{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:37:08Z","timestamp":1772908628701,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T00:00:00Z","timestamp":1745971200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T00:00:00Z","timestamp":1745971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Fundamental Research Grant Scheme (FRGS) of the Ministry of Higher Education","award":["FRGS\/1\/2021\/ICT07\/UKM\/02\/1"],"award-info":[{"award-number":["FRGS\/1\/2021\/ICT07\/UKM\/02\/1"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Brain Inf."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1186\/s40708-025-00256-z","type":"journal-article","created":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T11:08:54Z","timestamp":1746184134000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["HoRNS-CNN model: an energy-efficient fully homomorphic residue number system convolutional neural network model for privacy-preserving classification of dyslexia neural-biomarkers"],"prefix":"10.1186","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0788-5927","authenticated-orcid":false,"given":"Opeyemi Lateef","family":"Usman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8999-9548","authenticated-orcid":false,"given":"Ravie Chandren","family":"Muniyandi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1794-019X","authenticated-orcid":false,"given":"Khairuddin","family":"Omar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0318-3282","authenticated-orcid":false,"given":"Mazlyfarina","family":"Mohamad","sequence":"additional","affiliation":[]},{"given":"Ayoade Akeem","family":"Owoade","sequence":"additional","affiliation":[]},{"given":"Morufat Adebola","family":"Kareem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,30]]},"reference":[{"key":"256_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3149771","author":"S Alex","year":"2022","unstructured":"Alex S, Dhanaraj KJ, Deepthi PP (2022) Private decision tree-based disease detection with energy-efficiency at resource-constrained medical user in mobile healthcare network. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2022.3149771","journal-title":"IEEE Access"},{"key":"256_CR2","doi-asserted-by":"publisher","first-page":"167425","DOI":"10.1109\/ACCESS.2020.3023084","volume":"8","author":"HC Tanuwidjaja","year":"2020","unstructured":"Tanuwidjaja HC, Choi R, Baek S, Kim K (2020) Privacy-preserving deep learning on machine learning as a service-a comprehensive survey. IEEE Access 8:167425\u2013167447","journal-title":"IEEE Access"},{"key":"256_CR3","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.neucom.2019.11.041","volume":"384","author":"A Boulemtafes","year":"2020","unstructured":"Boulemtafes A, Derhab A, Challal Y (2020) A review of privacy-preserving techniques for deep learning. Neurocomputing 384:21\u201345","journal-title":"Neurocomputing"},{"key":"256_CR4","first-page":"1","volume":"12","author":"OL Usman","year":"2020","unstructured":"Usman OL, Muniyandi RC (2020) CryptoDL: predicting dyslexia biomarkers from encrypted neuroimaging dataset using energy-efficient residue number system and deep convolutional neural network. Symmetry (Basel) 12:1\u201324","journal-title":"Symmetry (Basel)"},{"key":"256_CR5","first-page":"1183","volume":"69","author":"M Tayyab","year":"2021","unstructured":"Tayyab M et al (2021) Cryptographic based secure model on dataset for deep learning algorithms. Comput Mater Contin 69:1183\u20131200","journal-title":"Comput Mater Contin"},{"key":"256_CR6","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1007\/s10278-020-00393-3","volume":"33","author":"M Eichelberg","year":"2020","unstructured":"Eichelberg M, Kleber K, K\u00e4mmerer M (2020) Cybersecurity in PACS and medical imaging: an overview. J Digit Imaging 33:1527\u20131542","journal-title":"J Digit Imaging"},{"key":"256_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2022.103540","volume":"209","author":"MK Hasan","year":"2023","unstructured":"Hasan MK et al (2023) Review on