{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T15:50:40Z","timestamp":1778255440470,"version":"3.51.4"},"reference-count":50,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T00:00:00Z","timestamp":1623801600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["91846107, 71571058, 71771077, and 61903115"],"award-info":[{"award-number":["91846107, 71571058, 71771077, and 61903115"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Anhui Provincial Science and Technology Major Project","award":["17030801001, and 18030801137"],"award-info":[{"award-number":["17030801001, and 18030801137"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["PA2019GDQT0021 and PA2019GDZC0100"],"award-info":[{"award-number":["PA2019GDQT0021 and PA2019GDZC0100"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2021,8,31]]},"abstract":"<jats:p>Time-series medical images are an important type of medical data that contain rich temporal and spatial information. As a state-of-the-art, computer-aided diagnosis (CAD) algorithms are usually used on these image sequences to improve analysis accuracy. However, such CAD algorithms are often required to upload medical images to honest-but-curious servers, which introduces severe privacy concerns. To preserve privacy, the existing CAD algorithms support analysis on each encrypted image but not on the whole encrypted image sequences, which leads to the loss of important temporal information among frames. To meet this challenge, a convolutional-LSTM network, named HE-CLSTM, is proposed for analyzing time-series medical images encrypted by a fully homomorphic encryption mechanism. Specifically, several convolutional blocks are constructed to extract discriminative spatial features, and LSTM-based sequence analysis layers (HE-LSTM) are leveraged to encode temporal information from the encrypted image sequences. Moreover, a weighted unit and a sequence voting layer are designed to incorporate both spatial and temporal features with different weights to improve performance while reducing the missed diagnosis rate. The experimental results on two challenging benchmarks (a Cervigram dataset and the BreaKHis public dataset) provide strong evidence that our framework can encode visual representations and sequential dynamics from encrypted medical image sequences; our method achieved AUCs above 0.94 both on the Cervigram and BreaKHis datasets, constituting a significant margin of statistical improvement compared with several competing methods.<\/jats:p>","DOI":"10.1145\/3383779","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T12:39:34Z","timestamp":1594125574000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Privacy-preserving Time-series Medical Images Analysis Using a Hybrid Deep Learning Framework"],"prefix":"10.1145","volume":"21","author":[{"given":"Zijie","family":"Yue","sequence":"first","affiliation":[{"name":"Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8384-1950","authenticated-orcid":false,"given":"Shuai","family":"Ding","sequence":"additional","affiliation":[{"name":"Hefei University of Technology, Hefei, China"}]},{"given":"Lei","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, USA"}]},{"given":"Youtao","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, USA"}]},{"given":"Zehong","family":"Cao","sequence":"additional","affiliation":[{"name":"University of Tasmania, Hobart, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5727-3697","authenticated-orcid":false,"given":"M.","family":"Tanveer","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Indore, New Delhi, India"}]},{"given":"Alireza","family":"Jolfaei","sequence":"additional","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]},{"given":"Xi","family":"Zheng","sequence":"additional","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,6,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2589160"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2018.2849959"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.034"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cell.2014.12.021"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105765"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the International Association for Cryptologic Research (IACR'17)","author":"Chabanne Herve","year":"2017","unstructured":"Herve Chabanne , Amaury de Wargny , Jonathan Milgram , Constance Morel , and Emmanuel Prouff . 2017 . Privacy-preserving classification on deep neural network . In Proceedings of the International Association for Cryptologic Research (IACR'17) , 35. Herve Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, and Emmanuel Prouff. 2017. Privacy-preserving classification on deep neural network. In Proceedings of the International Association for Cryptologic Research (IACR'17), 35."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301442"},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","first-page":"e12499","DOI":"10.1111\/exsy.12499","article-title":"A homogeneous ensemble method for predicting gastric cancer based on gastroscopy reports","volume":"37","author":"Ding Shuai","year":"2019","unstructured":"Shuai Ding , Shikang Hu , Jinxin Pan , Xiaojian Li , Gang Li , and Xiao Liu . 2019 . A homogeneous ensemble method for predicting gastric cancer based on gastroscopy reports . Expert Syst. 37 , 3 (2019), e12499 . DOI:https:\/\/doi.org\/10.1111\/exsy.12499 10.1111\/exsy.12499 Shuai Ding, Shikang Hu, Jinxin Pan, Xiaojian Li, Gang Li, and Xiao Liu. 2019. A homogeneous ensemble method for predicting gastric cancer based on gastroscopy reports. Expert Syst. 37, 3 (2019), e12499. DOI:https:\/\/doi.org\/10.1111\/exsy.12499","journal-title":"Expert Syst."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.031"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2599174"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3045390.3045413"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007190"},{"key":"e_1_2_1_14_1","volume-title":"Dermatologist-level classification of skin cancer with deep neural networks. Nature 542, 7639","author":"Esteva Andre","year":"2017","unstructured":"Andre Esteva , Brett Kuprel , Roberto A. Novoa , Justin Ko , Susan M. Swetter , Helen M. Blau , and Sebastian Thrun . 