2022 International Joint Conference on Neural Networks (IJCNN) 2022
DOI: 10.1109/ijcnn55064.2022.9892823
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving time series prediction with temporal convolutional neural networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…PINPOINT, a temporal convolutional neural network, was developed by Falcetta et al [116] to predict time series while maintaining anonymity. It is suggested to use a cloud-based forecasting system with integrated homomorphic encryption and temporal CNN.…”
Section: Encryption Algorithms For Deep Learning-based Medical Image ...mentioning
confidence: 99%
See 1 more Smart Citation
“…PINPOINT, a temporal convolutional neural network, was developed by Falcetta et al [116] to predict time series while maintaining anonymity. It is suggested to use a cloud-based forecasting system with integrated homomorphic encryption and temporal CNN.…”
Section: Encryption Algorithms For Deep Learning-based Medical Image ...mentioning
confidence: 99%
“…The efficacy of deep learningbased medical image analysis is demonstrated by a variety of recently published literature [12,[37][38][39][40][41]49,[49][50][51][52][53][54][55][56][57][58][59][60][61][62]64,64,65,[157][158][159]. In the literature, several deep learning architectures have been described to handle various imaging modalities and tasks related to medical image processing with different components of encryption or cryptography [107,110,[112][113][114][115][116]123,124,135,136,140,141,144,[147][148][149][150][151]160,161]. ...…”
Section: Various Deep Learning Architectures With Security Features F...mentioning
confidence: 99%
“…10: Comparison of forecasting results between 8 models 0.83 (km/h), corresponding to n = 256 and n = 512, respectively. This is a remarkable improvement compared to previous studies [17], [19] that did not consider the data decomposition stage. This demonstrates the effectiveness of using data decomposition techniques such as EEMD in the forecasting process.…”
Section: B Combinationmentioning
confidence: 66%
“…On the other hand, working with big data has its own set of challenges, as discussed in studies [14]- [16]. Data leakage and targeted theft can occur, and therefore, post-quantum processing operations have been proposed and implemented [17]- [19]. These operations have shown significant effectiveness in increasing data security.…”
Section: Introductionmentioning
confidence: 99%