{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:27:01Z","timestamp":1772303221589,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Rabdan Academy"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BioData Mining"],"DOI":"10.1186\/s13040-024-00379-9","type":"journal-article","created":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:02:22Z","timestamp":1725926542000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Private pathological assessment via machine learning and homomorphic encryption"],"prefix":"10.1186","volume":"17","author":[{"given":"Ahmad","family":"Al\u00a0Badawi","sequence":"first","affiliation":[]},{"given":"Mohd","family":"Faizal\u00a0Bin\u00a0Yusof","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,10]]},"reference":[{"key":"379_CR1","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1007\/s00253-020-11056-2","volume":"105","author":"I Branco","year":"2021","unstructured":"Branco I, Choupina A. Bioinformatics: new tools and applications in life science and personalized medicine. Appl Microbiol Biotechnol. 2021;105:937\u201351.","journal-title":"Appl Microbiol Biotechnol."},{"key":"379_CR2","doi-asserted-by":"crossref","unstructured":"Wang X, Liotta L. Clinical bioinformatics: a new emerging science. BioMed Central; 2011.","DOI":"10.1186\/2043-9113-1-1"},{"issue":"11","key":"379_CR3","doi-asserted-by":"publisher","first-page":"1553","DOI":"10.1038\/ejhg.2016.52","volume":"24","author":"MG Hansson","year":"2016","unstructured":"Hansson MG, Lochm\u00fcller H, Riess O, Schaefer F, Orth M, Rubinstein Y, et al. The risk of re-identification versus the need to identify individuals in rare disease research. Eur J Hum Genet. 2016;24(11):1553\u20138.","journal-title":"Eur J Hum Genet."},{"key":"379_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal N, Binns R, Van\u00a0Kleek M, Laine K, Shadbolt N. Exploring design and governance challenges in the development of privacy-preserving computation. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems.\u00a0New York:\u00a0Association for Computing Machinery; 2021. p. 1\u201313.","DOI":"10.1145\/3411764.3445677"},{"key":"379_CR5","doi-asserted-by":"crossref","unstructured":"Gentry C. Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on theory of computing.\u00a0New York:\u00a0Association for Computing Machinery; 2009. p. 169\u201378.","DOI":"10.1145\/1536414.1536440"},{"issue":"11","key":"379_CR6","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Adleman L, Dertouzos ML. On data banks and privacy homomorphisms. Found Secure Comput. 1978;4(11):169\u201380.","journal-title":"Found Secure Comput."},{"key":"379_CR7","doi-asserted-by":"publisher","unstructured":"Chan FM, Al\u00a0Badawi A, Sim JJ, Tan BHM, Sheng FC, Aung KMM. Genotype Imputation with Homomorphic Encryption. In: Proceedings of the 6th International Conference on Biomedical Signal and Image Processing. ICBIP \u201921. New York, NY, USA: Association for Computing Machinery. 2021. pp. 9\u201313. https:\/\/doi.org\/10.1145\/3484424.3484426.","DOI":"10.1145\/3484424.3484426"},{"key":"379_CR8","unstructured":"Jin C, Al\u00a0Badawi A, Unnikrishnan J, Mun CF, Brown JM, Campbell JP, et\u00a0al. CareNets: Efficient homomorphic CNN for high resolution images. In: NeurIPS Workshop on Privacy in Machine Learning (PriML). 2019."},{"issue":"33","key":"379_CR9","doi-asserted-by":"publisher","first-page":"e2304415120","DOI":"10.1073\/pnas.2304415120","volume":"120","author":"R Geva","year":"2023","unstructured":"Geva R, Gusev A, Polyakov Y, Liram L, Rosolio O, Alexandru A, et al. Collaborative privacy-preserving analysis of oncological data using multiparty homomorphic encryption. Proc Natl Acad Sci. 2023;120(33):e2304415120.","journal-title":"Proc Natl Acad Sci."},{"issue":"Suppl 7","key":"379_CR10","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1186\/s12920-020-0723-0","volume":"13","author":"S Carpov","year":"2020","unstructured":"Carpov S, Gama N, Georgieva M, Troncoso-Pastoriza JR. Privacy-preserving semi-parallel logistic regression training with fully homomorphic encryption. BMC Med Genomics. 