{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T21:06:21Z","timestamp":1774299981047,"version":"3.50.1"},"reference-count":222,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"German Federal Ministry of Research, Technology, and Space (BMFTR) through the PrivateAIM Project","award":["01ZZ2316B"],"award-info":[{"award-number":["01ZZ2316B"]}]},{"name":"German Federal Ministry of Research, Technology, and Space (BMFTR) through the PrivateAIM Project","award":["01ZZ2316C"],"award-info":[{"award-number":["01ZZ2316C"]}]},{"name":"German Federal Ministry of Research, Technology, and Space (BMFTR) through the PrivateAIM Project","award":["01ZZ2316E"],"award-info":[{"award-number":["01ZZ2316E"]}]},{"name":"German Federal Ministry of Research, Technology, and Space (BMFTR) through the PrivateAIM Project","award":["01ZZ2316G"],"award-info":[{"award-number":["01ZZ2316G"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3672991","type":"journal-article","created":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:38:29Z","timestamp":1773347909000},"page":"41508-41528","source":"Crossref","is-referenced-by-count":0,"title":["An Exploratory Survey Study Toward a Conceptual Framework for Structuring the Integration of Privacy-Enhancing Technologies in Federated Learning and Analytics"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6149-1503","authenticated-orcid":false,"given":"Hammam Abu","family":"Attieh","sequence":"first","affiliation":[{"name":"Berlin Institute of Health at Charit&#x00E9;, Medical Informatics Group, Universit&#x00E4;tsmedizin Berlin, Berlin, Germany"}]},{"given":"Mehmed","family":"Halilovic","sequence":"additional","affiliation":[{"name":"Berlin Institute of Health at Charit&#x00E9;, Medical Informatics Group, Universit&#x00E4;tsmedizin Berlin, Berlin, Germany"}]},{"given":"Raouf","family":"Kerkouche","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr&#x00FC;cken, Germany"}]},{"given":"Shadi","family":"Rahimian","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr&#x00FC;cken, Germany"}]},{"given":"Hui-Po","family":"Wang","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr&#x00FC;cken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3996-0194","authenticated-orcid":false,"given":"Raphael","family":"Rehms","sequence":"additional","affiliation":[{"name":"Institute for Medical Information Processing, Biometry and Epidemiology, LMU Munich, Munich, Germany"}]},{"given":"Georgios","family":"Kaissis","sequence":"additional","affiliation":[{"name":"Chair for AI in Healthcare and Medicine, Technical University of Munich (TUM) and TUM University Hospital, Munich, Germany"}]},{"given":"Alexander","family":"Ziller","sequence":"additional","affiliation":[{"name":"Chair for AI in Healthcare and Medicine, Technical University of Munich (TUM) and TUM University Hospital, Munich, Germany"}]},{"given":"Jonas","family":"Kuntzer","sequence":"additional","affiliation":[{"name":"Chair for AI in Healthcare and Medicine, Technical University of Munich (TUM) and TUM University Hospital, Munich, Germany"}]},{"given":"Karen","family":"Otte","sequence":"additional","affiliation":[{"name":"Berlin Institute of Health at Charit&#x00E9;, Medical Informatics Group, Universit&#x00E4;tsmedizin Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8168-7067","authenticated-orcid":false,"given":"Thierry","family":"Meurers","sequence":"additional","affiliation":[{"name":"Berlin Institute of Health at Charit&#x00E9;, Medical Informatics Group, Universit&#x00E4;tsmedizin Berlin, Berlin, Germany"}]},{"given":"Mario","family":"Fritz","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr&#x00FC;cken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5683-5889","authenticated-orcid":false,"given":"Daniel","family":"R\u00fceckert","sequence":"additional","affiliation":[{"name":"Chair for AI in Healthcare and Medicine, Technical University of Munich (TUM) and TUM University Hospital, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3172-3095","authenticated-orcid":false,"given":"Fabian","family":"Prasser","sequence":"additional","affiliation":[{"name":"Berlin Institute of Health at Charit&#x00E9;, Medical Informatics Group, Universit&#x00E4;tsmedizin Berlin, Berlin, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-018-0300-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0186-1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s41666-020-00082-4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0110-7"},{"key":"ref5","volume-title":"General Data Protection Regulation (GDPR)\u2013Official Legal Text","year":"2024"},{"key":"ref6","volume-title":"HIPAA Administrative Simplification","year":"2013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e38137"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1093\/ije\/dyu188"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-12833-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2196\/41588"},{"key":"ref11","volume-title":"PrivateAIM","year":"2025"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2023.3302016"},{"key":"ref14","volume-title":"Five Safes: Designing data access for research","author":"Desai","year":"1601"},{"key":"ref15","volume-title":"The Medical Informatics Initiative\u2019s Core Data Set | Medical Informatics Initiative","year":"2025"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1142\/s0218488502001648"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2008.33"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247554"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/69.979982"},{"key":"ref21","volume-title":"Article 29 Data Protection Working Party\u2013Opinion 05\/2014 on Anonymisation Techniques","year":"2014"},{"key":"ref22","volume-title":"External Guidance on the Implementation of the European Medicines Agency Policy on the Publication of