cyber-physical and cyber-security system in smart grid: standards, protocols, constraints, and recommendations. J Netw Comput Appl 209:1\u201323","journal-title":"J Netw Comput Appl"},{"key":"256_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-023-02297-9","volume":"4","author":"LO Usman","year":"2023","unstructured":"Usman LO, Chandren R, Morufat M, Usman A (2023) Efficient neuroimaging data security and encryption using pixel - based homomorphic residue number system. SN Comput Sci 4:1\u201310","journal-title":"SN Comput Sci"},{"key":"256_CR9","doi-asserted-by":"publisher","first-page":"29344","DOI":"10.1109\/ACCESS.2019.2901219","volume":"7","author":"OA Kwabena","year":"2019","unstructured":"Kwabena OA, Qin Z, Zhuang T, Qin Z (2019) MSCryptoNet: multi-scheme privacy-preserving deep learning in cloud computing. IEEE Access 7:29344\u201329354","journal-title":"IEEE Access"},{"key":"256_CR10","doi-asserted-by":"publisher","unstructured":"Usman OL, Muniyandi RC, Omar K, Mohamad M. Privacy-preserving classification method for neural-biomarkers using homomorphic residue number system CNN: HoRNS-CNN. In: 2022 International Conference on Business Analytics for Technology and Security, ICBATS 2022 (IEEE, 2022). https:\/\/doi.org\/10.1109\/ICBATS54253.2022.9759007.","DOI":"10.1109\/ICBATS54253.2022.9759007"},{"key":"256_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/1742-6596\/1003\/1\/012036","volume":"1003","author":"MT Gatta","year":"2018","unstructured":"Gatta MT, Al-Latief STA (2018) Medical image security using modified chaos-based cryptography approach. J Phys Conf Ser 1003:1\u20136","journal-title":"J Phys Conf Ser"},{"key":"256_CR12","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1049\/iet-ifs.2014.0245","volume":"9","author":"A Al-Haj","year":"2015","unstructured":"Al-Haj A, Abandah G, Hussein N (2015) Crypto-based algorithms for secured medical image transmission. IET Inf Secur 9:365\u2013373","journal-title":"IET Inf Secur"},{"key":"256_CR13","first-page":"342","volume":"1","author":"N Dowlin","year":"2016","unstructured":"Dowlin N et al (2016) Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. ICML 1:342\u2013351","journal-title":"ICML"},{"key":"256_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TETC.2021.3081222","volume":"9","author":"A Al Badawi","year":"2021","unstructured":"Al Badawi A et al (2021) The AlexNet moment for homomorphic encryption: HCNN, the first homomorphic CNN on encrypted data with GPUs. IEEE Trans Emerg Top Comput 9:1\u201313","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"256_CR15","unstructured":"Chao J, et al. CaRENets: compact and resource-efficient CNN for homomorphic inference on encrypted medical images. arXiv:1901.10074v1 1\u201311, 2019."},{"key":"256_CR16","doi-asserted-by":"publisher","unstructured":"Muhammed KJ, Isiaka RM, Asaju-Gbolagade AW, Adewole KS, Gbolagade KA. Improved cloud-based N-primes model for symmetric-based fully homomorphic encryption using residue number system. In: Machine Learning and Data Mining for Emerging Trend in Cyber Dynamics (eds. Chiroma, H., Abdulhamid, S M Fournier-Viger, P. & Garcia, N. M.) 197\u2013216 (Springer, Cham., 2021). https:\/\/doi.org\/10.1007\/978-3-030-66288-2_8.","DOI":"10.1007\/978-3-030-66288-2_8"},{"key":"256_CR17","unstructured":"Gentry C. A fully homomorphic encryption scheme. Standford University (Standford University, 2009)."},{"key":"256_CR18","unstructured":"Chabanne H, Wargny A de, Milgram J, Morel C, Prouff E. Privacy-preserving classification on deep neural network. In: IACR Cryptology ePrint Archive 35\u201348, 2017."},{"key":"256_CR19","unstructured":"Hesamifard E, Takabi H, Ghasemi M. CryptoDL: deep neural networks over encrypted data. arXiv:1711.05189v1 1\u201321, 2017."},{"key":"256_CR20","doi-asserted-by":"crossref","unstructured":"Vizitiu A, Ni\u01ce CI, Puiu A, Suciu C, Itu LM. Applying deep neural networks over homomorphic encrypted medical data. Comput Math Methods Med. 2020, 2020.","DOI":"10.1155\/2020\/3910250"},{"key":"256_CR21","unstructured":"Chou, E. et al. Faster CryptoNets-leveraging sparsity for real-world encryption inference. arXiv:1811.09953v1, 2018."