Secure and Robust Machine Learning for Healthcare: A Survey

被引:258
作者
Qayyum, Adnan [1 ]
Qadir, Junaid [1 ]
Bilal, Muhammad [2 ]
Al-Fuqaha, Ala [3 ]
机构
[1] Informat Technol Univ, Lahore 54000, Pakistan
[2] Univ West England, Bristol BS16 1QY, Avon, England
[3] HBKU, Doha 34110, Qatar
关键词
Robustness; Security; Medical diagnostic imaging; Diseases; Unsupervised learning; Adversarial ML; healthcare; privacy preserving ML; robust ML; secure ML; NEURAL-NETWORKS; DEEP; CLASSIFICATION; CANCER; PREDICTION; RECORDS; MODELS; CHALLENGES; FRAMEWORK; ATTACKS;
D O I
10.1109/RBME.2020.3013489
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Recent years have witnessed widespread adoption of machine learning (ML)/deep learning (DL) techniques due to their superior performance for a variety of healthcare applications ranging from the prediction of cardiac arrest from one-dimensional heart signals to computer-aided diagnosis (CADx) using multi-dimensional medical images. Notwithstanding the impressive performance of ML/DL, there are still lingering doubts regarding the robustness of ML/DL in healthcare settings (which is traditionally considered quite challenging due to the myriad security and privacy issues involved), especially in light of recent results that have shown that ML/DL are vulnerable to adversarial attacks. In this paper, we present an overview of various application areas in healthcare that leverage such techniques from security and privacy point of view and present associated challenges. In addition, we present potential methods to ensure secure and privacy-preserving ML for healthcare applications. Finally, we provide insight into the current research challenges and promising directions for future research.
引用
收藏
页码:156 / 180
页数:25
相关论文
共 208 条
[91]  
Latif S., 2018, AUTOMATING MOTION CO
[92]   Caveat Emptor The Risks of Using Big Data for Human Development [J].
Latif, Siddique ;
Qayyum, Adnan ;
Usama, Muhammad ;
Qadir, Junaid ;
Zwitter, Andrej ;
Shahzad, Muhammad .
IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2019, 38 (03) :82-90
[93]   How 5G wireless (and Concomitant Technologies) will revolutionize healthcare? [J].
Latif, Siddique ;
Qadir, Junaid ;
Farooq, Shahzad ;
Imran, Muhammad Ali .
Future Internet, 2017, 9 (04)
[94]   Beyond saliency: Understanding convolutional neural networks from saliency prediction on layer-wise relevance propagation [J].
Li, Heyi ;
Tian, Yunke ;
Mueller, Klaus ;
Chen, Xin .
IMAGE AND VISION COMPUTING, 2019, 83-84 :70-86
[95]   VARIABILITY OF TARGET AND NORMAL STRUCTURE DELINEATION FOR BREAST CANCER RADIOTHERAPY: AN RTOG MULTI-INSTITUTIONAL AND MULTIOBSERVER STUDY [J].
Li, X. Allen ;
Tai, An ;
Arthur, Douglas W. ;
Buchholz, Thomas A. ;
Macdonald, Shannon ;
Marks, Lawrence B. ;
Moran, Jean M. ;
Pierce, Lori J. ;
Rabinovitch, Rachel ;
Taghian, Alphonse ;
Vicini, Frank ;
Woodward, Wendy ;
White, Julia R. .
INTERNATIONAL JOURNAL OF RADIATION ONCOLOGY BIOLOGY PHYSICS, 2009, 73 (03) :944-951
[96]   A Learning and Masking Approach to Secure Learning [J].
Linh Nguyen ;
Wang, Sky ;
Sinha, Arunesh .
DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 :453-464
[97]  
Liu D., 2018, ARXIV181111400
[98]  
Liu MH, 2016, 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), P192, DOI [10.1109/CSCI.2016.42, 10.1109/CSCI.2016.0043]
[99]   SafetyNet: Detecting and Rejecting Adversarial Examples Robustly [J].
Lu, Jiajun ;
Issaranon, Theerasit ;
Forsyth, David .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, :446-454
[100]   Compressed sensing MRI [J].
Lustig, Michael ;
Donoho, David L. ;
Santos, Juan M. ;
Pauly, John M. .
IEEE SIGNAL PROCESSING MAGAZINE, 2008, 25 (02) :72-82