2020;13(Suppl 7):88. https:\/\/doi.org\/10.1186\/s12920-020-0723-0.","journal-title":"BMC Med Genomics"},{"key":"379_CR11","doi-asserted-by":"publisher","unstructured":"Wood A, Najarian K, Kahrobaei D. Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics. ACM Comput Surv. 2020;53(4). https:\/\/doi.org\/10.1145\/3394658.","DOI":"10.1145\/3394658"},{"key":"379_CR12","doi-asserted-by":"crossref","unstructured":"Carpov S, Nguyen TH, Sirdey R, Constantino G, Martinelli F, Practical privacy-preserving medical diagnosis using homomorphic encryption. In: 2016 IEEE 9th international conference on cloud computing (cloud). IEEE; 2016. pp. 593\u20139.","DOI":"10.1109\/CLOUD.2016.0084"},{"key":"379_CR13","doi-asserted-by":"publisher","first-page":"132084","DOI":"10.1109\/ACCESS.2021.3114581","volume":"9","author":"J Paul","year":"2021","unstructured":"Paul J, Annamalai MSMS, Ming W, Al Badawi A, Veeravalli B, Aung KMM. Privacy-preserving collective learning with homomorphic encryption. IEEE Access. 2021;9:132084\u201396.\u00a0https:\/\/doi.org\/10.1109\/ACCESS.2021.3114581","journal-title":"IEEE Access."},{"issue":"21","key":"379_CR14","doi-asserted-by":"publisher","first-page":"11608","DOI":"10.1073\/pnas.1918257117","volume":"117","author":"M Blatt","year":"2020","unstructured":"Blatt M, Gusev A, Polyakov Y, Goldwasser S. Secure large-scale genome-wide association studies using homomorphic encryption. Proc Natl Acad Sci. 2020;117(21):11608\u201313.","journal-title":"Proc Natl Acad Sci."},{"issue":"1","key":"379_CR15","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1038\/s41598-023-28481-8","volume":"13","author":"E Sarkar","year":"2023","unstructured":"Sarkar E, Chielle E, Gursoy G, Chen L, Gerstein M, Maniatakos M. Privacy-preserving cancer type prediction with homomorphic encryption. Sci Rep. 2023;13(1):1661.","journal-title":"Sci Rep."},{"key":"379_CR16","doi-asserted-by":"crossref","unstructured":"Cheon JH, Kim A, Kim M, Song Y. Homomorphic encryption for arithmetic of approximate numbers. In: Advances in Cryptology\u2013ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I 23. Springer; 2017. pp. 409\u2013437.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"379_CR17","doi-asserted-by":"publisher","unstructured":"Janosi A, Steinbrunn W, Pfisterer M, Detrano R. Heart Disease. UCI Machine Learning Repository; 1988. https:\/\/doi.org\/10.24432\/C52P4X.","DOI":"10.24432\/C52P4X"},{"key":"379_CR18","doi-asserted-by":"publisher","unstructured":"Wolberg W, Mangasarian O, Street N, Street W. Breast Cancer Wisconsin (Diagnostic). UCI Machine Learning Repository; 1995. https:\/\/doi.org\/10.24432\/C5DW2B.","DOI":"10.24432\/C5DW2B"},{"issue":"1","key":"379_CR19","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1038\/s41597-022-01721-8","volume":"10","author":"J Yang","year":"2023","unstructured":"Yang J, Shi R, Wei D, Liu Z, Zhao L, Ke B, et al. MedMNIST v2-A large-scale lightweight benchmark for 2D and 3D biomedical image classification. Sci Data. 2023;10(1):41.","journal-title":"Sci Data."},{"key":"379_CR20","unstructured":"Gilad-Bachrach R, Dowlin N, Laine K, Lauter K, Naehrig M, Wernsing J. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In: International conference on machine learning. PMLR; 2016. pp. 201\u2013210."},{"issue":"3","key":"379_CR21","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TETC.2020.3014636","volume":"9","author":"A Al Badawi","year":"2021","unstructured":"Al Badawi A, Jin C, Lin J, Mun CF, Jie SJ, Tan BHM, et al. Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs. IEEE Trans Emerg Top Comput. 2021;9(3):1330\u201343. https:\/\/doi.org\/10.1109\/TETC.2020.3014636.","journal-title":"IEEE Trans Emerg Top Comput."