},{"key":"256_CR22","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1109\/TIFS.2018.2881677","volume":"14","author":"T Chuman","year":"2019","unstructured":"Chuman T, Sirichotedumrong W, Kiya H (2019) Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Trans Inf Forensics Secur 14:1515\u20131525","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"256_CR23","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1109\/TCSVT.2019.2894520","volume":"30","author":"V Itier","year":"2020","unstructured":"Itier V, Puteaux P, Puech W (2020) Recompression of jpeg crypto-compressed images without a key. IEEE Trans Circuits Syst Video Technol 30:646\u2013660","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"256_CR24","doi-asserted-by":"publisher","unstructured":"Maekawa T, Kawamura A, Kinoshita Y, Kiya H. Privacy-preserving SVM computing in the encrypted domain. In: 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2018 - Proceedings 897\u2013902, 2018. https:\/\/doi.org\/10.23919\/APSIPA.2018.8659529.","DOI":"10.23919\/APSIPA.2018.8659529"},{"key":"256_CR25","doi-asserted-by":"crossref","unstructured":"Tanaka M. Learnable image encryption. In: IEEE Conference on Consumer Electronics-Taiwan (ICCE-TW) 1\u20132 (2018).","DOI":"10.1109\/ICCE-China.2018.8448772"},{"key":"256_CR26","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.ins.2020.03.041","volume":"526","author":"J Li","year":"2020","unstructured":"Li J, Kuang X, Lin S, Ma X, Tang Y (2020) Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Inf Sci (Ny) 526:166\u2013179","journal-title":"Inf Sci (Ny)"},{"key":"256_CR27","doi-asserted-by":"publisher","first-page":"119848","DOI":"10.1109\/ACCESS.2020.3005911","volume":"8","author":"DH Ko","year":"2020","unstructured":"Ko DH, Choi SH, Shin JM, Liu P, Choi YH (2020) Structural image de-identification for privacy-preserving deep learning. IEEE Access 8:119848\u2013119862","journal-title":"IEEE Access"},{"key":"256_CR28","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1587\/transinf.2016MUL0002","volume":"E100D","author":"K Kurihara","year":"2017","unstructured":"Kurihara K, Imaizumi S, Shiota S, Kiya H (2017) An Encryption-then-compression system for lossless image compression standards. IEICE Trans Inf Syst E100D:52\u201356","journal-title":"IEICE Trans Inf Syst"},{"key":"256_CR29","doi-asserted-by":"publisher","unstructured":"Martins P, Sousa L. A stochastic number representation for fully homomorphic cryptography. in: 2017 ieee international workshop on signal processing systems (SiPS) 1\u20136 (IEEE, 2017). https:\/\/doi.org\/10.1109\/SiPS.2017.8109973.","DOI":"10.1109\/SiPS.2017.8109973"},{"key":"256_CR30","doi-asserted-by":"crossref","unstructured":"Sirichotedumrong W, Maekawa T, Kinoshita Y, Kiya H. Privacy-preserving deep neural networks with pixel-based image encryption considering data augmentation in the encrypted domain. In: IEEE International Conference on Image Processing 1\u20135, 2019.","DOI":"10.1109\/ICIP.2019.8804201"},{"key":"256_CR31","first-page":"352","volume":"8","author":"X Sun","year":"2020","unstructured":"Sun X, Zhang P, Liu JK, Yu J, Xie W (2020) Private machine learning classification based on fully homomorphic encryption. IEEE Trans Emerg Top Comput 8:352\u2013364","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"256_CR32","unstructured":"Takabi H, Hesamifard E, Ghasemi M. Privacy Preserving Multi-party Machine Learning with Homomorphic Encryption. Proc Work Priv Multi-Party Mach. Learn. 1\u20135, 2016."