Secure and Robust Machine Learning for Healthcare: A Survey

Recent years have witnessed widespread adoption of machine learning (ML)/deep learning (DL) techniques due to their superior performance for a variety of healthcare applications ranging from the prediction of cardiac arrest from one-dimensional heart signals to computer-aided diagnosis (CADx) using multi-dimensional medical images. Notwithstanding the impressive performance of ML/DL, there are still lingering doubts regarding the robustness of ML/DL in healthcare settings (which is traditionally considered quite challenging due to the myriad security and privacy issues involved), especially in light of recent results that have shown that ML/DL are vulnerable to adversarial attacks. In this paper, we present an overview of various application areas in healthcare that leverage such techniques from security and privacy point of view and present associated challenges. In addition, we present potential methods to ensure secure and privacy-preserving ML for healthcare applications. Finally, we provide insight into the current research challenges and promising directions for future research.

[1]  Delaram Kahrobaei,et al.  Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics , 2020, ACM Comput. Surv..

[2]  Junaid Qadir,et al.  Retrospective Motion Correction in Multishot MRI using Generative Adversarial Network , 2019, Scientific Reports.

[3]  Enrico Costanza,et al.  Evaluating saliency map explanations for convolutional neural networks: a user study , 2020, IUI.

[4]  Alessandro Lameiras Koerich,et al.  Data Augmentation for Histopathological Images Based on Gaussian-Laplacian Pyramid Blending , 2020, 2020 International Joint Conference on Neural Networks (IJCNN).

[5]  Junaid Qadir,et al.  The Adversarial Machine Learning Conundrum: Can the Insecurity of ML Become the Achilles' Heel of Cognitive Networks? , 2019, IEEE Network.

[6]  Junaid Qadir,et al.  Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward , 2019, IEEE Communications Surveys & Tutorials.

[7]  Diane J. Cook,et al.  A Survey of Unsupervised Deep Domain Adaptation , 2018, ACM Trans. Intell. Syst. Technol..

[8]  R. Ranganath,et al.  A Review of Challenges and Opportunities in Machine Learning for Health. , 2018, AMIA Joint Summits on Translational Science proceedings. AMIA Joint Summits on Translational Science.

[9]  Gobert N. Lee,et al.  Deep Learning in Medical Image Analysis: Challenges and Applications , 2020, Advances in Experimental Medicine and Biology.

[10]  Yingnan Sun,et al.  Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey , 2019, IEEE Access.

[11]  Timothy Oladunni,et al.  A Gaussian Data Augmentation Technique on Highly Dimensional, Limited Labeled Data for Multiclass Classification Using Deep Learning , 2019, 2019 Tenth International Conference on Intelligent Control and Information Processing (ICICIP).

[12]  Minglei Shu,et al.  Differential Privacy for Data and Model Publishing of Medical Data , 2019, IEEE Access.

[13]  Theodoros Salonidis,et al.  Differential Privacy-enabled Federated Learning for Sensitive Health Data , 2019, arXiv.org.

[14]  Wen Huang,et al.  An Efficient Differential Privacy Logistic Classification Mechanism , 2019, IEEE Internet of Things Journal.

[15]  Marzyeh Ghassemi,et al.  Turning the crank for machine learning: ease, at what expense? , 2019, The Lancet. Digital health.

[16]  Lucas M Bachmann,et al.  Automated deep learning design for medical image classification by health-care professionals with no coding experience: a feasibility study. , 2019, The Lancet. Digital health.

[17]  Leo Anthony Celi,et al.  The “inconvenient truth” about AI in healthcare , 2019, npj Digital Medicine.

[18]  Anna Goldenberg,et al.  Feature Robustness in Non-stationary Health Records: Caveats to Deployable Model Performance in Common Clinical Machine Learning Tasks , 2019, MLHC.

[19]  Andrew L. Beam,et al.  Practical guidance on artificial intelligence for health-care data. , 2019, The Lancet. Digital health.

[20]  Liang Xiao,et al.  Self-Supervised Domain Adaptation for Computer Vision Tasks , 2019, IEEE Access.

[21]  Zhongheng Zhang,et al.  Reinforcement learning in clinical medicine: a method to optimize dynamic treatment regime over time. , 2019, Annals of translational medicine.