2017. Dermatologist-level classification of skin cancer with deep neural networks. Nature 542, 7639 ( 2017 ), 115\u2013118. DOI:https:\/\/doi.org\/10.1038\/nature21056 10.1038\/nature21056 Andre Esteva, Brett Kuprel, Roberto A. Novoa, Justin Ko, Susan M. Swetter, Helen M. Blau, and Sebastian Thrun. 2017. Dermatologist-level classification of skin cancer with deep neural networks. Nature 542, 7639 (2017), 115\u2013118. DOI:https:\/\/doi.org\/10.1038\/nature21056"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the International Association for Cryptologic Research (IACR'12)","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren . 2012 . Somewhat practical fully homomorphic encryption . In Proceedings of the International Association for Cryptologic Research (IACR'12) . 144. Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption. In Proceedings of the International Association for Cryptologic Research (IACR'12). 144."},{"key":"e_1_2_1_16_1","volume-title":"Medical data: Widen use in research. Nature 506, 7486","author":"Farrar Jeremy","year":"2014","unstructured":"Jeremy Farrar . 2014. Medical data: Widen use in research. Nature 506, 7486 ( 2014 ), 34. DOI:https:\/\/doi.org\/10.1038\/506034b 10.1038\/506034b Jeremy Farrar. 2014. Medical data: Widen use in research. Nature 506, 7486 (2014), 34. DOI:https:\/\/doi.org\/10.1038\/506034b"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1834954"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.06.016"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2016.17216"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.10.004"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2819820"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.59"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2017.2787657"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cell.2018.02.010"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2363654"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0676"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.12.003"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2875512"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2943127"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2016.2535865"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2018.2864150"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1474-4422(14)70238-8"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-018-0272-7"},{"key":"e_1_2_1_36_1","volume-title":"Bharadwaj Veeravalli, and Kurt Rohloff.","author":"Ahmad Al Badawi Ahmad Qaisar","year":"2019","unstructured":"Ahmad Qaisar Ahmad Al Badawi , Yuriy Polyakov , Khin Mi Mi Aung , Bharadwaj Veeravalli, and Kurt Rohloff. 2019 . Implementation and performance evaluation of RNS variants of the BFV homomorphic encryption scheme. IEEE Trans. Emerg. Topics Comput . (2019). DOI:https:\/\/doi.org\/10.1109\/tetc.2019.2902799 10.1109\/tetc.2019.2902799 Ahmad Qaisar Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, and Kurt Rohloff. 2019. Implementation and performance evaluation of RNS variants of the BFV homomorphic encryption scheme. IEEE Trans. Emerg. Topics Comput. (2019). DOI:https:\/\/doi.org\/10.1109\/tetc.2019.2902799"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2018.2854782"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2795742"},{"key":"e_1_2_1_39_1","first-page":"123","article-title":"Substitution box generation using Chaos: An image encryption application","volume":"332","author":"Silva-Garc\u00eda V. M.","year":"2018","unstructured":"V. M. Silva-Garc\u00eda , R. Flores-Carapia , C. Renter\u00eda-M\u00e1rquez , B. Luna-Benoso , and M. Aldape-P\u00e9rez . 2018 . Substitution box generation using Chaos: An image encryption application . Appl. Math. Comput. 332 (2018), 123 \u2013 135 . DOI:https:\/\/doi.org\/10.1016\/j.amc.2018.03.019 10.1016\/j.amc.2018.03.019 V. M. Silva-Garc\u00eda, R. Flores-Carapia, C. Renter\u00eda-M\u00e1rquez, B. Luna-Benoso, and M. Aldape-P\u00e9rez. 2018. Substitution box generation using Chaos: An image encryption application. Appl. Math. Comput. 332 (2018), 123\u2013135. DOI:https:\/\/doi.org\/10.1016\/j.amc.2018.03.019","journal-title":"Appl. Math. Comput."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2889934"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1464232"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.02.026"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2018.09.001"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.09.027"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.028"},{"key":"e_1_2_1_46_1","first-page":"20893","volume-title":"Proceedings of the Asian Conference on Computer Vision. Springer International Publishing, 363\u2013378","author":"Yi Zhu Aexander Hauptmann","year":"2018","unstructured":"Aexander Hauptmann Yi Zhu , Zhenzhong Lan , Shawn Newsam . 2018 . Hidden two-stream convolutional networks for action recognition . In Proceedings of the Asian Conference on Computer Vision. Springer International Publishing, 363\u2013378 . DOI:https:\/\/doi.org\/10.1007\/978-3-030- 20893 - 20896 10.1007\/978-3-030-20893-6 Aexander Hauptmann Yi Zhu, Zhenzhong Lan, Shawn Newsam. 2018. Hidden two-stream convolutional networks for action recognition. In Proceedings of the Asian Conference on Computer Vision. Springer International Publishing, 363\u2013378. DOI:https:\/\/doi.org\/10.1007\/978-3-030-20893-6"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2470255"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2888822"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.058"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783437"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383779","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3383779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:19Z","timestamp":1750199599000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383779"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,16]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,8,31]]}},"alternative-id":["10.1145\/3383779"],"URL":"https:\/\/doi.org\/10.1145\/3383779","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,16]]},"assertion":[{"value":"2019-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}