},{"key":"256_CR33","first-page":"17","volume":"2","author":"M Gomathisankaran","year":"2013","unstructured":"Gomathisankaran M, Namuduri K, Tyagi A (2013) HORNS: a semi-perfectly secret homomorphic encryption system. Am J Sci Eng 2:17\u201323","journal-title":"Am J Sci Eng"},{"key":"256_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00200-015-0268-1","volume":"27","author":"Y Kong","year":"2016","unstructured":"Kong Y, Asif S, Khan MAU (2016) Modular multiplication using the core function in the residue number system. Appl Algebr Eng Commun Comput 27:1\u201316","journal-title":"Appl Algebr Eng Commun Comput"},{"key":"256_CR35","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"PL Montgomery","year":"1985","unstructured":"Montgomery PL (1985) Modular multiplication without trial division. Math Comput 44:519\u2013521","journal-title":"Math Comput"},{"key":"256_CR36","doi-asserted-by":"publisher","first-page":"12909","DOI":"10.1007\/s00521-020-04735-8","volume":"32","author":"M Moetesum","year":"2020","unstructured":"Moetesum M, Siddiqi I, Ehsan S, Vincent N (2020) Deformation modeling and classification using deep convolutional neural networks for computerized analysis of neuropsychological drawings. Neural Comput Appl 32:12909\u201312933","journal-title":"Neural Comput Appl"},{"key":"256_CR37","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120\u2013126","journal-title":"Commun ACM"},{"key":"256_CR38","doi-asserted-by":"crossref","unstructured":"Chillotti I, Gama N, Georgieva M, Izabach\u00e8ne M. Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds. in Advances in Cryptology \u2013 ASIACRYPT 2016. ASIACRYPT 2016. Lecture Notes in Computer Science (eds. Cheon, J. & Takagi, T.) vol. 10031 LNCS 3\u201333 (Springer, 2016).","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"256_CR39","doi-asserted-by":"crossref","unstructured":"Gentry C, Halevi S. Implementing Gentry \u2019 s Fully-Homomorphic Encryption Scheme. 1\u201329, 2011.","DOI":"10.1007\/978-3-642-30057-8_1"},{"key":"256_CR40","unstructured":"Sharma I. Fully Homomorphic Encryption Scheme with Symmetric Keys. (University College of Engineering, Rajasthan Technical University, Kota, 2013)."},{"key":"256_CR41","doi-asserted-by":"publisher","unstructured":"Muhammed KJ, Gbolagade KA. Enhanced MORE Algorithm for Fully Homomorphic Encryption Based on Secret Information Moduli Set. BT - 2019 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2019, Macao, Macao, December 15\u201318, 2019. 469\u2013473 at https:\/\/doi.org\/10.1109\/IEEM44572.2019.8978501, 2019.","DOI":"10.1109\/IEEM44572.2019.8978501"},{"key":"256_CR42","first-page":"656","volume":"6","author":"MI Youssef","year":"2013","unstructured":"Youssef MI, Emam AE, Saafan SM, Elghany MABD (2013) Secured image encryption scheme using both residue number system and DNA sequence. Online J Electron Electr Eng 6:656\u2013664","journal-title":"Online J Electron Electr Eng"},{"key":"256_CR43","first-page":"2223","volume":"2","author":"S Alhassan","year":"2013","unstructured":"Alhassan S, Gbolagade KA (2013) Enhancement of the security of a digital image using the moduli set. Int J Adv Res Comput Eng Technol 2:2223\u20132229","journal-title":"Int J Adv Res Comput Eng Technol"},{"key":"256_CR44","first-page":"1","volume":"12","author":"BA Weyori","year":"2012","unstructured":"Weyori BA, Amponsah PN, Yeboah PK (2012) Modeling a secured digital image encryption scheme using a three moduli set. Glob J Comput Sci Technol Interdiscip 12:1\u20139","journal-title":"Glob J Comput Sci Technol Interdiscip"},{"key":"256_CR45","first-page":"197","volume":"1","author":"OL Usman","year":"2018","unstructured":"Usman OL, Olusanya OO, Adedeji OB, Rufai KI (2018) Modelling a secure digital image cryptosystem using the traditional moduli set. TASUED J Pure Appl Sci 1:197\u2013207","journal-title":"TASUED J Pure Appl Sci"},{"key":"256_CR46","doi-asserted-by":"publisher","unstructured":"Younes D, Steffan P. A Comparative Study on Different Moduli Sets in Residue Number System. In: 2012 International Conference on Computer Systems and Industrial Informatics 1\u20136 (IEEE, 2012). https:\/\/doi.org\/10.1109\/ICCSII.2012.6454344.","DOI":"10.1109\/ICCSII.2012.6454344"},{"key":"256_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0245579","volume":"16","author":"OL Usman","year":"2021","unstructured":"Usman OL, Muniyandi RC, Omar K, Mohamad M (2021) Gaussian