Author:
Kotal Anantaa,Chukkapalli Sai Sree Laya,Joshi Anupam
Publisher
Springer International Publishing
Reference49 articles.
1. Shin, H., Roberts, K., Lu, L., Demner-Fushman, D., Yao, J., Summers, R.: Learning to read chest x-rays: Recurrent neural cascade model for automated image annotation. In: Proceedings Of The IEEE Conference On Computer Vision And Pattern Recognition, pp. 2497–2506 (2016)
2. Centers for Medicare & Medicaid Services The Health Insurance Portability and Accountability Act of 1996 (HIPAA) (Online at http://www.cms.hhs.gov/hipaa/, 1996)
3. Lindell, Y.: Secure multiparty computation. Commun. ACM. 64, 86–96 (2020). https://doi.org/10.1145/3387108
4. Konečný, J., McMahan, H., Yu, F., Richtarik, P., Suresh, A., Bacon, D.: Federated learning: strategies for improving communication efficiency. In: NIPS Workshop On Private Multi-Party Machine Learning (2016). https://arxiv.org/abs/1610.05492
5. Liu, K., Giannella, C., Kargupta, H.: A survey of attack techniques on privacy-preserving data perturbation methods. In: Privacy-Preserving Data Mining: Models And Algorithms, pp. 359–381 (2008). https://doi.org/10.1007/978-0-387-70992-5_15