{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T23:15:50Z","timestamp":1776381350670,"version":"3.51.2"},"reference-count":102,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T00:00:00Z","timestamp":1591574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T00:00:00Z","timestamp":1591574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Nat Mach Intell"],"DOI":"10.1038\/s42256-020-0186-1","type":"journal-article","created":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T16:05:41Z","timestamp":1591632341000},"page":"305-311","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1123,"title":["Secure, privacy-preserving and federated machine learning in medical imaging"],"prefix":"10.1038","volume":"2","author":[{"given":"Georgios A.","family":"Kaissis","sequence":"first","affiliation":[]},{"given":"Marcus R.","family":"Makowski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5683-5889","authenticated-orcid":false,"given":"Daniel","family":"R\u00fcckert","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6039-6957","authenticated-orcid":false,"given":"Rickmer F.","family":"Braren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,8]]},"reference":[{"key":"186_CR1","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms5006","volume":"5","author":"HJWL Aerts","year":"2014","unstructured":"Aerts, H. J. W. L. et al. Decoding tumour phenotype by noninvasive imaging using a quantitative radiomics approach. Nat. Commun. 5, 4006 (2014).","journal-title":"Nat. Commun."},{"key":"186_CR2","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1038\/nrclinonc.2017.141","volume":"14","author":"P Lambin","year":"2017","unstructured":"Lambin, P. et al. Radiomics: the bridge between medical imaging and personalized medicine. Nat. Rev. Clin. Oncol. 14, 749\u2013762 (2017).","journal-title":"Nat. Rev. Clin. Oncol."},{"key":"186_CR3","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O. et al. ImageNet large scale visual recognition challenge. Int. J. Comp. Vision 115, 211\u2013252 (2015).","journal-title":"Int. J. Comp. Vision"},{"key":"186_CR4","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1038\/s41586-019-1799-6","volume":"577","author":"SM McKinney","year":"2020","unstructured":"McKinney, S. M. et al. International evaluation of an AI system for breast cancer screening. Nature 577, 89\u201394 (2020).","journal-title":"Nature"},{"key":"186_CR5","doi-asserted-by":"publisher","first-page":"954","DOI":"10.1038\/s41591-019-0447-x","volume":"25","author":"D Ardila","year":"2019","unstructured":"Ardila, D. et al. End-to-end lung cancer screening with three-dimensional deep learning on low-dose chest computed tomography. Nat. Med. 25, 954\u2013961 (2019).","journal-title":"Nat. Med."},{"key":"186_CR6","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1148\/radiol.2018172171","volume":"287","author":"K Pinker","year":"2018","unstructured":"Pinker, K., Chin, J., Melsaether, A. N., Morris, E. A. & Moy, L. Precision medicine and radiogenomics in breast cancer: new approaches toward diagnosis and treatment. Radiology 287, 732\u2013747 (2018).","journal-title":"Radiology"},{"key":"186_CR7","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-08718-9","volume":"10","author":"H Lu","year":"2019","unstructured":"Lu, H. et al. A mathematical-descriptor of tumor-mesoscopic-structure from computed-tomography images annotates prognostic- and molecular-phenotypes of epithelial ovarian cancer. Nat. Commun. 10, 764 (2019).","journal-title":"Nat. Commun."