recogn"},{"key":"11473_CR5","unstructured":"Bonawitz K, Eichner H, Grieskamp W, Huba D, Ingerman A, Ivanov V, Kiddon C, Kone\u010dny\u0300 J, Mazzocchi S, McMahan HB et al (2019) Towards federated learning at scale: System design. arXiv:1902.01046"},{"issue":"10","key":"11473_CR6","doi-asserted-by":"publisher","first-page":"3042","DOI":"10.1109\/TMI.2020.2986331","volume":"39","author":"J Borovec","year":"2020","unstructured":"Borovec J et al (2020) ANHIR: Automatic Non-rigid histological image registration challenge. IEEE Trans Med Imaging 39(10):3042\u20133052","journal-title":"IEEE Trans Med Imaging"},{"issue":"8","key":"11473_CR7","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1093\/jamia\/ocy017","volume":"25","author":"K Chang","year":"2018","unstructured":"Chang K, Balachandar N, Lam C, Yi D, Brown J, Beers A, Rosen B, Rubin DL, Kalpathy-Cramer J (2018) Distributed deep learning networks among institutions for medical imaging. J Am Med Inform Assoc 25(8):945\u2013954","journal-title":"J Am Med Inform Assoc"},{"issue":"4","key":"11473_CR8","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1109\/TCC.2016.2617382","volume":"8","author":"M Chen","year":"2020","unstructured":"Chen M, Qian Y, Chen J, Hwang K, Mao S, Hu L (2020) Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Trans Cloud Comput 8(4):1274\u20131283","journal-title":"IEEE Trans Cloud Comput"},{"key":"11473_CR9","doi-asserted-by":"crossref","unstructured":"Cheng Y, Lu F, Zhang X (2018) Appearance-based gaze estimation via evaluation-guided asymmetric regression. In: Computer vision. Springer, pp 105\u2013121","DOI":"10.1007\/978-3-030-01264-9_7"},{"issue":"6","key":"11473_CR10","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1093\/neuonc\/noaa045","volume":"22","author":"C Davatzikos","year":"2020","unstructured":"Davatzikos C et al (2020) AI-Based prognostic imaging biomarkers for precision neuro-oncology: the reSPOND consortium. Neuro-Oncol 22(6):886\u2013888","journal-title":"Neuro-Oncol"},{"key":"11473_CR11","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li L, Li K, Li FF (2009) Imagenet: a large-scale hierarchical image database. In: IEEE Conference on computer vision and pattern recognition, pp 248\u2013255","DOI":"10.1109\/CVPR.2009.5206848"},{"issue":"2","key":"11473_CR12","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1109\/JIOT.2020.3008232","volume":"8","author":"X Ding","year":"2021","unstructured":"Ding X, Zhang S, Song M, Ding X, Li F (2021) Toward invisible adversarial examples against DNN-based privacy leakage for internet of things. Internet Things J 8(2):802\u2013812","journal-title":"Internet Things J"},{"issue":"7639","key":"11473_CR13","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1038\/nature21056","volume":"542","author":"A Esteva","year":"2017","unstructured":"Esteva A, Kuprel B, Novoa RA, Ko J, Swetter SM, Blau HM, Thrun S (2017) Dermatologist-level classification of skin cancer with deep neural networks. Nature 542(7639):115\u2013118","journal-title":"Nature"},{"key":"11473_CR14","doi-asserted-by":"crossref","unstructured":"Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Xiao C, Prakash A, Kohno T, Song D (2018) Robust physical-world attacks on deep learning visual classification. In: Conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2018.00175"},{"issue":"6433","key":"11473_CR15","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1126\/science.aaw4399","volume":"363","author":"SG Finlayson","year":"2019","unstructured":"Finlayson SG, Bowers JD, Ito J, Zittrain JL, Beam AL, Kohane IS (2019) Adversarial attacks on medical machine learning. Science 363 (6433):1287\u20131289","journal-title":"Science"},{"key":"11473_CR16","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: International conference on learning representations"},{"issue":"5","key":"11473_CR17","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1016\/j.cell.2018.02.010","volume":"172","author":"DS Kermany","year":"2018","unstructured":"Kermany DS et al (2018) Identifying medical diagnoses and treatable diseases by image-based deep learning. Cell 172(5):1122\u20131131.e9","journal-title":"Cell"},{"key":"11473_CR18","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.engappai.2019.06.005","volume":"85","author":"JCW Lin","year":"2019","unstructured":"Lin JCW, Shao Y, Zhou Y, Pirouz M, Chen HC (2019) A bi-lstm mention hypergraph model with encoding schema for mention extraction. Eng Appl Artif Intell 85:175\u2013181","journal-title":"Eng Appl Artif Intell"},{"key":"11473_CR19","doi-asserted-by":"publisher","first-page":"106548","DOI":"10.1016\/j.knosys.2020.106548","volume":"212","author":"JCW Lin","year":"2021","unstructured":"Lin JCW, Shao Y, Djenouri Y, Yun U (2021) Asrnn: a recurrent neural network with an attention model for sequence labeling. Knowl-Based Syst 212:106548","journal-title":"Knowl-Based Syst"},{"key":"11473_CR20","doi-asserted-by":"publisher","first-page":"687426","DOI":"10.3389\/fbioe.2021.687426","volume":"9","author":"Z Lyu","year":"2021","unstructured":"Lyu Z, Wang Z, Luo F, Shuai J, Huang Y (2021) Protein secondary structure prediction with a reductive deep learning method. Front Bioeng Biotechno 9:687426","journal-title":"Front Bioeng Biotechno"},{"key":"11473_CR21","doi-asserted-by":"crossref","unstructured":"Maarouf R, Sattar D, Matrawy A (2021) Evaluating resilience of encrypted traffic classification against adversarial evasion attacks. arXiv:2105.14564","DOI":"10.1109\/ISCC53001.2021.9631407"},{"key":"11473_CR22","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, pp 