skip to main content
research-article

A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images

Authors Info & Claims
Published:02 June 2021Publication History
Skip Abstract Section

Abstract

The advancements in the Internet of Things (IoT) and cloud services have enabled the availability of smart e-healthcare services in a distant and distributed environment. However, this has also raised major privacy and efficiency concerns that need to be addressed. While sharing clinical data across the cloud that often consists of sensitive patient-related information, privacy is a major challenge. Adequate protection of patients’ privacy helps to increase public trust in medical research. Additionally, DL-based models are complex, and in a cloud-based approach, efficient data processing in such models is complicated. To address these challenges, we propose an efficient and secure cancer diagnostic framework for histopathological image classification by utilizing both differential privacy and secure multi-party computation. For efficient computation, instead of performing the whole operation on the cloud, we decouple the layers into two modules: one for feature extraction using the VGGNet\(\) module at the user side and the remaining layers for private prediction over the cloud. The efficacy of the framework is validated on two datasets composed of histopathological images of the canine mammary tumor and human breast cancer. The application of differential privacy preserving to the proposed model makes the model secure and capable of preserving the privacy of sensitive data from any adversary, without significantly compromising the model accuracy. Extensive experiments show that the proposed model efficiently achieves the trade-off between privacy and model performance.

References

  1. Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 308–318. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Somaia M. Abdelmegeed and Sulma Mohammed. 2018. Canine mammary tumors as a model for human disease. Oncology Letters 15, 6 (2018), 8195–8205.Google ScholarGoogle Scholar
  3. Eugene Bagdasaryan, Omid Poursaeed, and Vitaly Shmatikov. 2019. Differential privacy has disparate impact on model accuracy. In Advances in Neural Information Processing Systems. 15453–15462. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Yoshua Bengio et al. 2009. Learning deep architectures for AI. Foundations and Trends in Machine Learning 2, 1 (2009), 1–127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Vandana Bharti, Bhaskar Biswas, and Kaushal Kumar Shukla. 2020. Recent trends in nature inspired computation with applications to deep learning. In 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence’20). IEEE, 294–299.Google ScholarGoogle ScholarCross RefCross Ref
  6. Freddie Bray, Jacques Ferlay, Isabelle Soerjomataram, Rebecca L. Siegel, Lindsey A. Torre, and Ahmedin Jemal. 2018. Global cancer statistics 2018: GLOBOCAN estimates of incidence and mortality worldwide for 36 cancers in 185 countries. CA: A Cancer Journal for Clinicians 68, 6 (2018), 394–424.Google ScholarGoogle ScholarCross RefCross Ref
  7. Niklas Büscher, Daniel Demmler, Stefan Katzenbeisser, David Kretzmer, and Thomas Schneider. 2018. HyCC: Compilation of hybrid protocols for practical secure computation. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 847–861. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Megha Byali, Harsh Chaudhari, Arpita Patra, and Ajith Suresh. 2020. FLASH: Fast and robust framework for privacy-preserving machine learning. Proceedings on Privacy Enhancing Technologies 2 (2020), 459–480.Google ScholarGoogle ScholarCross RefCross Ref
  9. Dario Catalano, Mario Di Raimondo, Dario Fiore, and Irene Giacomelli. 2019. MonZ2ka: Fast Maliciously Secure Two Party Computation on Z2k. Technical Report. Cryptology ePrint Archive, Report 2019/211.Google ScholarGoogle Scholar
  10. Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, and Shardul Tripathi. 2019. EzPC: Programmable and efficient secure two-party computation for machine learning. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P’19). IEEE, 496–511.Google ScholarGoogle ScholarCross RefCross Ref
  11. Kamalika Chaudhuri and Claire Monteleoni. 2009. Privacy-preserving logistic regression. In Advances in Neural Information Processing Systems. 289–296. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Morten Dahl, Jason Mancuso, Yann Dupis, Ben Decoste, Morgan Giraud, Ian Livingstone, Justin Patriquin, and Gavin Uhma. 2018. Private machine learning in tensorflow using secure computation. arXiv preprint arXiv:1810.08130 (2018).Google ScholarGoogle Scholar
  13. Ivan Damgård, Valerio Pastro, Nigel Smart, and Sarah Zakarias. 2012. Multiparty computation from somewhat homomorphic encryption. In Annual Cryptology Conference. Springer, 643–662. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Roshan Dathathri, Olli Saarikivi, Hao Chen, Kim Laine, Kristin Lauter, Saeed Maleki, Madanlal Musuvathi, and Todd Mytkowicz. 2019. CHET: An optimizing compiler for fully-homomorphic neural-network inferencing. In Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. 142–156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY-A framework for efficient mixed-protocol secure two-party computation. In NDSS. 1--5. Google ScholarGoogle Scholar
