Resources

Blockchain-orchestrated machine learning for privacy preserving federated learning in electronic health data

Abstract:

Machine learning and blockchain technology have been explored for potential applications in medicine with only modest success to date. Focus has shifted to exploring the intersection of these technologies along with other privacy preserving encryption techniques for better utility. 
End-to-end privacy preserving deep learning on multi-institutional medical imaging

Abstract:

Using large, multi-national datasets for high-performance medical imaging AI systems requires innovation in privacy-preserving machine learning so models can train on sensitive data without requiring data transfer. Here we present PriMIA (Privacy-preserving Medical Image Analysis), a free, open-source software framework for differentially private, securely aggregated federated learning and encrypted inference on medical imaging data.
A Taxonomy of Attacks on Federated Learning

Abstract:
Federated learning is a privacy-by-design framework that enables training deep neural networks from decentralized sources of data, but it is fraught with innumerable attack surfaces. We provide a taxonomy of recent attacks on federated learning systems and detail the need for more robust threat modeling in federated learning environments.

2CP: Decentralized Protocols to Transparently Evaluate Contributivity in Blockchain Federated Learning Environments

Abstract:
Federated Learning harnesses data from multiple sources to build a single model. While the initial model might belong solely to the actor bringing it to the network for training, determining the ownership of the trained model resulting from Federated Learning remains an open question. In this paper we explore how Blockchains (in particular Ethereum) can be used to determine the evolving ownership of a model trained with Federated Learning.

A Systematic Comparison of Encrypted Machine Learning Solutions for Image Classification
Abstract
This work provides a comprehensive review of existing frameworks based on secure computing techniques in the context of private image classification. The in-depth analysis of these approaches is followed by careful examination of their performance costs, in particular runtime and communication overhead.