[22]  M. Shamim Hossain,et al.  Emotion recognition using secure edge and cloud computing , 2019, Inf. Sci..

[23]  Luca Foschini,et al.  Reproducibility in Machine Learning for Health , 2019, RML@ICLR.

[24]  P. Spirtes,et al.  Review of Causal Discovery Methods Based on Graphical Models , 2019, Front. Genet..

[25]  Liang Xiao,et al.  Learning-Based Privacy-Aware Offloading for Healthcare IoT With Energy Harvesting , 2019, IEEE Internet of Things Journal.

[26]  Xiangjian He,et al.  Deep Learning Techniques for Medical Image Segmentation: Achievements and Challenges , 2019, Journal of Digital Imaging.

[27]  Rose Qingyang Hu,et al.  Sensor-Based Human Activity Recognition for Smart Healthcare: A Semi-supervised Machine Learning , 2019, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

[28]  Aniruddh Raghu,et al.  Reinforcement Learning for Sepsis Treatment: Baselines and Analysis , 2019 .

[29]  Jiadong Ren,et al.  A Euclidean Group Assessment on Semi-Supervised Clustering for Healthcare Clinical Implications Based on Real-Life Data , 2019, International journal of environmental research and public health.

[30]  Nima Karimian,et al.  Unlock Your Heart: Next Generation Biometric in Resource-Constrained Healthcare Systems and IoT , 2019, IEEE Access.

[31]  E. Damiani,et al.  A Machine Learning Framework for Biometric Authentication Using Electrocardiogram , 2019, IEEE Access.

[32]  Vasant Honavar,et al.  Fairness in Algorithmic Decision Making: An Excursion Through the Lens of Causality , 2019, WWW.

[33]  Siddique Latif,et al.  Caveat Emptor: The Risks of Using Big Data for Human Development , 2019, IEEE Technology and Society Magazine.

[34]  Andrew L. Beam,et al.  Adversarial attacks on medical machine learning , 2019, Science.

[35]  Delaram Kahrobaei,et al.  Medical Diagnostics Based on Encrypted Medical Data , 2019, BICT.

[36]  B. Choi,et al.  Exploiting the Vulnerability of Deep Learning-Based Artificial Intelligence Models in Medical Imaging: Adversarial Attacks , 2019, Journal of the Korean Society of Radiology.

[37]  Christof Fetzer,et al.  TensorSCONE: A Secure TensorFlow Framework using Intel SGX , 2019, ArXiv.

[38]  Nicholas Carlini,et al.  Is AmI (Attacks Meet Interpretability) Robust to Adversarial Examples? , 2019, ArXiv.

[39]  Arun Kumar Sangaiah,et al.  Hybrid Reasoning-based Privacy-Aware Disease Prediction Support System , 2019, Comput. Electr. Eng..

[40]  Tanmoy Bhattacharya,et al.  The need for uncertainty quantification in machine-assisted medical decision making , 2019, Nat. Mach. Intell..

[41]  Christian S. Perone,et al.  Unsupervised domain adaptation for medical imaging segmentation with self-ensembling , 2018, NeuroImage.

[42]  Yu-Xiang Wang,et al.  Subsampled Rényi Differential Privacy and Analytical Moments Accountant , 2018, AISTATS.

[43]  Matthias Bethge,et al.  Towards the first adversarially robust neural network model on MNIST , 2018, ICLR.

[44]  Mohammad Al-Rubaie,et al.  Privacy-Preserving Machine Learning: Threats and Solutions , 2018, IEEE Security & Privacy.

[45]  Klaus Mueller,et al.  Beyond saliency: understanding convolutional neural networks from saliency prediction on layer-wise relevance propagation , 2017, Image Vis. Comput..

[46]  Pan He,et al.  Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[47]  Yongdong Zhang,et al.  APE-GAN: Adversarial Perturbation Elimination with GAN , 2017, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[48]  Xun Jia,et al.  Clinical implementation of AI technologies will require interpretable AI models. , 2019, Medical physics.

[49]  Dhiya Al-Jumeily,et al.  A Systematic Review on Supervised and Unsupervised Machine Learning Algorithms for Data Science , 2019, Unsupervised and Semi-Supervised Learning.