  16. Li Deng. 2014. A tutorial survey of architectures, algorithms, and applications for deep learning. APSIPA Transactions on Signal and Information Processing 3 (2014), 1--29. DOI:10.1017/atsip.2013.9Google ScholarGoogle Scholar
  17. Jiahao Ding, Yanmin Gong, Chi Zhang, Miao Pan, and Zhu Han. 2019. Optimal differentially private ADMM for distributed machine learning. arXiv preprint arXiv:1901.02094 (2019).Google ScholarGoogle Scholar
  18. Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. 2006. Our data, ourselves: Privacy via distributed noise generation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 486–503. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference. Springer, 265–284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science 9, 3–4 (2014), 211–407. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Matt Fredrikson, Somesh Jha, and Thomas Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1322–1333. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Robin C. Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 (2017).Google ScholarGoogle Scholar
  23. Oded Goldreich. 1998. Secure multi-party computation. Manuscript. Preliminary Version 78 (1998). http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.2201.Google ScholarGoogle Scholar
  24. Oded Goldreich, Silvio Micali, and Avi Wigderson. 2019. How to play any mental game, or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307–328. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Douglas S. Gomes, Simone S. Porto, Débora Balabram, and Helenice Gobbi. 2014. Inter-observer variability between general pathologists and a specialist in breast pathology in the diagnosis of lobular neoplasia, columnar cell lesions, atypical ductal hyperplasia and ductal carcinoma in situ of the breast. Diagnostic Pathology 9, 1 (2014), 121.Google ScholarGoogle ScholarCross RefCross Ref
  26. Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014).Google ScholarGoogle Scholar
  27. Zhongyi Han, Benzheng Wei, Yuanjie Zheng, Yilong Yin, Kejian Li, and Shuo Li. 2017. Breast cancer multi-classification from histopathological images with structured deep learning model. Scientific Reports 7, 1 (2017), 1–10.Google ScholarGoogle Scholar
  28. Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg. 2010. TASTY: Tool for automating secure two-party computations. In Proceedings of the 17th ACM Conference on Computer and Communications Security. 451–462. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Jie Hu, Li Shen, and Gang Sun. 2018. Squeeze-and-excitation networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 7132–7141.Google ScholarGoogle ScholarCross RefCross Ref
  30. Geetha Jagannathan and Rebecca N. Wright. 2005. Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining. 593–599. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. {GAZELLE}: A low latency framework for secure neural network inference. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1651–1669. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Daniel Kifer and Ashwin Machanavajjhala. 2011. No free lunch in data privacy. In Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data. 193–204. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems. 1097–1105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Abhinav Kumar, Sanjay Kumar Singh, Sonal Saxena, K. Lakshmanan, Arun Kumar Sangaiah, Himanshu Chauhan, Sameer Shrivastava, and Raj Kumar Singh. 2020. Deep feature learning for histopathological image classification of canine mammary tumors and human breast cancer. Information Sciences 508 (2020), 405–421.Google ScholarGoogle ScholarCross RefCross Ref
  35. A. Kumar, S. K. Singh, S. Saxena, A. K. Singh, S. Shrivastava, K. Lakshmanan, N. Kumar, and R. K. Singh. 2020. CoMHisP: A novel feature extractor for histopathological image classification based on fuzzy SVM with within-class relative density. IEEE Transactions on Fuzzy Systems 29, 1 (2020), 103--117. DOI:10.1109/TFUZZ.2020.2995968Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, and Rahul Sharma. 2019. Cryptflow: Secure tensorflow inference. arXiv preprint arXiv:1909.07814 (2019).Google ScholarGoogle Scholar
  37. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521, 7553 (2015), 436–444.Google ScholarGoogle Scholar
  38. Yehuda Lindell and Benny Pinkas. 2000. Privacy preserving data mining. In Annual International Cryptology Conference. Springer, 36–54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Yehuda Lindell and Benny Pinkas. 2012. Secure two-party computation via cut-and-choose oblivious transfer. Journal of Cryptology 25, 4 (2012), 680–722. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Jian Liu, Mika Juuti, Yao Lu, and Nadarajah Asokan. 2017. Oblivious neural network predictions via MiniONN transformations. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 619–631. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Saurabh Lodha, Sarika Saggar, Julide T. Celebi, and David N. Silvers. 2008. Discordance in the histopathologic diagnosis of difficult melanocytic neoplasms in the clinical setting. Journal of Cutaneous Pathology 35, 4 (2008), 349–352.Google ScholarGoogle ScholarCross RefCross Ref
