2023
DOI: 10.1038/s42256-022-00601-5
|View full text |Cite
|
Sign up to set email alerts
|

Federated machine learning in data-protection-compliant research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…The results of the real-world microbiome data set are promising and show that FL might be an accelerator in microbiome research and the analysis of time-to-event microbiome data sets. Using FL combined with additive secret sharing, our approach can be currently considered GDPR compliant and, therefore, practically usable in real clinical time-to-event studies [ 12 ].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The results of the real-world microbiome data set are promising and show that FL might be an accelerator in microbiome research and the analysis of time-to-event microbiome data sets. Using FL combined with additive secret sharing, our approach can be currently considered GDPR compliant and, therefore, practically usable in real clinical time-to-event studies [ 12 ].…”
Section: Discussionmentioning
confidence: 99%
“…Especially in combination with privacy-enhancing techniques (PETs), model parameters can be exchanged securely, such that a global aggregator or potential attacker cannot even see the local parameters of each participant [ 11 ]. This secure exchange of model parameters is necessary to comply with the GDPR, as even local models can be considered personal data [ 12 ]. Therefore, FL enables the training on a significantly larger data set compared with single-institution scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…Many of these techniques can be applied to differential models (19). To increase privacy, a layer of privacy mechanism such as differential privacy, hashing and cryptographic methods (6) over the models is applied while distributing the models (20)(21)(22)(23)(24)(25)(26). In our recent publication, we analysed multiple FL schemes based on ANN using electrocardiograms as the dataset (27).…”
Section: Related Workmentioning
confidence: 99%
“…By addressing software security risks, organizations can reduce the likelihood and impact of security breaches and safeguard their software assets. Some of the key aspects considered in software security include threat modeling [99]- [102], secure design and development [103], authentication and authorization [104], data protection [105], regular updates and patching [106], secure configuration and deployment, secure testing, incident response and recovery, user education and awareness, compliance and regulations.…”
Section: Ensuring Availability and Reliabilitymentioning
confidence: 99%