},{"key":"379_CR22","doi-asserted-by":"publisher","first-page":"102769","DOI":"10.1016\/j.jnca.2020.102769","volume":"171","author":"Y Fan","year":"2020","unstructured":"Fan Y, Bai J, Lei X, Zhang Y, Zhang B, Li KC, et al. Privacy preserving based logistic regression on big data. J Netw Comput Appl. 2020;171:102769.","journal-title":"J Netw Comput Appl."},{"key":"379_CR23","doi-asserted-by":"publisher","unstructured":"Chen B, Zheng X. Implementing Linear Regression with Homomorphic Encryption. Procedia Comput Sci. 2022;202:324\u2013329. https:\/\/doi.org\/10.1016\/j.procs.2022.04.044. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050922005786. International Conference on Identification, Information and Knowledge in the internet of Things, 2021.","DOI":"10.1016\/j.procs.2022.04.044"},{"issue":"2","key":"379_CR24","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.cels.2021.10.003","volume":"13","author":"G G\u00fcrsoy","year":"2022","unstructured":"G\u00fcrsoy G, Chielle E, Brannon CM, Maniatakos M, Gerstein M. Privacy-preserving genotype imputation with fully homomorphic encryption. Cell Syst. 2022;13(2):173\u201382.","journal-title":"Cell Syst."},{"key":"379_CR25","doi-asserted-by":"publisher","unstructured":"Blatt M, Gusev A, Polyakov Y, Goldwasser S. Secure large-scale genome-wide association studies using homomorphic encryption. Proc Natl Acad Sci. 2020;117(21):11608\u201313. https:\/\/doi.org\/10.1073\/pnas.1918257117. https:\/\/www.pnas.org\/doi\/abs\/10.1073\/pnas.1918257117","DOI":"10.1073\/pnas.1918257117"},{"key":"379_CR26","doi-asserted-by":"publisher","unstructured":"Johnson A, Shmatikov V. Privacy-preserving data exploration in genome-wide association studies. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD \u201913. New York, NY, USA: Association for Computing Machinery. 2013. pp. 1079\u20131087. https:\/\/doi.org\/10.1145\/2487575.2487687.","DOI":"10.1145\/2487575.2487687"},{"key":"379_CR27","doi-asserted-by":"crossref","unstructured":"Lu WJ, Yamada Y, Sakuma J. Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption. In: BMC medical informatics and decision making, vol.\u00a015. Springer; 2015. pp. 1\u20138.","DOI":"10.1186\/1472-6947-15-S5-S1"},{"key":"379_CR28","doi-asserted-by":"publisher","unstructured":"Geva R, Gusev A, Polyakov Y, Liram L, Rosolio O, Alexandru A, et al. Collaborative privacy-preserving analysis of oncological data using multiparty homomorphic encryption. Proc Natl Acad Sci. 2023;120(33):e2304415120. https:\/\/doi.org\/10.1073\/pnas.2304415120. https:\/\/www.pnas.org\/doi\/abs\/10.1073\/pnas.2304415120","DOI":"10.1073\/pnas.2304415120"},{"issue":"3","key":"379_CR29","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/JBHI.2016.2548248","volume":"21","author":"H Zhu","year":"2016","unstructured":"Zhu H, Liu X, Lu R, Li H. Efficient and privacy-preserving online medical prediagnosis framework using nonlinear SVM. IEEE J Biomed Health Inform. 2016;21(3):838\u201350.","journal-title":"IEEE J Biomed Health Inform."},{"issue":"1","key":"379_CR30","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/JSYST.2020.3027758","volume":"16","author":"M Zhang","year":"2020","unstructured":"Zhang M, Song W, Zhang J. A secure clinical diagnosis with privacy-preserving multiclass support vector machine in clouds. IEEE Syst J. 2020;16(1):67\u201378.","journal-title":"IEEE Syst J."},{"key":"379_CR31","doi-asserted-by":"publisher","unstructured":"Ilter N, Guvenir H. Dermatology. UCI Machine Learning Repository; 1998. https:\/\/doi.org\/10.24432\/C5FK5P.","DOI":"10.24432\/C5FK5P"},{"key":"379_CR32","doi-asserted-by":"publisher","first-page":"1709","DOI":"10.1109\/TIFS.2019.2946097","volume":"15","author":"JC Bajard","year":"2019","unstructured":"Bajard JC, Martins P, Sousa L, Zucca V. Improving the efficiency of SVM classification with FHE. IEEE Trans Inf Forensic Secur. 2019;15:1709\u201322.","journal-title":"IEEE Trans Inf Forensic Secur."},{"issue":"18","key":"379_CR33","doi-asserted-by":"publisher","first-page":"15555","DOI":"10.1007\/s00521-022-07202-8","volume":"34","author":"A Al Badawi","year":"2022","unstructured":"Al Badawi A, Chen L, Vig S. Fast homomorphic SVM inference on encrypted data. Neural Comput & Applic. 