[50]  David C. Kale,et al.  Do no harm: a roadmap for responsible machine learning for health care , 2019, Nature Medicine.

[51]  Kapil Kumar Gupta,et al.  Deep Learning for Healthcare Biometrics , 2019, Advances in Medical Technologies and Clinical Practice.

[52]  H. Brendan McMahan,et al.  A General Approach to Adding Differential Privacy to Iterative Training Procedures , 2018, ArXiv.

[53]  Zhiwei Steven Wu,et al.  Privacy-Preserving Distributed Deep Learning for Clinical Data , 2018, ArXiv.

[54]  Ramesh Raskar,et al.  Split learning for health: Distributed deep learning without sharing raw patient data , 2018, ArXiv.

[55]  Mihaela van der Schaar,et al.  What is Interpretable? Using Machine Learning to Design Interpretable Decision-Support Systems , 2018, ArXiv.

[56]  Fei Wang,et al.  Deep learning for healthcare: review, opportunities and challenges , 2018, Briefings Bioinform..

[57]  Rajib Rana,et al.  Automating Motion Correction in Multishot MRI Using Generative Adversarial Networks , 2018, ArXiv.

[58]  Vatsal Sharan,et al.  A Spectral View of Adversarially Robust Features , 2018, NeurIPS.

[59]  C. Rau,et al.  Mortality prediction in patients with isolated moderate and severe traumatic brain injury using machine learning models , 2018, PloS one.

[60]  B. B. Zaidan,et al.  Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review , 2018, Journal of Medical Systems.

[61]  Xiangyu Zhang,et al.  Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples , 2018, NeurIPS.

[62]  Tao Xu,et al.  Multimodal Recurrent Model with Attention for Automated Radiology Report Generation , 2018, MICCAI.

[63]  Gavin Brown,et al.  Toward an Understanding of Adversarial Examples in Clinical Trials , 2018, ECML/PKDD.

[64]  Dan Bogdanov,et al.  Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data , 2018, IEEE/ACM Transactions on Computational Biology and Bioinformatics.

[65]  Li-Wei H. Lehman,et al.  Predicting and Understanding Unexpected Respiratory Decompensation in Critical Care Using Sparse and Heterogeneous Clinical Data , 2018, 2018 IEEE International Conference on Healthcare Informatics (ICHI).

[66]  R. Ranganath,et al.  Opportunities in Machine Learning for Healthcare , 2018, ArXiv.

[67]  David Sontag,et al.  Why Is My Classifier Discriminatory? , 2018, NeurIPS.

[68]  Paulina Grnarova,et al.  Defending Against Adversarial Attacks by Leveraging an Entire GAN , 2018, ArXiv.

[69]  Elizabeth A. Krupinski,et al.  Artificial intelligence will soon change the landscape of medical physics research and practice. , 2018, Medical physics.

[70]  Shiho Moriai,et al.  Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[71]  Edward Y. Chang,et al.  Context-Aware Symptom Checking for Disease Diagnosis Using Hierarchical Reinforcement Learning , 2018, AAAI.

[72]  Elias Bareinboim,et al.  Fairness in Decision-Making - The Causal Explanation Formula , 2018, AAAI.

[73]  Xiaoqian Jiang,et al.  Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation , 2018, IACR Cryptol. ePrint Arch..

[74]  Andrew L. Beam,et al.  Adversarial Attacks Against Medical Deep Learning Systems , 2018, ArXiv.

[75]  Tanveer F. Syeda-Mahmood,et al.  Semi-supervised learning with generative adversarial networks for chest X-ray classification with ability of data domain adaptation , 2018, 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018).

[76]  Tudor Dumitras,et al.  Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks , 2018, NeurIPS.

[77]  Wei Shi,et al.  Federated learning of predictive models from federated Electronic Health Records , 2018, Int. J. Medical Informatics.

[78]  Chang Liu,et al.  Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[79]  Konstantinos N. Plataniotis,et al.  Brain Tumor Type Classification via Capsule Networks , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).

[80]  Úlfar Erlingsson,et al.  Scalable Private Learning with PATE , 2018, ICLR.

