Proceedings of the ACM Turing Celebration Conference - China 2020
DOI: 10.1145/3393527.3393535
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving collaborative machine learning on genomic data using TensorFlow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…An example of how SMPC protocols and SMPC-supporting machine learning libraries can be used is shown in the study by Hong et al [ 284 ], which used TF Encrypted to train a classifier on 2 genomic data sets, each containing a large number of features (12,634 and 17,814 features per sample), to detect tumors as part of the iDASH challenge. This task had an additional challenge because the 2 data sets were heavily imbalanced, but common countermeasures to this are difficult to implement in an SMPC framework.…”
Section: Resultsmentioning
confidence: 99%
“…An example of how SMPC protocols and SMPC-supporting machine learning libraries can be used is shown in the study by Hong et al [ 284 ], which used TF Encrypted to train a classifier on 2 genomic data sets, each containing a large number of features (12,634 and 17,814 features per sample), to detect tumors as part of the iDASH challenge. This task had an additional challenge because the 2 data sets were heavily imbalanced, but common countermeasures to this are difficult to implement in an SMPC framework.…”
Section: Resultsmentioning
confidence: 99%
“…[6,35,4,7,24] developed new protocols based on arithmetic and boolean sharing under 3-server or 4server settings and claimed to outperform previous methods. Open-sourced PPML libraries, such as CryptFlow [25], TF-Encrypted [20], and Crypten [23] are also based on the semihonest 3-servers setting where a certain party is usually used to generate Beaver triples.…”
Section: Cryptographic Methodsmentioning
confidence: 99%
“…Here we describe an example of shifting error. Let = 64, = 20, is a result of multiplication before shifting, and 20 . Clearly, the desired product is (2 63 + 2 20 ) × 2 mod 2 64 2 20 = 2 (since it is performed on integer ring ℤ 2 64 ).…”
Section: Fixed-point Arithmeticmentioning
confidence: 99%
See 1 more Smart Citation
“…Although so many solutions have been proposed to solve the imbalanced data sets problem, the privacy-preserving issue has not been well resolved. To the best of our knowledge, Hong et al [25] proposed a secure collaborative machine-learning solution in which they used secure multiparty computation to adjust the class weight for the imbalanced dataset. at is, the privacy-preserving issue of the imbalanced dataset was tackled at the machine-learning algorithm level.…”
Section: Introductionmentioning
confidence: 99%