2022;34(18):15555\u201373.","journal-title":"Neural Comput & Applic."},{"key":"379_CR34","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V, Peikert C, Regev O. On ideal lattices and learning with errors over rings. In: Advances in Cryptology\u2013EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30\u2013June 3, 2010. Proceedings 29. Springer; 2010. pp. 1\u201323.","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"379_CR35","unstructured":"Tram\u00e8r F, Zhang F, Juels A, Reiter MK, Ristenpart T. Stealing machine learning models via prediction $$\\{$$APIs$$\\}$$. In: 25th USENIX security symposium (USENIX Security 16). 2016. p. 601\u201318."},{"key":"379_CR36","doi-asserted-by":"crossref","unstructured":"Reith RN, Schneider T, Tkachenko O. Efficiently stealing your machine learning models. In: Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society.\u00a0New York:\u00a0Association for Computing Machinery; 2019. p. 198\u2013210.","DOI":"10.1145\/3338498.3358646"},{"key":"379_CR37","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.neucom.2022.04.053","volume":"493","author":"M Hernandez","year":"2022","unstructured":"Hernandez M, Epelde G, Alberdi A, Cilla R, Rankin D. Synthetic data generation for tabular health records: A systematic review. Neurocomputing. 2022;493:28\u201345.","journal-title":"Neurocomputing."},{"key":"379_CR38","doi-asserted-by":"crossref","unstructured":"Sun C, van Soest J, Dumontier M. Generating synthetic personal health data using conditional generative adversarial networks combining with differential privacy. J Biomed Inform. 2023;143:104404.","DOI":"10.1016\/j.jbi.2023.104404"},{"issue":"6","key":"379_CR39","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1038\/s42256-021-00337-8","volume":"3","author":"G Kaissis","year":"2021","unstructured":"Kaissis G, Ziller A, Passerat-Palmbach J, Ryffel T, Usynin D, Trask A, et al. End-to-end privacy preserving deep learning on multi-institutional medical imaging. Nat Mach Intel. 2021;3(6):473\u201384.","journal-title":"Nat Mach Intel."},{"issue":"1","key":"379_CR40","doi-asserted-by":"publisher","first-page":"12598","DOI":"10.1038\/s41598-020-69250-1","volume":"10","author":"MJ Sheller","year":"2020","unstructured":"Sheller MJ, Edwards B, Reina GA, Martin J, Pati S, Kotrotsou A, et al. Federated learning in medicine: facilitating multi-institutional collaborations without sharing patient data. Sci Rep. 2020;10(1):12598.","journal-title":"Sci Rep."},{"key":"379_CR41","doi-asserted-by":"publisher","unstructured":"Li L, Fan Y, Tse M, Lin KY. A review of applications in federated learning. Comput Ind Eng. 2020;149:106854. https:\/\/doi.org\/10.1016\/j.cie.2020.106854. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0360835220305532","DOI":"10.1016\/j.cie.2020.106854"},{"key":"379_CR42","doi-asserted-by":"crossref","unstructured":"Chen H, Chillotti I, Song Y. Improved bootstrapping for approximate homomorphic encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer; 2019. pp. 34\u201354.","DOI":"10.1007\/978-3-030-17656-3_2"},{"issue":"7","key":"379_CR43","first-page":"1","volume":"13","author":"M Blatt","year":"2020","unstructured":"Blatt M, Gusev A, Polyakov Y, Rohloff K, Vaikuntanathan V. Optimized homomorphic encryption solution for secure genome-wide association studies. BMC Med Genet. 2020;13(7):1\u201313.","journal-title":"BMC Med Genet."},{"key":"379_CR44","doi-asserted-by":"publisher","first-page":"30039","DOI":"10.1109\/ACCESS.2022.3159694","volume":"10","author":"JW Lee","year":"2022","unstructured":"Lee JW, Kang H, Lee Y, Choi W, Eom J, Deryabin M, et al. Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. IEEE Access. 2022;10:30039\u201354.","journal-title":"IEEE Access."