},{"key":"186_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1186\/s41747-019-0119-0","volume":"3","author":"G Kaissis","year":"2019","unstructured":"Kaissis, G. et al. A machine learning model for the prediction of survival and tumor subtype in pancreatic ductal adenocarcinoma from preoperative diffusion-weighted imaging. Eur. Radiol. Exp. 3, 41\u201341 (2019).","journal-title":"Eur. Radiol. Exp."},{"key":"186_CR9","doi-asserted-by":"publisher","first-page":"e0218642","DOI":"10.1371\/journal.pone.0218642","volume":"14","author":"G Kaissis","year":"2019","unstructured":"Kaissis, G. et al. A machine learning algorithm predicts molecular subtypes in pancreatic ductal adenocarcinoma with differential response to gemcitabine-based versus FOLFIRINOX chemotherapy. PLoS ONE 14, e0218642 (2019).","journal-title":"PLoS ONE"},{"key":"186_CR10","doi-asserted-by":"publisher","first-page":"2912","DOI":"10.1007\/s00330-019-06601-1","volume":"30","author":"E Cui","year":"2020","unstructured":"Cui, E. et al. Predicting the ISUP grade of clear cell renal cell carcinoma with multiparametric MR and multiphase CT radiomics. Eur. Radiol. 30, 2912\u20132921 (2020).","journal-title":"Eur. Radiol."},{"key":"186_CR11","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-38381-x","volume":"9","author":"B Varghese","year":"2019","unstructured":"Varghese, B. et al. Objective risk stratification of prostate cancer using machine learning and radiomics applied to multiparametric magnetic resonance images. Sci. Rep. 9, 1570 (2019).","journal-title":"Sci. Rep."},{"key":"186_CR12","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-11007-0","volume":"10","author":"N Elshafeey","year":"2019","unstructured":"Elshafeey, N. et al. Multicenter study demonstrates radiomic features derived from magnetic resonance perfusion images identify pseudoprogression in glioblastoma. Nat. Commun. 10, 3170 (2019).","journal-title":"Nat. Commun."},{"key":"186_CR13","unstructured":"Rajpurkar, P. et al. CheXNet: radiologist-level pneumonia detection on chest X-rays with deep learning. Preprint at https:\/\/arxiv.org\/abs\/1711.05225 (2017)."},{"key":"186_CR14","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1038\/s41551-018-0195-0","volume":"2","author":"R Poplin","year":"2018","unstructured":"Poplin, R. et al. Prediction of cardiovascular risk factors from retinal fundus photographs via deep learning. Nat. Biomed. Eng. 2, 158\u2013164 (2018).","journal-title":"Nat. Biomed. Eng."},{"key":"186_CR15","doi-asserted-by":"publisher","first-page":"e1001779","DOI":"10.1371\/journal.pmed.1001779","volume":"12","author":"C Sudlow","year":"2015","unstructured":"Sudlow, C. et al. UK biobank: an open access resource for identifying the causes of a wide range of complex diseases of middle and old age. PLoS Med. 12, e1001779 (2015).","journal-title":"PLoS Med."},{"key":"186_CR16","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1038\/nature16961","volume":"529","author":"D Silver","year":"2016","unstructured":"Silver, D. et al. Mastering the game of Go with deep neural networks and tree search. Nature 529, 484\u2013489 (2016).","journal-title":"Nature"},{"key":"186_CR17","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1038\/s41586-019-1724-z","volume":"575","author":"O Vinyals","year":"2019","unstructured":"Vinyals, O. et al. Grandmaster level in StarCraft II using multi-agent reinforcement learning. Nature 575, 350\u2013354 (2019).","journal-title":"Nature"},{"key":"186_CR18","doi-asserted-by":"publisher","first-page":"102021","DOI":"10.1109\/ACCESS.2019.2926040","volume":"7","author":"L Fridman","year":"2019","unstructured":"Fridman, L. et al. MIT advanced vehicle technology study: large-scale naturalistic driving study of driver behavior and