{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T05:43:56Z","timestamp":1775713436705,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:00:00Z","timestamp":1773878400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:00:00Z","timestamp":1773878400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,3,19]]},"DOI":"10.1109\/isdfs69419.2026.11458956","type":"proceedings-article","created":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T20:01:51Z","timestamp":1775678511000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["ppAIsec: Privacy-Preserving AI Models in Healthcare Security - AI Frameworks Synthesis"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6168-1632","authenticated-orcid":false,"given":"Tanzina","family":"Sultana","sequence":"first","affiliation":[{"name":"University of the Cumberlands,Dept. of Information Technology,Williamsburg,KY,USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8880-2216","authenticated-orcid":false,"given":"Asura Akter","family":"Sunna","sequence":"additional","affiliation":[{"name":"School of Business and Technology, Emporia State University,Emporia,KS,USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1029-2181","authenticated-orcid":false,"given":"Mohammed Majbah","family":"Uddin","sequence":"additional","affiliation":[{"name":"Clinical &#x0026; Translational Science Inst., University of Florida,Gainesville,FL,USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3282-7331","authenticated-orcid":false,"given":"Naresh","family":"Kshetri","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology,Department of Cybersecurity,Rochester,NY,USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"AI in Healthcare, Studies in health technology and informatics.","author":"Koski","year":"2021"},{"issue":"3","key":"ref2","article-title":"Ensuring Security and Privacy in Healthcare Systems: A Review Exploring Challenges, Solutions, Future Trends, and the Practical Applications of Artificial Intelligence","volume":"58","author":"Bala","year":"2024","journal-title":"Jordan Medical Journal"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3210597"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMIA60377.2023.10426362"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICICI65870.2025.11069618"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS60797.2024.10527226"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3596189"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/WACV48630.2021.00121","volume-title":"Adaptive privacy preserving deep learning algorithms for medical data","author":"Zhang","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2022.06.022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109370"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2024.100974"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2196\/41588"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/jbhi.2022.3181823"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3389\/fmed.2024.1409314"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/jbhi.2024.3350232"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-95858-2"}],"event":{"name":"2026 14th International Symposium on Digital Forensics and Security (ISDFS)","location":"Boston, MA, USA","start":{"date-parts":[[2026,3,19]]},"end":{"date-parts":[[2026,3,20]]}},"container-title":["2026 14th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11458844\/11458909\/11458956.pdf?arnumber=11458956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T04:44:49Z","timestamp":1775709889000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11458956\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,19]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isdfs69419.2026.11458956","relation":{},"subject":[],"published":{"date-parts":[[2026,3,19]]}}}