},{"key":"379_CR45","unstructured":"Takabi H, Hesamifard E, Ghasemi M. Privacy preserving multi-party machine learning with homomorphic encryption. In: 29th Annual Conference on Neural Information Processing Systems (NIPS). 2016."},{"key":"379_CR46","doi-asserted-by":"crossref","unstructured":"Al\u00a0Badawi A, Bates J, Bergamaschi F, Cousins DB, Erabelli S, Genise N, et\u00a0al. Openfhe: Open-source fully homomorphic encryption library. In: Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. 2022. p. 53\u201363.","DOI":"10.1145\/3560827.3563379"},{"key":"379_CR47","doi-asserted-by":"publisher","first-page":"104863","DOI":"10.1016\/j.dib.2019.104863","volume":"28","author":"W Al-Dhabyani","year":"2020","unstructured":"Al-Dhabyani W, Gomaa M, Khaled H, Fahmy A. Dataset of breast ultrasound images. Data Brief. 2020;28:104863.","journal-title":"Data Brief."},{"key":"379_CR48","doi-asserted-by":"publisher","unstructured":"Kermany D, Zhang K, Goldbaum M. Large dataset of labeled optical coherence tomography (OCT) and chest X-ray images. Mendeley Data. 2018;3. https:\/\/doi.org\/10.17632\/rscbjbr9sj.3.","DOI":"10.17632\/rscbjbr9sj.3"},{"key":"379_CR49","doi-asserted-by":"publisher","unstructured":"Meng Q, Catchpoole D, Skillicom D, Kennedy PJ. Relational autoencoder for feature extraction. In: 2017 International Joint Conference on Neural Networks (IJCNN). 2017. pp. 364\u2013371. https:\/\/doi.org\/10.1109\/IJCNN.2017.7965877.","DOI":"10.1109\/IJCNN.2017.7965877"},{"key":"379_CR50","doi-asserted-by":"publisher","first-page":"103063","DOI":"10.1016\/j.micpro.2020.103063","volume":"76","author":"L Che","year":"2020","unstructured":"Che L, Yang X, Wang L. Text feature extraction based on stacked variational autoencoder. Microprocess Microsyst. 2020;76:103063.","journal-title":"Microprocess Microsyst."},{"key":"379_CR51","unstructured":"Patraucean V, Handa A, Cipolla R. Spatio-temporal video autoencoder with differentiable memory. 2015. arXiv preprint arXiv:1511.06309."},{"key":"379_CR52","unstructured":"Fan RE. LIBSVM Data: Classification, Regression, and Multilabel. 2005. https:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvmtools\/datasets\/. Accessed 10 Mar 2024."},{"key":"379_CR53","doi-asserted-by":"publisher","unstructured":"Sari AK, Widya\u00a0Prasetya FM. Linear SVM for Classifying Breast Cancer Data Encrypted Using Homomorphic Cryptosystem. In: 2019 5th International Conference on Science and Technology (ICST), vol.\u00a01. 2019. pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICST47872.2019.9166454.","DOI":"10.1109\/ICST47872.2019.9166454"},{"issue":"6","key":"379_CR54","doi-asserted-by":"publisher","first-page":"5938","DOI":"10.1007\/s10489-021-02727-2","volume":"52","author":"H Huang","year":"2022","unstructured":"Huang H, Wang Y, Zong H. Support vector machine classification over encrypted data. Appl Intell. 2022;52(6):5938\u201348.","journal-title":"Appl Intell."},{"key":"379_CR55","doi-asserted-by":"crossref","unstructured":"Ilter N, Guvenir HA. Dermatology data set. 1998. http:\/\/archive.ics.uci.edu\/ml\/datasets\/Dermatology. Accessed 11 Mar 2024.","DOI":"10.1016\/S0926-9959(98)95538-6"},{"key":"379_CR56","doi-asserted-by":"crossref","unstructured":"Chen H, \u00dcnal AB, Akg\u00fcn M, Pfeifer N. Privacy-preserving SVM on outsourced genomic data via secure multi-party computation. In: Proceedings of the Sixth International Workshop on Security and Privacy Analytics.\u00a0New York:\u00a0Association for Computing Machinery; 2020. p. 61\u20139.","DOI":"10.1145\/3375708.3380316"},{"key":"379_CR57","first-page":"101835","volume":"97","author":"NH Tran","year":"2020","unstructured":"Tran NH, Le-Khac NA, Kechadi MT. Lightweight privacy-Preserving data classification Comput Secur. 2020;97:101835.","journal-title":"Lightweight privacy-Preserving data classification. Comput Secur."},{"issue":"4","key":"379_CR58","doi-asserted-by":"publisher","first-page":"704","DOI":"10.3390\/info6040704","volume":"6","author":"C Yang","year":"2015","unstructured":"Yang C, Sun Y, Wu Q. Batch attribute-based encryption for secure clouds. Information. 