Clinical Data for Medicinal Products for Human Use","year":"2017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23937\/2572-3235.1510065"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1302811"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1201\/9780203753736"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4103\/0974-7788.76794"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1111\/1740-9713.01633"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1186\/s12874-022-01773-9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9307475"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177730491"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03243-2_649-1"},{"issue":"86","key":"ref33","first-page":"2579","article-title":"Visualizing Data using t-SNE","volume":"9","author":"van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref34","article-title":"UMAP: Uniform manifold approximation and projection for dimension reduction","author":"McInnes","year":"2018","journal-title":"arXiv:1802.03426"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1038\/s41374-020-00525-x"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s23094178"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/bf02985802"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2022.846930"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-020-00540-3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s13735-021-00218-1"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-22188-y"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1038\/s43586-021-00056-9"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1038\/s41576-019-0127-1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksus.2022.101847"},{"key":"ref45","volume-title":"An R Companion To Applied Regression","author":"Fox","year":"2018"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.25080\/majora-92bf1922-011"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00731"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1186\/gb-2003-4-4-210"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-025-02958-0"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-015-0222-y"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-020-00773-y"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_12"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocx079"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-014-0123-5"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3414\/me14-01-0133"},{"key":"ref56","volume-title":"ARX\u2013Data Anonymization Tool | A Comprehensive Software for Privacy-Preserving Microdata Publishing","year":"2024"},{"key":"ref57","volume-title":"Amnesia Anonymization Tool\u2013Data Anonymization Made Easy","year":"2024"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v067.i04"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbac440"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/icde.2007.367856"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0004"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/dsaa.2016.49"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocaa262"},{"key":"ref65","article-title":"Synthetic data - anonymisation groundhog day","author":"Stadler","year":"2020","journal-title":"arXiv:2011.07018"},{"key":"ref66","article-title":"Extracting training data from diffusion models","author":"Carlini","year":"2023","journal-title":"arXiv:2301.13188"},{"key":"ref67","article-title":"Investigating data memorization in 3D latent diffusion models for medical image synthesis","author":"Ul Hassan Dar","year":"2023","journal-title":"arXiv:2307.01148"},{"key":"ref68","article-title":"High performance on-demand de-identification of a petabyte-scale medical imaging data lake","author":"Mesterhazy","year":"2020","journal-title":"arXiv:2008.01827"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-19045-3"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-023-37991-y"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1117\/1.JMI.10.6.064001"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3381088"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3074968"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/940638"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375849"},{"key":"ref76","article-title":"Synthetic data in healthcare","author":"McDuff","year":"2023","journal-title":"arXiv:2304.03243"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0267976"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1038\/s41551-021-00751-8"},{"key":"ref79","first-page":"155","article-title":"DermGAN: Synthetic generation of clinical skin images with pathology","volume-title":"Proc. Mach. Learn. Health NeurIPS Workshop","author":"Ghorbani"},{"key":"ref80","article-title":"Differentially private diffusion models generate useful synthetic images","author":"Ghalebikesabi","year":"2023","journal-title":"arXiv:2302.13861"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516707"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1038\/s41576-021-00428-7"},{"key":"ref84","first-page":"1243","article-title":"Privacy considerations for sharing genomics data","volume":"20","author":"Oestreich","year":"2021","journal-title":"EXCLI J."