Secure, privacy-preserving and federated machine learning in medical imaging

GA Kaissis, MR Makowski, D Rückert… - Nature Machine …, 2020 - nature.com
The broad application of artificial intelligence techniques in medicine is currently hindered
by limited dataset availability for algorithm training and validation, due to the absence of …

Machine learning in mental health: A systematic review of the HCI literature to support the development of effective and implementable ML systems

A Thieme, D Belgrave, G Doherty - ACM Transactions on Computer …, 2020 - dl.acm.org
High prevalence of mental illness and the need for effective mental health care, combined
with recent advances in AI, has led to an increase in explorations of how the field of machine …

Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption

S Oya, F Kerschbaum - 30th USENIX security symposium (USENIX …, 2021 - usenix.org
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an
encrypted database stored in a server while limiting the information leaked to the server …

Pump up the volume: Practical database reconstruction from volume leakage on range queries

P Grubbs, MS Lacharité, B Minaud… - Proceedings of the 2018 …, 2018 - dl.acm.org
We present attacks that use only the volume of responses to range queries to reconstruct
databases. Our focus is on practical attacks that work for large-scale databases with many …

Learning to reconstruct: Statistical learning theory and encrypted database attacks

P Grubbs, MS Lacharité, B Minaud… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
We show that the problem of reconstructing encrypted databases from access pattern
leakage is closely related to statistical learning theory. This new viewpoint enables us to …

Building enclave-native storage engines for practical encrypted databases

Y Sun, S Wang, H Li, F Li - Proceedings of the VLDB Endowment, 2021 - dl.acm.org
Data confidentiality is one of the biggest concerns that hinders enterprise customers from
moving their workloads to the cloud. Thanks to the trusted execution environment (TEE), it is …

Shrinkwrap: efficient sql query processing in differentially private data federations

J Bater, X He, W Ehrich, A Machanavajjhala… - Proceedings of the …, 2018 - par.nsf.gov
A private data federation is a set of autonomous databases that share a unified query
interface offering in-situ evaluation of SQL queries over the union of the sensitive data of its …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Leakage-abuse attacks against forward and backward private searchable symmetric encryption

L Xu, L Zheng, C Xu, X Yuan, C Wang - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Dynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and
update over encrypted files. To minimize the leakage during updates, a security notion …

Challenges for machine learning in clinical translation of big data imaging studies

NK Dinsdale, E Bluemke, V Sundaresan, M Jenkinson… - Neuron, 2022 - cell.com
Combining deep learning image analysis methods and large-scale imaging datasets offers
many opportunities to neuroscience imaging and epidemiology. However, despite these …