smoothing and modified histogram normalization methods to improve neural-biomarker interpretations for dyslexia classification mechanism. PLoS ONE 16:1\u201327","journal-title":"PLoS ONE"},{"key":"256_CR48","doi-asserted-by":"crossref","unstructured":"Lytle, M. N., Bitan, T. & Booth, J. R. A neuroimaging dataset on orthographic, phonological and semantic word processing in school-aged children. Data Br. 28, 0\u20137 (2020).","DOI":"10.1016\/j.dib.2019.105091"},{"key":"256_CR49","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1038\/sdata.2016.44","volume":"3","author":"KJ Gorgolewski","year":"2016","unstructured":"Gorgolewski KJ et al (2016) The brain imaging data structure, a format for organizing and describing outputs of neuroimaging experimts. Sci Data 3:208\u2013208","journal-title":"Sci Data"},{"key":"256_CR50","doi-asserted-by":"crossref","unstructured":"Haight, S. L. Test Review: Wagner, R.K., Torgesen, J.K., & Rashotte, C.A. (1999). Comprehensive Test of Phonological Processing (CTOPP). Austin, TX:PRO-ED. Accessment Eff. Interv. 31, 81\u201384 (2006).","DOI":"10.1177\/073724770603100207"},{"key":"256_CR51","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/42.906424","volume":"20","author":"Y Zhang","year":"2001","unstructured":"Zhang Y, Brady M, Smith S (2001) Segmentation of brain MR images through a hidden Markov random field model and the expectation-maximization algorithm. IEEE Trans Med Imaging 20:45\u201357","journal-title":"IEEE Trans Med Imaging"},{"key":"256_CR52","unstructured":"Andersson JLR, Jenkinson M, Smith S. Non-linear registration, aka spatial normalization: FMRIB Technical Report TR07JA2. 2007."},{"key":"256_CR53","doi-asserted-by":"publisher","first-page":"2426","DOI":"10.1016\/j.neuroimage.2010.10.002","volume":"54","author":"S van der Mark","year":"2011","unstructured":"van der Mark S et al (2011) The left occipitotemporal system in reading: Disruption of focal fMRI connectivity to left inferior frontal and inferior parietal language areas in children with dyslexia. Neuroimage 54:2426\u20132436","journal-title":"Neuroimage"},{"key":"256_CR54","first-page":"6323","volume":"83","author":"OL Usman","year":"2020","unstructured":"Usman OL, Muniyandi RC (2020) A framework for a secure brain image classification using deep learning and residue number system. TEST Eng Manag 83:6323\u20136330","journal-title":"TEST Eng Manag"},{"key":"256_CR55","doi-asserted-by":"publisher","unstructured":"Gbolagade KA, Cotofana SD. An O(n) Residue Number System to Mixed Radix Conversion Technique. In: IEEE Conference on Very Large Scale Integration 521\u2013524 (2009). https:\/\/doi.org\/10.1109\/ISCAS.2009.5117800.","DOI":"10.1109\/ISCAS.2009.5117800"},{"key":"256_CR56","doi-asserted-by":"crossref","unstructured":"Gazizullina A. Fully homomorphic encryption scheme for secure computation. In: ACM 2nd International Conference on Art, Science, and Engineering of Programming 224\u2013226 (ACM, 2018).","DOI":"10.1145\/3191697.3213794"},{"key":"256_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.artmed.2021.102065","volume":"115","author":"V-T Pham","year":"2021","unstructured":"Pham V-T, Tran T-T, Wang P-C, Chen P-Y, Lo M-T (2021) EAR-UNet: a deep learning-based approach for segmentation of tympanic membranes from otoscopic images. Artif Intell Med 115:1\u201312","journal-title":"Artif Intell Med"},{"key":"256_CR58","doi-asserted-by":"publisher","first-page":"153098","DOI":"10.1109\/ACCESS.2020.3017436","volume":"8","author":"S Obla","year":"2020","unstructured":"Obla S, Gong X, Aloufi A, Hu P, Takabi D (2020) Effective activation functions for homomorphic evaluation of deep neural networks. IEEE Access 8:153098\u2013153112","journal-title":"IEEE Access"},{"key":"256_CR59","doi-asserted-by":"publisher","unstructured":"Liu J, Liu B, Fu H. Optimizing Residue Number System on FPGA. in Proceedings - 2016 IEEE International Conference on Internet of Things; IEEE Green Computing and Communications; IEEE Cyber, Physical, and Social Computing; IEEE Smart Data, iThings-GreenCom-CPSCom-Smart Data 2016 621\u2013624 (IEEE, 2016). https:\/\/doi.org\/10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.137.