},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-26152-8"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2016.12.002"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btq643"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-019-2611-1"},{"key":"ref89","volume-title":"Using AI to create safe synthetic datasets for genomics","author":"Steier","year":"2021"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btad535"},{"key":"ref91","volume-title":"Genome-AC-GAN: Enhancing synthetic genotype generation through auxiliary classification","author":"Ahronoviz","year":"2024"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0062"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-42516-z"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1088\/1741-2552\/ab260c"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.3390\/s22155714"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.107655"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/tbme.2003.808805"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2010.09.007"},{"key":"ref99","article-title":"Beyond accuracy: Automated de-identification of large real-world clinical text datasets","author":"Kocaman","year":"2023","journal-title":"arXiv:2312.08495"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-001034"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocab112"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/w19-1905"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1186\/s13326-018-0179-8"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1214\/21-aos2058"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484756"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24293"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0031"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462533"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2017.41"},{"key":"ref110","article-title":"ML-leaks: Model and data independent membership inference attacks and defenses on machine learning models","author":"Salem","year":"2018","journal-title":"arXiv:1806.01246"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_65838"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1162\/99608f92.d3197524"},{"key":"ref114","first-page":"1","article-title":"SoK: Differential privacies","volume-title":"Proc. Privacy Enhancing Technol.","author":"Desfontaines"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.722"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3603216.3624964"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/csf.2017.11"},{"key":"ref119","article-title":"Privacy amplification by subsampling: Tight analyses via couplings and divergences","volume-title":"Advances in Neural Information Processing Systems","author":"Balle","year":"2018"},{"key":"ref120","first-page":"1","article-title":"Evaluating Laplace noise addition to satisfy differential privacy for numeric data","volume":"4","author":"Sarathy","year":"2011","journal-title":"Trans. Data Privacy"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/icdm.2017.48"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/focs.2007.66"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_26"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/globalsip.2013.6736861"},{"key":"ref126","article-title":"Scalable private learning with PATE","author":"Papernot","year":"2018","journal-title":"arXiv:1802.08908"},{"key":"ref127","article-title":"Correlated noise mechanisms for differentially private learning","author":"Pillutla","year":"2025","journal-title":"arXiv:2506.08201"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/3394658"},{"key":"ref129","article-title":"Enabling privacy-preserving model evaluation in federated learning via fully homomorphic encryption","author":"Baykara","year":"2024","journal-title":"arXiv:2403.14428"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref131","article-title":"A fully homomorphic encryption scheme","author":"Gentry","year":"2009"},{"key":"ref132","volume-title":"Fully Homomorphic Encryption Without Bootstrapping","author":"Brakerski","year":"2011"},{"key":"ref133","volume-title":"Somewhat Practical Fully Homomorphic Encryption","author":"Fan","year":"2012"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref135","volume-title":"TFHE: Fast Fully Homomorphic Encryption Over the Torus","author":"Chillotti","year":"2018"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05233-z"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/sfcs.1986.25"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511546891"},{"key":"ref141","volume-title":"Google\/Differential-Privacy","year":"2024"},{"key":"ref142","volume-title":"IBM\/Differential-Privacy-Library","year":"2024"},{"key":"ref143","volume-title":"OpenDP","year":"2024"},{"key":"ref144","volume-title":"SmartNoise","year":"2024"},{"key":"ref145","volume-title":"Python","year":"2024"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70604-3_5"},{"key":"ref147","volume-title":"Tensorflow\/Privacy","year":"2024"},{"key":"ref148","volume-title":"Jupyter Notebook","year":"2024"},{"key":"ref149","article-title":"Optimal private median estimation under minimal distributional assumptions","author":"Tzamos","year":"2020","journal-title":"arXiv:2011.06202"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1093\/jssam\/smac021"},{"key":"ref151","article-title":"Differentially private quantiles","author":"Gillenwater","year":"2021","journal-title":"arXiv:2102.08244"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350253"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.3390\/app131910755"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/3689943.3695039"},{"key":"ref155","first-page":"2111","article-title":"Differentially private chi-squared hypothesis testing: Goodness of fit and independence testing","volume-title":"Proc. 33rd Int. Conf. Mach. Learn.","author":"Gaboardi"},{"key":"ref156","article-title":"Differential privacy and robust statistics in high dimensions","author":"Liu","year":"2021","journal-title":"arXiv:2111.06578"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2024.109242"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.12.019"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0206832"},{"key":"ref160","article-title":"Differentially private federated deep learning for multi-site medical image