interaction with automation. IEEE Access 7, 102021\u2013102038 (2019).","journal-title":"IEEE Access"},{"key":"186_CR19","doi-asserted-by":"crossref","unstructured":"Obermeyer, Z. & Mullainathan, S. Dissecting racial bias in an algorithm that guides health decisions for 70 million people. In Proc. Conf. Fairness, Accountability, and Transparency 89 (ACM, 2019).","DOI":"10.1145\/3287560.3287593"},{"key":"186_CR20","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/S0002-9343(03)00057-3","volume":"114","author":"SJ Wang","year":"2003","unstructured":"Wang, S. J. et al. A cost-benefit analysis of electronic medical records in primary care. Am. J. Med. 114, 397\u2013403 (2003).","journal-title":"Am. J. Med."},{"key":"186_CR21","unstructured":"DICOM reference guide. Health Dev. 30, 5\u201330 (2001)."},{"key":"186_CR22","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2017.177","volume":"4","author":"RS Lee","year":"2017","unstructured":"Lee, R. S. et al. A curated mammography data set for use in computer-aided detection and diagnosis research. Sci. Data 4, 170177 (2017).","journal-title":"Sci. Data"},{"key":"186_CR23","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1038\/s41591-018-0272-7","volume":"25","author":"WN Price","year":"2019","unstructured":"Price, W. N. & Cohen, I. G. Privacy in the age of medical big data. Nat. Med. 25, 37\u201343 (2019).","journal-title":"Nat. Med."},{"key":"186_CR24","unstructured":"HIPAA. US Department of Health and Human Services https:\/\/www.hhs.gov\/hipaa\/index.html (2020)."},{"key":"186_CR25","unstructured":"GDPR. Intersoft Consulting https:\/\/gdpr-info.eu (2016)."},{"key":"186_CR26","doi-asserted-by":"publisher","first-page":"20180080","DOI":"10.1098\/rsta.2018.0080","volume":"376","author":"C Cath","year":"2018","unstructured":"Cath, C. Governing artificial intelligence: ethical, legal and technical opportunities and challenges. Philos. Trans. R. Soc. A 376, 20180080 (2018).","journal-title":"Philos. Trans. R. Soc. A"},{"key":"186_CR27","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1038\/s42256-019-0136-y","volume":"2","author":"A Theodorou","year":"2020","unstructured":"Theodorou, A. & Dignum, V. Towards ethical and socio-legal governance in AI. Nat. Mach. Intell. 2, 10\u201312 (2020).","journal-title":"Nat. Mach. Intell."},{"key":"186_CR28","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1038\/s42256-019-0088-2","volume":"1","author":"A Jobin","year":"2019","unstructured":"Jobin, A., Ienca, M. & Vayena, E. The global landscape of AI ethics guidelines. Nat. Mach. Intell. 1, 389\u2013399 (2019).","journal-title":"Nat. Mach. Intell."},{"key":"186_CR29","doi-asserted-by":"crossref","unstructured":"Cavoukian, A. Privacy by Design (Information and Privacy Commissioner of Ontario, 2011).","DOI":"10.4018\/978-1-61350-501-4.ch007"},{"key":"186_CR30","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1146\/annurev-statistics-060116-054123","volume":"4","author":"C Dwork","year":"2017","unstructured":"Dwork, C., Smith, A., Steinke, T. & Ullman, J. Exposed! A survey of attacks on private data. Annu. Rev. Stat. Appl. 4, 61\u201384 (2017).","journal-title":"Annu. Rev. Stat. Appl."