2015;6(4):704\u201318.","journal-title":"Information."},{"key":"379_CR59","doi-asserted-by":"crossref","unstructured":"Soni D, Neda N, Zhang N, Reynwar B, Gamil H, Heyman B, et al. RPU: The Ring Processing Unit. In: 2023 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE; 2023. pp. 272\u201382.","DOI":"10.1109\/ISPASS57527.2023.00034"},{"key":"379_CR60","unstructured":"Zhang N, Gamil H, Brinich P, Reynwar B, Al\u00a0Badawi A, Neda N, et\u00a0al. Towards full-stack acceleration for fully homomorphic encryption. IEEE HPEC; 2022."},{"key":"379_CR61","doi-asserted-by":"publisher","first-page":"226544","DOI":"10.1109\/ACCESS.2020.3045465","volume":"8","author":"A Al Badawi","year":"2020","unstructured":"Al Badawi A, Hoang L, Mun CF, Laine K, Aung KMM. Privft: Private and fast text classification with homomorphic encryption. IEEE Access. 2020;8:226544\u201356.","journal-title":"IEEE Access."},{"key":"379_CR62","unstructured":"Cousins DB, Polyakov Y, Badawi AA, French M, Schmidt A, Jacob A, et\u00a0al. TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation. 2023. arXiv preprint arXiv:2304.05237."},{"key":"379_CR63","doi-asserted-by":"crossref","unstructured":"Al Badawi A, Veeravalli B, Mun CF. Aung KMM. High-performance FV somewhat homomorphic encryption on GPUs: an implementation using CUDA. IACR Trans Cryptographic Hardw Embed Syst. 2018:70\u201395.","DOI":"10.46586\/tches.v2018.i2.70-95"},{"key":"379_CR64","doi-asserted-by":"crossref","unstructured":"Samardzic N, Feldmann A, Krastev A, Manohar N, Genise N, Devadas S, et\u00a0al. Craterlake: a hardware accelerator for efficient unbounded computation on encrypted data. In: Proceedings of the 49th Annual International Symposium on Computer Architecture. 2022. pp. 173\u2013187.","DOI":"10.1145\/3470496.3527393"},{"key":"379_CR65","doi-asserted-by":"crossref","unstructured":"Feldmann A, Samardzic N, Krastev A, Devadas S, Dreslinski R, Eldefrawy K, et\u00a0al. F1: A fast and programmable accelerator for fully homomorphic encryption (extended version). 2021. arXiv preprint arXiv:2109.05371.","DOI":"10.1145\/3466752.3480070"},{"key":"379_CR66","doi-asserted-by":"crossref","unstructured":"Agrawal R, de Castro L, Yang G, Juvekar C, Yazicigil R, Chandrakasan A, et al. FAB: An FPGA-based accelerator for bootstrappable fully homomorphic encryption. In: 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA). IEEE; 2023. pp. 882\u201395.","DOI":"10.1109\/HPCA56546.2023.10070953"},{"key":"379_CR67","doi-asserted-by":"crossref","unstructured":"Riazi MS, Laine K, Pelton B, Dai W. HEAX: An architecture for computing on encrypted data. In: Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems. 2020. pp. 1295\u20131309.","DOI":"10.1145\/3373376.3378523"}],"container-title":["BioData Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13040-024-00379-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13040-024-00379-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13040-024-00379-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:03:31Z","timestamp":1725984211000},"score":1,"resource":{"primary":{"URL":"https:\/\/biodatamining.biomedcentral.com\/articles\/10.1186\/s13040-024-00379-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,10]]},"references-count":67,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["379"],"URL":"https:\/\/doi.org\/10.1186\/s13040-024-00379-9","relation":{},"ISSN":["1756-0381"],"issn-type":[{"value":"1756-0381","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,10]]},"assertion":[{"value":"23 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This research project utilized publicly available datasets in the fields of cardiovascular, tumor research, and medical imaging. No private data was collected or used in any aspect of this study. All data sources and their access procedures are clearly referenced within the paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"33"}}