1273\u20131282"},{"key":"11473_CR23","first-page":"1093","volume":"33","author":"Y Niu","year":"2019","unstructured":"Niu Y, Gu L, Lu F, Lv F, Wang Z, Sato I, Zhang Z, Xiao Y, Dai X, Cheng T (2019) Pathological evidence exploration in deep retinal image diagnosis. AAAI Conf Artif Intell 33:1093\u20131101","journal-title":"AAAI Conf Artif Intell"},{"key":"11473_CR24","doi-asserted-by":"crossref","unstructured":"Paschali M, Conjeti S, Navarro F, Navab N (2018) Generalizability vs. robustness: Investigating medical imaging networks using adversarial examples. In: Medical image computing and computer assisted intervention, pp 493\u2013501","DOI":"10.1007\/978-3-030-00928-1_56"},{"key":"11473_CR25","doi-asserted-by":"crossref","unstructured":"Paranjape JN, Dubey RK, Gopalan VV (2020) Exploring the role of input and output layers of a deep neural network in adversarial defense. In: International conference on computing and data science, pp 114\u2013118","DOI":"10.1109\/CDS49703.2020.00029"},{"issue":"4","key":"11473_CR26","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/S1359-6446(04)03334-3","volume":"10","author":"HH Pien","year":"2005","unstructured":"Pien HH, Fischman AJ, Thrall JH, Sorensen A (2005) Using imaging biomarkers to accelerate drug development and clinical trials. Drug Discov Today 10(4):259\u2013266","journal-title":"Drug Discov Today"},{"key":"11473_CR27","doi-asserted-by":"crossref","unstructured":"Ravi V, Alazab M, Srinivasan S, Arunachalam A, Soman KP (2021) Adversarial defense: DGA-based botnets and DNS homographs detection through integrated deep learning. IEEE Trans Eng Manag","DOI":"10.1109\/TEM.2021.3059664"},{"key":"11473_CR28","doi-asserted-by":"crossref","unstructured":"Roth HR, Lu O (2015) Deeporgan: Multi-level deep convolutional networks for automated pancreas segmentation. In: International conference on medical image computing and computer-assisted intervention. Springer, pp 556\u2013564","DOI":"10.1007\/978-3-319-24553-9_68"},{"key":"11473_CR29","doi-asserted-by":"crossref","unstructured":"Roth HR, Chang K, Singh P, Neumark N, Li W, Gupta V, Gupta S, Qu L, Ihsani A, Bizzo BC et al (2020) Federated learning for breast density classification: a real-world implementation. In: Domain adaptation and representation transfer, and distributed and collaborative learning, pp 181\u2013191","DOI":"10.1007\/978-3-030-60548-3_18"},{"issue":"1","key":"11473_CR30","doi-asserted-by":"publisher","first-page":"12598","DOI":"10.1038\/s41598-020-69250-1","volume":"10","author":"MJ Sheller","year":"2020","unstructured":"Sheller MJ et al (2020) Federated learning in medicine: facilitating multi-institutional collaborations without sharing patient data. Scient Rep 10(1):12598","journal-title":"Scient Rep"},{"key":"11473_CR31","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556"},{"key":"11473_CR32","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.asoc.2021.107219","volume":"104","author":"K Stapor","year":"2021","unstructured":"Stapor K, Ksieniewicz P, Garc\u00eda S, Wo\u017aniak M (2021) How to design the fair experimental classifier evaluation. Appl Soft Comput 104:107\u2013219","journal-title":"Appl Soft Comput"},{"key":"11473_CR33","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv:1312.6199"},{"key":"11473_CR34","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: IEEE conference on computer vision and pattern recognition, pp 1\u20139","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"11473_CR35","doi-asserted-by":"crossref","unstructured":"Wang Z, Cai B (2021) COVID-19 Cases prediction in multiple areas via shapelet learning. Appl Intell 1\u201312","DOI":"10.1007\/s10489-021-02391-6"},{"issue":"2","key":"11473_CR36","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/LGRS.2018.2872355","volume":"16","author":"C Wang","year":"2019","unstructured":"Wang C, Bai X, Wang S, Zhou J, Ren P (2019) Multiscale visual attention networks for object detection in VHR remote sensing images. IEEE Geosci Remote Sens Lett 16(2):310\u2013314","journal-title":"IEEE Geosci Remote Sens Lett"},{"key":"11473_CR37","doi-asserted-by":"crossref","unstructured":"Yu Z, Zhou Y, Zhang W (2020) How can we deal with adversarial examples?. In: International conference on advanced computational intelligence, pp 628\u2013634","DOI":"10.1109\/ICACI49185.2020.9177527"},{"issue":"11","key":"11473_CR38","doi-asserted-by":"publisher","first-page":"e1002683","DOI":"10.1371\/journal.pmed.1002683","volume":"15","author":"JR Zech","year":"2018","unstructured":"Zech JR, Badgeley MA, Liu M, Costa AB, Titano JJ, Oermann EK (2018) Variable generalization performance of a deep learning model to detect pneumonia in chest radiographs: A cross-sectional study. PLOS Med 15(11):e1002683","journal-title":"PLOS Med"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11473-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11473-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11473-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,26]],"date-time":"2022-11-26T22:46:33Z","timestamp":1669502793000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11473-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,12]]},"references-count":38,"journal-issue":{"issue":"29","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["11473"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11473-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,12]]},"assertion":[{"value":"19 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}