},{"key":"186_CR31","doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C. & Shmatikov, V. Membership inference attacks against machine learning models. In Proc. 38th IEEE Symp. Security and Privacy https:\/\/doi.org\/10.1109\/SP.2017.41 (IEEE, 2017).","DOI":"10.1109\/SP.2017.41"},{"key":"186_CR32","doi-asserted-by":"crossref","unstructured":"Bindschaedler, V., Grubbs, P., Cash, D., Ristenpart, T. & Shmatikov, V. The tao of inference in privacy-protected databases. In Proc. VLDB Endowment 11, 1715\u20131728 (ACM, 2018).","DOI":"10.14778\/3236187.3236217"},{"key":"186_CR33","doi-asserted-by":"crossref","unstructured":"Kurita, K., Michel, P. & Neubig, G. Weight poisoning attacks on pre-trained models. Preprint at https:\/\/arxiv.org\/abs\/2004.06660 (2020).","DOI":"10.18653\/v1\/2020.acl-main.249"},{"key":"186_CR34","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","volume":"17","author":"M Al-Rubaie","year":"2019","unstructured":"Al-Rubaie, M. & Chang, J. M. Privacy preserving machine learning: threats and solutions. IEEE Secur. Priv. 17, 49\u201358 (2019).","journal-title":"IEEE Secur. Priv."},{"key":"186_CR35","first-page":"95","volume":"6","author":"H Surendra","year":"2017","unstructured":"Surendra, H. & Mohan, H. S. A review of synthetic data generation methods for privacy preserving data publishing. Int. J. Sci. Technol. Res. 6, 95\u2013101 (2017).","journal-title":"Int. J. Sci. Technol. Res."},{"key":"186_CR36","doi-asserted-by":"publisher","first-page":"159","DOI":"10.7326\/M19-1759","volume":"172","author":"JX Jiang","year":"2019","unstructured":"Jiang, J. X. & Bai, G. Types of information compromised in breaches of protected health information. Ann. Intern. Med. 172, 159\u2013160 (2019).","journal-title":"Ann. Intern. Med."},{"key":"186_CR37","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1093\/medlaw\/fwz009","volume":"27","author":"MJ Taylor","year":"2019","unstructured":"Taylor, M. J. & Wilson, J. Reasonable expectations of privacy and disclosure of health data. Med. Law Rev. 27, 432\u2013460 (2019).","journal-title":"Med. Law Rev."},{"key":"186_CR38","unstructured":"General Data Protection Regulation: NHS European Office Position Paper (NHS Confederation, 2012)."},{"key":"186_CR39","doi-asserted-by":"publisher","first-page":"e28071","DOI":"10.1371\/journal.pone.0028071","volume":"6","author":"K El Emam","year":"2011","unstructured":"El Emam, K., Jonker, E., Arbuckle, L. & Malin, B. A systematic review of re-identification attacks on health data. PLoS ONE 6, e28071 (2011).","journal-title":"PLoS ONE"},{"key":"186_CR40","doi-asserted-by":"crossref","unstructured":"Narayanan, A. & Shmatikov, V. Robust de-anonymization of large sparse datasets. In 2008 IEEE Symp. Security and Privacy 111\u2013125 (IEEE, 2008).","DOI":"10.1109\/SP.2008.33"},{"key":"186_CR41","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1126\/science.1256297","volume":"347","author":"YA de Montjoye","year":"2015","unstructured":"de Montjoye, Y. A., Radaelli, L., Singh, V. K. & Pentland, A. S. Identity and privacy. Unique in the shopping mall: on the reidentifiability of credit card metadata. Science 347, 536\u2013539 (2015).","journal-title":"Science"},{"key":"186_CR42","doi-asserted-by":"publisher","first-page":"1684","DOI":"10.1056\/NEJMc1908881","volume":"381","author":"CG Schwarz","year":"2019","unstructured":"Schwarz, C. G. et al. Identification of anonymous MRI research participants with face-recognition software. New Engl. J. Med. 381, 1684\u20131686 (2019).","journal-title":"New Engl. J. Med."},{"key":"186_CR43","doi-asserted-by":"publisher","unstructured":"Ma, X. et al. Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recognit. https:\/\/doi.org\/10.1016\/j.patcog.2020.107332 (2020).","DOI":"10.1016\/j.patcog.2020.107332"},{"key":"186_CR44","doi-asserted-by":"publisher","unstructured":"Abramian, D. & Eklund, A. Refacing: reconstructing anonymized facial features using GANs. In 2019 IEEE 16th International Symp. Biomedical Imaging https:\/\/doi.org\/10.1109\/ISBI.2019.8759515 (IEEE, 2019).","DOI":"10.1109\/ISBI.2019.8759515"},{"key":"186_CR45","unstructured":"Tanner, A. Our Bodies, Our Data: How Companies Make Billions Selling Our Medical Records (Beacon, 2017)."