[81]  Rama Chellappa,et al.  Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.

[82]  Marcus A. Badgeley,et al.  Natural Language-based Machine Learning Models for the Annotation of Clinical Radiology Reports. , 2018, Radiology.

[83]  Xiaohui Xie,et al.  DeepLung: Deep 3D Dual Path Nets for Automated Pulmonary Nodule Detection and Classification , 2018, 2018 IEEE Winter Conference on Applications of Computer Vision (WACV).

[84]  Ronald M. Summers,et al.  TieNet: Text-Image Embedding Network for Common Thorax Disease Classification and Reporting in Chest X-Rays , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[85]  Feng Shi,et al.  Brain MRI super resolution using 3D deep densely connected neural networks , 2018, 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018).

[86]  Andrew Slavin Ross,et al.  Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing their Input Gradients , 2017, AAAI.

[87]  Hongfang Liu,et al.  CLAMP – a toolkit for efficiently building customized clinical natural language processing pipelines , 2017, J. Am. Medical Informatics Assoc..

[88]  Pengtao Xie,et al.  On the Automatic Generation of Medical Imaging Reports , 2017, ACL.

[89]  Faisal Mahmood,et al.  Unsupervised Reverse Domain Adaptation for Synthetic Medical Images via Adversarial Training , 2017, IEEE Transactions on Medical Imaging.

[90]  Andreas Spanias,et al.  Attend and Diagnose: Clinical Time Series Analysis using Attention Models , 2017, AAAI.

[91]  Yang Song,et al.  PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples , 2017, ICLR.

[92]  Arunesh Sinha,et al.  A Learning and Masking Approach to Secure Learning , 2017, GameSec.

[93]  Syed Muhammad Anwar,et al.  Medical Image Analysis using Convolutional Neural Networks: A Review , 2017, Journal of Medical Systems.

[94]  Dan Boneh,et al.  Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.

[95]  Yanjun Qi,et al.  Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks , 2017, NDSS.

[96]  Andrew Collins,et al.  Machine Learning Approaches: Data Integration for Disease Prediction and Prognosis , 2018 .

[97]  Frank Rudzicz,et al.  Learning multiview embeddings for assessing dementia , 2018, EMNLP.

[98]  Lipo Wang,et al.  Deep Learning Applications in Medical Image Analysis , 2018, IEEE Access.

[99]  Andrew H. Beck,et al.  Diagnostic Assessment of Deep Learning Algorithms for Detection of Lymph Node Metastases in Women With Breast Cancer , 2017, JAMA.

[100]  Muhammad Ali Imran,et al.  How 5G Wireless (and Concomitant Technologies) Will Revolutionize Healthcare? , 2017, Future Internet.

[101]  David A. Wagner,et al.  MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples , 2017, ArXiv.

[102]  Andrew Y. Ng,et al.  CheXNet: Radiologist-Level Pneumonia Detection on Chest X-Rays with Deep Learning , 2017, ArXiv.

[103]  Peter Szolovits,et al.  Clinical Intervention Prediction and Understanding with Deep Neural Networks , 2017, MLHC.

[104]  Sarvar Patel,et al.  Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..

[105]  Murat Kantarcioglu,et al.  SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors , 2017, CCS.

[106]  Sharmin Jahan,et al.  Securing Healthcare Data Using Biometric Authentication , 2017, ATCS/SePrIoT@SecureComm.

[107]  Corina S. Pasareanu,et al.  DeepSafe: A Data-driven Approach for Checking Adversarial Robustness in Neural Networks , 2017, ArXiv.

[108]  Dejing Dou,et al.  Adaptive Laplace Mechanism: Differential Privacy Preservation in Deep Learning , 2017, 2017 IEEE International Conference on Data Mining (ICDM).

[109]  Ben Glocker,et al.  Semi-supervised Learning for Network-Based Cardiac MR Image Segmentation , 2017, MICCAI.

[110]  Lukasz Wieclaw,et al.  Biometrie identification from raw ECG signal using deep learning techniques , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).

[111]  Christoph Meinel,et al.  Deep Learning for Medical Image Analysis , 2018, Journal of Pathology Informatics.