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.137"},{"key":"256_CR60","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-022-00650-y","author":"B Lu","year":"2022","unstructured":"Lu B et al (2022) A practical Alzheimer\u2019s disease classifier via brain imaging-based deep learning on 85,721 samples. J Big Data. https:\/\/doi.org\/10.1186\/s40537-022-00650-y","journal-title":"J. Big Data"},{"key":"256_CR61","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1002\/hbm.23426","volume":"38","author":"P P\u0142o\u0144ski","year":"2017","unstructured":"P\u0142o\u0144ski P et al (2017) Multi-parameter machine learning approach to the neuroanatomical basis of developmental dyslexia. Hum Brain Mapp 38:900\u2013908","journal-title":"Hum Brain Mapp"},{"key":"256_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cmpb.2020.105726","volume":"197","author":"S Zahia","year":"2020","unstructured":"Zahia S, Garcia-Zapirain B, Saralegui I, Fernandez-Ruanova B (2020) Dyslexia detection using 3D convolutional neural networks and functional magnetic resonance imaging. Comput Methods Programs Biomed 197:1\u20139","journal-title":"Comput Methods Programs Biomed"},{"key":"256_CR63","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1016\/j.nicl.2016.03.014","volume":"11","author":"P Tamboer","year":"2016","unstructured":"Tamboer P, Vorst HCM, Ghebreab S, Scholte HS (2016) Machine learning and dyslexia: classification of individual structural neuro-imaging scans of students with and without dyslexia. NeuroImage Clin 11:508\u2013514","journal-title":"NeuroImage Clin"},{"key":"256_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.57197\/JDR-2024-0010","volume":"3","author":"G Aldehim","year":"2024","unstructured":"Aldehim G, Rashid M, Alluhaidan AS, Sakri S, Basheer S (2024) Deep learning for dyslexia detection: a comprehensive CNN approach with handwriting analysis and benchmark comparisons. J Disabil Res 3:1\u20138","journal-title":"J Disabil Res"},{"key":"256_CR65","doi-asserted-by":"publisher","unstructured":"Rouhani BD, Riazi MS, Koushanfar F. DeepSecure: Scalable Provably-Secure Deep Learning. in DAC \u201918: Proceedings of the 55th Annual Design Automation Conference 1\u20136 (Association for Computing Machinery, 2018). https:\/\/doi.org\/10.1145\/3195970.3196023.","DOI":"10.1145\/3195970.3196023"},{"key":"256_CR66","doi-asserted-by":"crossref","unstructured":"Sitaula C, Xiang Y, Aryal S, Lu X. Unsupervised deep features for privacy image classification. arXiv:19909.10708v1 1\u201312, 2019.","DOI":"10.1109\/IJCNN48605.2020.9207106"},{"key":"256_CR67","doi-asserted-by":"publisher","first-page":"36879","DOI":"10.1109\/ACCESS.2021.3062709","volume":"9","author":"OL Usman","year":"2021","unstructured":"Usman OL, Muniyandi RC, Omar K, Mohamad M (2021) Advance Machine learning methods for dyslexia biomarker detection: a review of implementation details and challenges. IEEE Access 9:36879\u201336897","journal-title":"IEEE Access"}],"container-title":["Brain Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40708-025-00256-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40708-025-00256-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40708-025-00256-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T08:20:29Z","timestamp":1746519629000},"score":1,"resource":{"primary":{"URL":"https:\/\/braininformatics.springeropen.com\/articles\/10.1186\/s40708-025-00256-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,30]]},"references-count":67,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["256"],"URL":"https:\/\/doi.org\/10.1186\/s40708-025-00256-z","relation":{},"ISSN":["2198-4018","2198-4026"],"issn-type":[{"value":"2198-4018","type":"print"},{"value":"2198-4026","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,30]]},"assertion":[{"value":"18 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"11"}}