},{"key":"186_CR46","unstructured":"Kone\u010dn\u00fd, J., McMahan, B. & Ramage, D. Federated optimization: distributed optimization beyond the datacenter. Preprint at https:\/\/arxiv.org\/abs\/1511.03575 (2015)."},{"key":"186_CR47","unstructured":"Hu, C., Jiang, J. & Wang, Z. Decentralized federated learning: a segmented gossip approach. Preprint at https:\/\/arxiv.org\/abs\/1908.07782 (2019)."},{"key":"186_CR48","unstructured":"Passerat-Palmbach, J. et al. A blockchain-orchestrated federated learning architecture for healthcare consortia. Preprint at https:\/\/arxiv.org\/abs\/1910.12603 (2019)."},{"key":"186_CR49","unstructured":"Kone\u010dn\u00fd, J. et al. Federated learning: strategies for improving communication efficiency. Preprint https:\/\/arxiv.org\/abs\/1610.05492 (2016)."},{"key":"186_CR50","unstructured":"Rieke, N. et al. The future of digital health with federated learning. Preprint at https:\/\/arxiv.org\/abs\/2003.08119 (2020)."},{"key":"186_CR51","first-page":"110061D","volume":"11006","author":"R Tomsett","year":"2019","unstructured":"Tomsett, R., Chan, K. & Chakraborty, S. Model poisoning attacks against distributed machine learning systems. Proc. SPIE 11006, 110061D (2019).","journal-title":"Proc. SPIE"},{"key":"186_CR52","unstructured":"Carlini, N., Liu, C., Erlingsson, \u00da., Kos, J. & Song, D. The secret sharer: evaluating and testing unintended memorization in neural networks. In Proc. 28th USENIX Security Symp. 267\u2013284 (USENIX Association, 2019)."},{"key":"186_CR53","unstructured":"Zhang, Y. et al. The secret revealer: generative model-inversion attacks against deep neural networks. Preprint at https:\/\/arxiv.org\/abs\/1911.07135 (2019)."},{"key":"186_CR54","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Ateniese, G. & Perez-Cruz, F. Deep models under the GAN: information leakage from collaborative deep learning. In Proc. 2017 ACM SIGSAC Conf. Computer and Communications Security 603\u2013618 (ACM, 2017).","DOI":"10.1145\/3133956.3134012"},{"key":"186_CR55","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S. & Ristenpart, T. Model inversion attacks that exploit confidence information and basic countermeasures. In Proc. 22nd ACM SIGSAC Conf. Computer and Communications Security 1322\u20131333 (ACM, 2015).","DOI":"10.1145\/2810103.2813677"},{"key":"186_CR56","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1561\/0400000042","volume":"9","author":"A Roth","year":"2013","unstructured":"Roth, A. & Dwork, C. The algorithmic foundations of differential privacy. Found. Trends Theoretical Comp. Sci. 9, 211\u2013407 (2013).","journal-title":"Found. Trends Theoretical Comp. Sci."},{"key":"186_CR57","doi-asserted-by":"crossref","unstructured":"Cheu, A., Smith, A., Ullman, J., Zeber, D. & Zhilyaev, M. Distributed differential privacy via shuffling. In Annual Int. Conf. Theory and Applications of Cryptographic Techniques 375\u2013403 (Springer, 2018).","DOI":"10.1007\/978-3-030-17653-2_13"},{"key":"186_CR58","unstructured":"Dong, J., Roth, A. & Su, W. J. Gaussian differential privacy. Preprint at https:\/\/arxiv.org\/abs\/1905.02383 (2019)."},{"key":"186_CR59","unstructured":"Rajkumar, A. & Agarwal, S. A differentially private stochastic gradient descent algorithm for multiparty classification. In Proc. Fifteenth Int. Conf. Artificial Intelligence and Statistics 22, 933\u2013941 (PMLR, 2012)."},{"key":"186_CR60","unstructured":"Papernot, N. et al. Scalable private learning with PATE. In Proc. 6th Int. Conf. Learning Representations (ICLR, 2018)."