[112]  Hongfei Lin,et al.  Deep Transfer Learning for Modality Classification of Medical Images , 2017, Inf..

[113]  Dina Fine Maron The Computer Will See You Now. , 2017, Scientific American.

[114]  Zoubin Ghahramani,et al.  Adversarial Examples, Uncertainty, and Transfer Testing Robustness in Gaussian Process Hybrid Deep Networks , 2017, 1707.02476.

[115]  Dawn Xiaodong Song,et al.  Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong , 2017, ArXiv.

[116]  Bernhard Schölkopf,et al.  Avoiding Discrimination through Causal Reasoning , 2017, NIPS.

[117]  Payman Mohassel,et al.  SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[118]  David Wagner,et al.  Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods , 2017, AISec@CCS.

[119]  Xiaoxia Liu,et al.  Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM , 2017, IEEE Journal of Biomedical and Health Informatics.

[120]  J. Kai,et al.  Can machine-learning improve cardiovascular risk prediction using routine clinical data? , 2017, PloS one.

[121]  David A. Forsyth,et al.  SafetyNet: Detecting and Rejecting Adversarial Examples Robustly , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[122]  Marc Niethammer,et al.  Quicksilver: Fast predictive image registration – A deep learning approach , 2017, NeuroImage.

[123]  Suchi Saria,et al.  Reliable Decision Support using Counterfactual Models , 2017, NIPS.

[124]  Suchi Saria,et al.  What-If Reasoning with Counterfactual Gaussian Processes , 2017, NIPS 2017.

[125]  Muhammad Awais,et al.  Medical image retrieval using deep convolutional neural network , 2017, Neurocomputing.

[126]  Angshul Majumdar,et al.  RODEO: Robust DE-aliasing autoencOder for real-time medical image reconstruction , 2017, Pattern Recognit..

[127]  Daniel Rueckert,et al.  A Deep Cascade of Convolutional Neural Networks for MR Image Reconstruction , 2017, IPMI.

[128]  Nico Karssemeijer,et al.  Transfer Learning for Domain Adaptation in MRI: Application in Brain Lesion Segmentation , 2017, MICCAI.

[129]  Beilun Wang,et al.  DeepCloak: Masking Deep Neural Network Models for Robustness Against Adversarial Samples , 2017, ICLR.

[130]  Jan Hendrik Metzen,et al.  On Detecting Adversarial Perturbations , 2017, ICLR.

[131]  Mykel J. Kochenderfer,et al.  Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.

[132]  Sebastian Thrun,et al.  Dermatologist-level classification of skin cancer with deep neural networks , 2017, Nature.

[133]  Iain Buchan,et al.  Disaggregating asthma: Big investigation versus big data , 2017, The Journal of allergy and clinical immunology.

[134]  Feng Lin,et al.  Low-Dose CT With a Residual Encoder-Decoder Convolutional Neural Network , 2017, IEEE Transactions on Medical Imaging.

[135]  Maruf Pasha,et al.  Survey of Machine Learning Algorithms for Disease Diagnostic , 2017 .

[136]  Dwarikanath Mahapatra,et al.  Semi-supervised learning and graph cuts for consensus based medical image segmentation , 2016, Pattern Recognit..

[137]  Samy Bengio,et al.  Adversarial examples in the physical world , 2016, ICLR.

[138]  Blaise Agüera y Arcas,et al.  Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.

[139]  Ananthram Swami,et al.  Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.

[140]  Christopher Joseph Pal,et al.  Brain tumor segmentation with Deep Neural Networks , 2015, Medical Image Anal..

[141]  Subhashini Venugopalan,et al.  Development and Validation of a Deep Learning Algorithm for Detection of Diabetic Retinopathy in Retinal Fundus Photographs. , 2016, JAMA.

[142]  Jia Chen,et al.  A Collaborative Privacy-Preserving Deep Learning System in Distributed Mobile Environment , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).

[143]  Michael P. Wellman,et al.  Towards the Science of Security and Privacy in Machine Learning , 2016, ArXiv.

[144]  Christian Wachinger,et al.  Domain adaptation for Alzheimer's disease diagnostics , 2016, NeuroImage.