  42. H. Brendan McMahan, Galen Andrew, Ulfar Erlingsson, Steve Chien, Ilya Mironov, Nicolas Papernot, and Peter Kairouz. 2018. A general approach to adding differential privacy to iterative training procedures. arXiv preprint arXiv:1812.06210 (2018).Google ScholarGoogle Scholar
  43. H. Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. 2017. Learning differentially private recurrent language models. arXiv preprint arXiv:1710.06963 (2017).Google ScholarGoogle Scholar
  44. Frank McSherry and Kunal Talwar. 2007. Mechanism design via differential privacy. In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS’07). IEEE, 94–103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Rajesh Mehra et al. 2018. Automatic magnification independent classification of breast cancer tissue in histological images using deep convolutional neural network. In International Conference on Advanced Informatics for Computing Research. Springer, 772–781.Google ScholarGoogle Scholar
  46. S. Micali, O. Goldreich, and A. Wigderson. 1987. How to play any mental game. In Proceedings of the 19th ACM Symposium on Theory of Computing (STOC’87). 218–229. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. L. Moe. 2001. Population-based incidence of mammary tumours in some dog breeds.Journal of Reproduction and Fertility. Supplement 57 (2001), 439–443.Google ScholarGoogle Scholar
  48. Payman Mohassel and Peter Rindal. 2018. ABY3: A mixed protocol framework for machine learning. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 35–52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Payman Mohassel and Yupeng Zhang. 2017. Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP’17). IEEE, 19–38.Google ScholarGoogle ScholarCross RefCross Ref
  50. Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, and Sai Sheshank Burra. 2012. A new approach to practical active-secure two-party computation. In Annual Cryptology Conference. Springer, 681–700. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Nicolas Papernot, Martín Abadi, Ulfar Erlingsson, Ian Goodfellow, and Kunal Talwar. 2016. Semi-supervised knowledge transfer for deep learning from private training data. arXiv preprint arXiv:1610.05755 (2016).Google ScholarGoogle Scholar
  52. Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik, and Ananthram Swami. 2017. Practical black-box attacks against machine learning. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. 506–519. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, and Ananthram Swami. 2016. The limitations of deep learning in adversarial settings. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P’16). IEEE, 372–387.Google ScholarGoogle ScholarCross RefCross Ref
  54. Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and Úlfar Erlingsson. 2018. Scalable private learning with pate. arXiv preprint arXiv:1802.08908 (2018).Google ScholarGoogle Scholar
  55. Senior pets. American Veterinary Medical Association. Retrieved October 4, 2020, from https://www.avma.org/resources-tools/pet-owners/petcare/senior-petsGoogle ScholarGoogle Scholar
  56. NhatHai Phan, Yue Wang, Xintao Wu, and Dejing Dou. 2016. Differential privacy preservation for deep auto-encoders: An application of human behavior prediction. In 30th AAAI Conference on Artificial Intelligence. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Adnan Qayyum, Junaid Qadir, Muhammad Bilal, and Ala Al-Fuqaha. 2020. Secure and robust machine learning for healthcare: A survey. arXiv preprint arXiv:2001.08103 (2020).Google ScholarGoogle Scholar
  58. Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, et al. 2015. Imagenet large scale visual recognition challenge. International Journal of Computer Vision 115, 3 (2015), 211–252. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Theo Ryffel, Andrew Trask, Morten Dahl, Bobby Wagner, Jason Mancuso, Daniel Rueckert, and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. arXiv preprint arXiv:1811.04017 (2018).Google ScholarGoogle Scholar
  60. Yaritza Salas, Adelys Márquez, Daniel Diaz, and Laura Romero. 2015. Epidemiological study of mammary tumors in female dogs diagnosed during the period 2002-2012: A growing animal health problem. PLoS ONE 10, 5 (2015), 1--15. DOI:10.1371/journal.pone.0127381Google ScholarGoogle ScholarCross RefCross Ref
  61. Arnaud Arindra Adiyoso Setio, Francesco Ciompi, Geert Litjens, Paul Gerke, Colin Jacobs, Sarah J. Van Riel, Mathilde Marie Winkler Wille, Matiullah Naqibullah, Clara I. Sánchez, and Bram van Ginneken. 2016. Pulmonary nodule detection in CT images: False positive reduction using multi-view convolutional networks. IEEE Transactions on Medical Imaging 35, 5 (2016), 1160–1169.Google ScholarGoogle ScholarCross RefCross Ref