},{"key":"186_CR61","doi-asserted-by":"publisher","first-page":"e0207639","DOI":"10.1371\/journal.pone.0207639","volume":"13","author":"JW Kim","year":"2018","unstructured":"Kim, J. W., Jang, B. & Yoo, H. Privacy-preserving aggregation of personal health data streams. PLoS ONE 13, e0207639 (2018).","journal-title":"PLoS ONE"},{"key":"186_CR62","unstructured":"Mireshghallah, F. et al. A principled approach to learning stochastic representations for privacy in deep neural inference. Preprint at https:\/\/arxiv.org\/abs\/2003.12154 (2020)."},{"key":"186_CR63","doi-asserted-by":"crossref","unstructured":"Mortier, R., Haddadi, H., Henderson, T., McAuley, D. & Crowcroft, J. Human-data interaction: the human face of the data-driven society. Preprint at https:\/\/arxiv.org\/abs\/1412.6159 (2014).","DOI":"10.2139\/ssrn.2508051"},{"key":"186_CR64","doi-asserted-by":"crossref","unstructured":"Garfinkel, S. L., Abowd, J. M. & Powazek, S. Issues encountered deploying differential privacy. In Proc. 2018 Workshop on Privacy in the Electronic Society 133\u2013137 (ACM, 2018).","DOI":"10.1145\/3267323.3268949"},{"key":"186_CR65","unstructured":"Goodfellow, I. J., Shlens, J. & Szegedy, C. Explaining and harnessing adversarial examples. Preprint at https:\/\/arxiv.org\/abs\/1412.6572 (2014)."},{"key":"186_CR66","doi-asserted-by":"publisher","unstructured":"You, Z., Ye, J., Li, K., Xu, Z. & Wang, P. Adversarial noise layer: regularize neural network by adding noise. In 2019 IEEE Int. Conf. Image Processing https:\/\/doi.org\/10.1109\/ICIP.2019.8803055 (IEEE, 2019).","DOI":"10.1109\/ICIP.2019.8803055"},{"key":"186_CR67","unstructured":"Schneier, B. & Sutherland, P. Applied Cryptography: Protocols, Algorithms, and Source Code in C 157\u2013158 (Wiley, 1995)."},{"key":"186_CR68","unstructured":"Daemen, J. & Rijmen, V. The Design of Rijndael: AES - The Advanced Encryption Standard (Springer, 2013)."},{"key":"186_CR69","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar, A., Aksu, H., Selcuk Uluagac, A. & Conti, M. A survey on homomorphic encryption schemes: theory and implementation. ACM Comput. Surv. 51, 79 (2018).","journal-title":"ACM Comput. Surv."},{"key":"186_CR70","unstructured":"Hesamifard, E., Takabi, H. & Ghasemi, M. CryptoDL: deep neural networks over encrypted data. Preprint at https:\/\/arxiv.org\/abs\/1711.05189 (2017)."},{"key":"186_CR71","unstructured":"Dowlin, N. et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In Proc. 33rd Int. Conf. Machine Learning Vol. 48 201\u2013210 (PMLR, 2016)."},{"key":"186_CR72","doi-asserted-by":"publisher","first-page":"15952","DOI":"10.3390\/s150715952","volume":"15","author":"X Li","year":"2015","unstructured":"Li, X., Chen, D., Li, C. & Wang, L. Secure data aggregation with fully homomorphic encryption in large-scale wireless sensor networks. Sensors 15, 15952\u201315973 (2015).","journal-title":"Sensors"},{"key":"186_CR73","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2018.10.024","volume":"476","author":"C Zhao","year":"2019","unstructured":"Zhao, C. et al. Secure multi-party computation: theory, practice and applications. Inform. Sci. 476, 357\u2013372 (2019).","journal-title":"Inform. Sci."},{"key":"186_CR74","doi-asserted-by":"crossref","unstructured":"Evans, D., Kolesnikov, V. & Rosulek, M. A Pragmatic Introduction to Secure Multi-Party Computation (NOW, 2018).","DOI":"10.1561\/9781680835090"},{"key":"186_CR75","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1126\/science.aam9710","volume":"357","author":"KA Jagadeesh","year":"2017","unstructured":"Jagadeesh, K. A., Wu, D. J., Birgmeier, J. A., Boneh, D. & Bejerano, G. Deriving genomic diagnoses without revealing patient genomes. Science 357, 692\u2013695 (2017).","journal-title":"Science"},{"key":"186_CR76","unstructured":"Helm, T. Patient data from GP surgeries sold to US companies. The Guardian https:\/\/www.theguardian.com\/politics\/2019\/dec\/07\/nhs-medical-data-sales-american-pharma-lack-transparency (2019)."