[145]  Ya Zhang,et al.  A Machine Learning-based Framework to Identify Type 2 Diabetes through Electronic Health Records , 2016, bioRxiv.

[146]  Joseph Antony,et al.  Quantifying radiographic knee osteoarthritis severity using deep convolutional neural networks , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).

[147]  Lovedeep Gondara,et al.  Medical Image Denoising Using Convolutional Denoising Autoencoders , 2016, 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW).

[148]  Sebastian Nowozin,et al.  Oblivious Multi-Party Machine Learning on Trusted Processors , 2016, USENIX Security Symposium.

[149]  Ian Goodfellow,et al.  Deep Learning with Differential Privacy , 2016, CCS.

[150]  Seyed-Ahmad Ahmadi,et al.  V-Net: Fully Convolutional Neural Networks for Volumetric Medical Image Segmentation , 2016, 2016 Fourth International Conference on 3D Vision (3DV).

[151]  Gianpiero Costantino,et al.  Practical Privacy-Preserving Medical Diagnosis Using Homomorphic Encryption , 2016, 2016 IEEE 9th International Conference on Cloud Computing (CLOUD).

[152]  Vasu Jindal,et al.  Integrating Mobile and Cloud for PPG Signal Selection to Monitor Heart Rate during Intensive Physical Exercise , 2016, 2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft).

[153]  David Sontag,et al.  Electronic medical record phenotyping using the anchor and learn framework , 2016, J. Am. Medical Informatics Assoc..

[154]  Edward Kim,et al.  A deep semantic mobile application for thyroid cytopathology , 2016, SPIE Medical Imaging.

[155]  Ahmed Atwan,et al.  Current trends in medical image registration and fusion , 2016 .

[156]  Marios Anthimopoulos,et al.  Lung Pattern Classification for Interstitial Lung Diseases Using a Deep Convolutional Neural Network , 2016, IEEE Transactions on Medical Imaging.

[157]  Carlos Guestrin,et al.  "Why Should I Trust You?": Explaining the Predictions of Any Classifier , 2016, ArXiv.

[158]  Paul Barford,et al.  Data Poisoning Attacks against Autoregressive Models , 2016, AAAI.

[159]  N. Rajpoot,et al.  Locality Sensitive Deep Learning for Detection and Classification of Nuclei in Routine Colon Cancer Histology Images , 2016, IEEE Trans. Medical Imaging.

[160]  Shu Liao,et al.  Multi-Instance Deep Learning: Discover Discriminative Local Anatomies for Bodypart Recognition , 2016, IEEE Transactions on Medical Imaging.

[161]  Demis Hassabis,et al.  Mastering the game of Go with deep neural networks and tree search , 2016, Nature.

[162]  Z. Jane Wang,et al.  A CNN Regression Approach for Real-Time 2D/3D Registration , 2016, IEEE Transactions on Medical Imaging.

[163]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[164]  Ananthram Swami,et al.  Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).

[165]  Kathleen C. Fraser,et al.  Linguistic Features Identify Alzheimer's Disease in Narrative Speech. , 2015, Journal of Alzheimer's disease : JAD.

[166]  Faicel Chamroukhi,et al.  Physical Human Activity Recognition Using Wearable Sensors , 2015, Sensors.

[167]  Anderson C. A. Nascimento,et al.  Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols , 2015, ProvSec.

[168]  Dale Schuurmans,et al.  Learning with a Strong Adversary , 2015, ArXiv.

[169]  Susmita Sur-Kolay,et al.  Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare , 2015, IEEE Journal of Biomedical and Health Informatics.

[170]  Somesh Jha,et al.  Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.

[171]  Johannes Gehrke,et al.  Intelligible Models for HealthCare: Predicting Pneumonia Risk and Hospital 30-day Readmission , 2015, KDD.

[172]  Alexander Binder,et al.  On Pixel-Wise Explanations for Non-Linear Classifier Decisions by Layer-Wise Relevance Propagation , 2015, PloS one.

[173]  Yoshimi Anzai,et al.  Toward Quantifying the Prevalence, Severity, and Cost Associated With Patient Motion During Clinical MR Examinations. , 2015, Journal of the American College of Radiology : JACR.