segmentation","author":"Ziller","year":"2021","journal-title":"arXiv:2107.02586"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-93030-0"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0083"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-05539-7"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v5i1.629"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487687"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btz837"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.3389\/fonc.2022.879607"},{"key":"ref168","article-title":"GS-WGAN: A gradient-sanitized approach for learning differentially private generators","author":"Chen","year":"2020","journal-title":"arXiv:2006.08265"},{"key":"ref169","volume-title":"OpenFHE.org\u2013OpenFHE\u2013Open-Source Fully Homomorphic Encryption Library","year":"2024"},{"key":"ref170","volume-title":"PALISADE Homomorphic Encryption Software Library\u2014An Open-Source Lattice Crypto Software Library","year":"2024"},{"key":"ref171","volume-title":"HEaaN","year":"2024"},{"key":"ref172","volume-title":"C++. Microsoft","year":"2024"},{"key":"ref173","volume-title":"Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data","author":"Lu","year":"2016"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_13"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/jbhi.2021.3071270"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-s5-s5"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020229"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3159694"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-28481-8"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3114581"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-s5-s1"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-020-0719-9"},{"key":"ref183","article-title":"Application of homomorphic encryption in medical imaging","author":"Dutil","year":"2021","journal-title":"arXiv:2110.07768"},{"key":"ref184","volume-title":"Lschoe\/MPYC","author":"Schoenmakers","year":"2024"},{"key":"ref185","article-title":"Obliv-C: A Language for Extensible Data-Oblivious Computation. (2015)","author":"Zahur","year":"2024","journal-title":"Obliv-C: A Language for Extensible Data-Oblivious Computation"},{"key":"ref186","volume-title":"Samee\/Obliv-C","author":"Zahur","year":"2024"},{"key":"ref187","volume-title":"EMP-Toolkit","year":"2024"},{"key":"ref188","volume-title":"Security Lab\/\/Alexandra Institute","year":"2024"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-022-05044-8"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2011-000735"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-016-0316-1"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-020-00869-9"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.2196\/22158"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.3233\/shti200112"},{"key":"ref195","first-page":"5395","article-title":"TVA: A multi-party computation system for secure and expressive time series analytics","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Security)","author":"Faisal"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/bigdatasecurity.2017.24"},{"key":"ref197","article-title":"PPCA: Privacy-preserving principal component analysis using secure multiparty computation (MPC)","author":"Fan","year":"2021","journal-title":"arXiv:2105.07612"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-019-1473-4"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.03.006"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00337-8"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-s5-s2"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196541"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1186\/s13059-021-02553-2"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2011.03.050"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_22"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/sp46214.2022.9833677"},{"key":"ref207","first-page":"16937","article-title":"Inverting gradients\u2013how easy is it to break privacy in federated learning?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Geiping"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr46437.2021.00919"},{"issue":"1","key":"ref209","first-page":"3","article-title":"Thirty years of optimization-based SDC methods for tabular data","volume":"16","author":"P\u00e9rez","year":"2023","journal-title":"Trans. Data Privacy"},{"key":"ref210","volume-title":"The SACRO Guide To Statistical Output Checking","author":"Ritchie","year":"2023"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0014"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.32614\/cran.package.sdctable"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0055"},{"key":"ref214","article-title":"ML privacy meter: Aiding regulatory compliance by quantifying the privacy risks of machine learning","author":"Murakonda","year":"2020","journal-title":"arXiv:2007.09339"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07315-1_5"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2024.110560"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126897"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-021-01602-x"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-020-00323-1"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-69250-1"},{"key":"ref221","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Advances in Neural Information Processing Systems","author":"Blanchard","year":"2017"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2020.3041404"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11433415.pdf?arnumber=11433415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T20:09:20Z","timestamp":1774296560000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11433415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":222,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3672991","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}