},{"key":"186_CR77","doi-asserted-by":"crossref","unstructured":"Tkachenko, O., Weinert, C., Schneider, T. & Hamacher, K. Large-scale privacy-preserving statistical computations for distributed genome-wide association studies. In Proc. 2018 on Asia Conf. Computer and Communications Security 221\u2013235 (2018).","DOI":"10.1145\/3196494.3196541"},{"key":"186_CR78","doi-asserted-by":"crossref","unstructured":"Kumar, N. et al. CrypTFlow: secure tensorflow inference. In Proc. 41st IEEE Symp. Security and Privacy (IEEE, 2020).","DOI":"10.1109\/SP40000.2020.00092"},{"key":"186_CR79","unstructured":"Secure enclave overview. Apple Platform Security https:\/\/support.apple.com\/guide\/security\/secure-enclave-overview-sec59b0b31ff\/web (2020)."},{"key":"186_CR80","unstructured":"Cloud TPU. Google https:\/\/cloud.google.com\/tpu\/ (2020)."},{"key":"186_CR81","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/3331469","volume":"36","author":"AY Chen","year":"2019","unstructured":"Chen, A. Y. et al. An instruction set architecture for machine learning. ACM Trans. Comput. Syst. 36, 9 (2019).","journal-title":"ACM Trans. Comput. Syst."},{"key":"186_CR82","unstructured":"Qayyum, A., Qadir, J., Bilal, M. & Al-Fuqaha, A. Secure and robust machine learning for healthcare: a survey. Preprint at https:\/\/arxiv.org\/abs\/2001.08103 (2020)."},{"key":"186_CR83","doi-asserted-by":"crossref","unstructured":"Pandemic data challenges. Nat. Mach. Intell. 2, 193 (2020).","DOI":"10.1038\/s42256-020-0172-7"},{"key":"186_CR84","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.3390\/s17061360","volume":"17","author":"J Son","year":"2017","unstructured":"Son, J. et al. Privacy-preserving electrocardiogram monitoring for intelligent arrhythmia detection. Sensors 17, 1360 (2017).","journal-title":"Sensors"},{"key":"186_CR85","first-page":"20190020","volume":"2","author":"KS Mudgal","year":"2020","unstructured":"Mudgal, K. S. & Das, N. The ethical adoption of artificial intelligence in radiology. BJR Open 2, 20190020 (2020).","journal-title":"BJR Open"},{"key":"186_CR86","doi-asserted-by":"crossref","unstructured":"Li, W. et al. Privacy-preserving federated brain tumour segmentation. In Proc. 10th Int. Workshop on Machine Learning in Medical Imaging 133\u2013141 (Springer, 2019).","DOI":"10.1007\/978-3-030-32692-0_16"},{"key":"186_CR87","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1038\/s41587-019-0271-3","volume":"37","author":"D Grishin","year":"2019","unstructured":"Grishin, D., Obbad, K. & Church, G. M. Data privacy in the age of personal genomics. Nat. Biotechnol. 37, 1115\u20131117 (2019).","journal-title":"Nat. Biotechnol."},{"key":"186_CR88","unstructured":"Takabi, D., Podschwadt, R., Druce, J., Wu, C. & Procopio, K. Privacy preserving neural network inference on encrypted data with GPUs. Preprint at https:\/\/arxiv.org\/abs\/1911.11377 (2019)."},{"key":"186_CR89","unstructured":"Ryffel, T., Dufour-Sans, E., Gay, R., Bach, F. & Pointcheval, D. Partially encrypted machine learning using functional encryption. In Proc. 33rd Conf. Neural Information Processing Systems (NeurIPS, 2019)."},{"key":"186_CR90","unstructured":"Chou, E. et al. Faster CryptoNets: leveraging sparsity for real-world encrypted inference Preprint at https:\/\/arxiv.org\/abs\/1811.09953 (2018)."