[174]  Wei Shen,et al.  Multi-scale Convolutional Neural Networks for Lung Nodule Classification , 2015, IPMI.

[175]  Jürgen Schmidhuber,et al.  Parallel Multi-Dimensional LSTM, With Application to Fast Biomedical Volumetric Image Segmentation , 2015, NIPS.

[176]  Renato Cesar Sato,et al.  Probabilistic graphic models applied to identification of diseases , 2015, Einstein.

[177]  Thomas Brox,et al.  U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.

[178]  Geoffrey E. Hinton,et al.  Distilling the Knowledge in a Neural Network , 2015, ArXiv.

[179]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[180]  Luca Rigazio,et al.  Towards Deep Neural Network Architectures Robust to Adversarial Examples , 2014, ICLR.

[181]  Shuicai Wu,et al.  A Computer-Aided Diagnosis Scheme For Detection Of Fatty Liver In Vivo Based On Ultrasound Kurtosis Imaging , 2015, Journal of Medical Systems.

[182]  Shafi Goldwasser,et al.  Machine Learning Classification over Encrypted Data , 2015, NDSS.

[183]  Pierre Zweigenbaum,et al.  Clinical Natural Language Processing in languages other than English: opportunities and challenges , 2018, Journal of Biomedical Semantics.

[184]  Yoshua Bengio,et al.  How transferable are features in deep neural networks? , 2014, NIPS.

[185]  Angel Cruz-Roa,et al.  Mitosis detection in breast cancer pathology images by combining handcrafted and convolutional neural network features , 2014, Journal of medical imaging.

[186]  Judith Strymish,et al.  Medicine's uncomfortable relationship with math: calculating positive predictive value. , 2014, JAMA internal medicine.

[187]  Xue-wen Chen,et al.  Big Data Deep Learning: Challenges and Perspectives , 2014, IEEE Access.

[188]  Marzyeh Ghassemi,et al.  Learning to Detect Vocal Hyperfunction From Ambulatory Neck-Surface Acceleration Features: Initial Results for Vocal Fold Nodules , 2014, IEEE Transactions on Biomedical Engineering.

[189]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[190]  Jennifer G. Robinson,et al.  Electronic health records based phenotyping in next-generation clinical trials: a perspective from the NIH Health Care Systems Collaboratory. , 2013, Journal of the American Medical Informatics Association : JAMIA.

[191]  Fabio Roli,et al.  Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.

[192]  Atul Kumar Pandey,et al.  DataMining Clustering Techniques in the Prediction of Heart Disease using Attribute Selection Method , 2013 .

[193]  Blaine Nelson,et al.  Poisoning Attacks against Support Vector Machines , 2012, ICML.

[194]  S. Brunak,et al.  Mining electronic health records: towards better research applications and clinical care , 2012, Nature Reviews Genetics.

[195]  John Shawe-Taylor,et al.  Extracting Diagnoses and Investigation Results from Unstructured Text in Electronic Health Records by Semi-Supervised Machine Learning , 2012, PloS one.

[196]  A. Jha,et al.  The promise of electronic records: around the corner or down the road? , 2011, JAMA.

[197]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[198]  W. Woodward,et al.  Variability of target and normal structure delineation for breast cancer radiotherapy: an RTOG Multi-Institutional and Multiobserver Study. , 2007, International journal of radiation oncology, biology, physics.

[199]  M. Lustig,et al.  Compressed Sensing MRI , 2008, IEEE Signal Processing Magazine.

[200]  Kunal Talwar,et al.  Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[201]  Kemal Polat,et al.  Prediction of hepatitis disease based on principal component analysis and artificial immune recognition system , 2007, Appl. Math. Comput..

[202]  David S. Wishart,et al.  Applications of Machine Learning in Cancer Prediction and Prognosis , 2006, Cancer informatics.

[203]  Vitaly Shmatikov,et al.  How To Break Anonymity of the Netflix Prize Dataset , 2006, ArXiv.

[204]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[205]  Stelvio Cimato,et al.  Encyclopedia of Cryptography and Security , 2005 .

[206]  Richard S. Sutton,et al.  Introduction to Reinforcement Learning , 1998 .

[207]  Anthony J. Pelosi,et al.  The computer will see you now. , 1996, Lancet.