  62. Adi Shamir. 1979. How to share a secret. Communications of the ACM 22, 11 (1979), 612–613. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1310–1321. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).Google ScholarGoogle Scholar
  65. R. Singh, T. Ahmed, A. Kumar, A. K. Singh, A. K. Pandey, and S. K. Singh. 2020. Imbalanced breast cancer classification using transfer learning. IEEE/ACM Transactions on Computational Biology and Bioinformatics 18, 1 (2020), 83–93. DOI:10.1109/TCBB.2020.2980831Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Yang Song, Hang Chang, Yang Gao, Sidong Liu, Donghao Zhang, Junen Yao, Wojciech Chrzanowski, and Weidong Cai. 2018. Feature learning with component selective encoding for histopathology image classification. In 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI’18). IEEE, 257–260.Google ScholarGoogle ScholarCross RefCross Ref
  67. Yang Song, Ju Jia Zou, Hang Chang, and Weidong Cai. 2017. Adapting Fisher vectors for histopathology image classification. In 2017 IEEE 14th International Symposium on Biomedical Imaging (ISBI’17). IEEE, 600–603. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Fabio A. Spanhol, Luiz S. Oliveira, Caroline Petitjean, and Laurent Heutte. 2015. A dataset for breast cancer histopathological image classification. IEEE Transactions on Biomedical Engineering 63, 7 (2015), 1455–1462.Google ScholarGoogle ScholarCross RefCross Ref
  69. Fabio Alexandre Spanhol, Luiz S. Oliveira, Caroline Petitjean, and Laurent Heutte. 2016. Breast cancer histopathological image classification using convolutional neural networks. In 2016 International Joint Conference on Neural Networks (IJCNN’16). IEEE, 2560–2567.Google ScholarGoogle ScholarCross RefCross Ref
  70. Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013).Google ScholarGoogle Scholar
  71. Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, and Kristian Kersting. 2020. CryptoSPN: Privacy-preserving sum-product network inference. arXiv preprint arXiv:2002.00801 (2020).Google ScholarGoogle Scholar
  72. Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha, and Mounir Hamdi. 2020. The adversarial machine learning conundrum: Can the insecurity of ML become the Achilles’ heel of cognitive networks? IEEE Network 34, 1 (2020), 196--203. DOI:10.1109/MNET.001.1900197Google ScholarGoogle ScholarCross RefCross Ref
  73. Jaideep Vaidya, Basit Shafiq, Anirban Basu, and Yuan Hong. 2013. Differentially private naive bayes classification. In 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Vol. 1. IEEE, 571–576. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Jaideep Vaidya, Basit Shafiq, Wei Fan, Danish Mehmood, and David Lorenzi. 2013. A random decision tree framework for privacy-preserving data mining. IEEE Transactions on Dependable and Secure Computing 11, 5 (2013), 399–411.Google ScholarGoogle ScholarCross RefCross Ref
  75. Marta Vascellari, Katia Capello, Antonio Carminato, Claudia Zanardello, Elisa Baioni, and Franco Mutinelli. 2016. Incidence of mammary tumors in the canine population living in the Veneto region (Northeastern Italy): Risk factors and similarities to human breast cancer. Preventive Veterinary Medicine 126 (2016), 183–189.Google ScholarGoogle ScholarCross RefCross Ref
  76. Sameer Wagh, Divya Gupta, and Nishanth Chandran. 2019. Securenn: 3-party secure computation for neural network training. Proceedings on Privacy Enhancing Technologies 2019, 3 (2019), 26–49.Google ScholarGoogle ScholarCross RefCross Ref
  77. Christopher Waites. 2019. An Introduction to Differentially Private Deep Learning. https://chriswaites.com/2019/08/01/deep-learning-with-differential-privacy-tutorial.htmlGoogle ScholarGoogle Scholar
  78. Yu-Xiang Wang, Borja Balle, and Shiva Kasiviswanathan. 2018. Subsampled R\(\)’enyi differential privacy and analytical moments accountant. arXiv preprint arXiv:1808.00087 (2018).Google ScholarGoogle Scholar
  79. Ren Wu, Shengen Yan, Yi Shan, Qingqing Dang, and Gang Sun. 2015. Deep image: Scaling up image recognition. arXiv preprint arXiv:1501.02876 7, 8 (2015).Google ScholarGoogle Scholar
  80. Juanying Xie, Ran Liu, Joseph Luttrell IV, and Chaoyang Zhang. 2019. Deep learning based analysis of histopathological images of breast cancer. Frontiers in Genetics 10 (2019), 80.Google ScholarGoogle ScholarCross RefCross Ref
  81. Andrew C. Yao. 1982. Protocols for secure computations. In 23rd Annual Symposium on Foundations of Computer Science (SFCS’82). IEEE, 160–164. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In 27th Annual Symposium on Foundations of Computer Science (SFCS’86). IEEE, 162–167. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Samee Zahur and David Evans. 2015. Obliv-C: A language for extensible data-oblivious computation. IACR Cryptology ePrint Archive 2015, 1153 (2015).Google ScholarGoogle Scholar
  84. Xiaofan Zhang, Wei Liu, Murat Dundar, Sunil Badve, and Shaoting Zhang. 2014. Towards large-scale histopathological image analysis: Hashing-based image retrieval. IEEE Transactions on Medical Imaging 34, 2 (2014), 496–506.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!