},{"key":"186_CR91","doi-asserted-by":"crossref","unstructured":"Dathathri, R. et al. CHET: an optimizing compiler for fully-homomorphic neural-network inferencing. In Proc. 40th ACM SIGPLAN Conf. Programming Language Design and Implementation 142\u2013156 (ACM, 2019).","DOI":"10.1145\/3314221.3314628"},{"key":"186_CR92","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3390\/computers8010003","volume":"8","author":"M Salem","year":"2019","unstructured":"Salem, M., Taheri, S. & Yuan, J.-S. Utilizing transfer learning and homomorphic encryption in a privacy preserving and secure biometric recognition system. Computers 8, 3 (2019).","journal-title":"Computers"},{"key":"186_CR93","doi-asserted-by":"crossref","unstructured":"Harder, F., Bauer, M. & Park, M. Interpretable and differentially private predictions. In Proc. Thirty-Fourth AAAI Conf. Artificial Intelligence (AAAI, 2020).","DOI":"10.1609\/aaai.v34i04.5827"},{"key":"186_CR94","unstructured":"Xu, Z., Li, C. & Jegelka, S. Robust GANs against dishonest adversaries. Preprint at https:\/\/arxiv.org\/abs\/1802.09700 (2018)."},{"key":"186_CR95","doi-asserted-by":"publisher","unstructured":"Nelson, K. et al. Evaluating model drift in machine learning algorithms. In 2015 IEEE Symp. Computational Intelligence for Security and Defense Applications https:\/\/doi.org\/10.1109\/CISDA.2015.7208643 (IEEE, 2015).","DOI":"10.1109\/CISDA.2015.7208643"},{"key":"186_CR96","unstructured":"Bourtoule, L. et al. Machine unlearning. Preprint at https:\/\/arxiv.org\/abs\/1912.03817 (2019)."},{"key":"186_CR97","unstructured":"Ryffel, T. et al. A generic framework for privacy preserving deep learning. Preprint at https:\/\/arxiv.org\/abs\/1811.04017 (2018)."},{"key":"186_CR98","unstructured":"Dahl, M. et al. Private machine learning in TensorFlow using secure computation. Privacy Preserving Machine Learning, NeurIPS 2018 Workshop, Montr\u00e9al, December 8, 2018. Available at: https:\/\/arxiv.org\/abs\/1810.08130 (2018)."},{"key":"186_CR99","unstructured":"Brundage, M. et al. Toward trustworthy AI development: mechanisms for supporting verifiable claims. Preprint at https:\/\/arxiv.org\/abs\/2004.07213 (2020)."},{"key":"186_CR100","unstructured":"Tobin, A. & Reed, D. The Inevitable Rise of Self-Sovereign Identity (Sovrin Foundation, 2016)."},{"key":"186_CR101","unstructured":"Ghorbani, A. & Zou, J. Data Shapley: equitable valuation of data for machine learning. In Proc. 36th Int. Conf. Machine Learning (PMLR, 2019)."},{"key":"186_CR102","first-page":"1369","volume":"117","author":"S-A Elvy","year":"2017","unstructured":"Elvy, S.-A. Paying for privacy and the personal data economy. Colum. L. Rev. 117, 1369 (2017).","journal-title":"Colum. L. Rev."}],"container-title":["Nature Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.nature.com\/articles\/s42256-020-0186-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s42256-020-0186-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s42256-020-0186-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:08:35Z","timestamp":1733954915000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.nature.com\/articles\/s42256-020-0186-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,8]]},"references-count":102,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2020,6]]}},"alternative-id":["186"],"URL":"https:\/\/doi.org\/10.1038\/s42256-020-0186-1","relation":{},"ISSN":["2522-5839"],"issn-type":[{"value":"2522-5839","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,8]]},"assertion":[{"value":"26 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}