CN116881954A - 一种基于对抗生成覆盖策略的医疗影像数据安全销毁方法 - Google Patents
一种基于对抗生成覆盖策略的医疗影像数据安全销毁方法 Download PDFInfo
- Publication number
- CN116881954A CN116881954A CN202311148620.5A CN202311148620A CN116881954A CN 116881954 A CN116881954 A CN 116881954A CN 202311148620 A CN202311148620 A CN 202311148620A CN 116881954 A CN116881954 A CN 116881954A
- Authority
- CN
- China
- Prior art keywords
- data
- attack
- destroyed
- image data
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 66
- 238000001514 detection method Methods 0.000 claims abstract description 75
- 230000006378 damage Effects 0.000 claims abstract description 46
- 238000011156 evaluation Methods 0.000 claims abstract description 18
- 238000012549 training Methods 0.000 claims abstract description 13
- 238000012795 verification Methods 0.000 claims abstract description 11
- 238000012544 monitoring process Methods 0.000 claims abstract description 10
- 241000254158 Lampyridae Species 0.000 claims description 24
- 230000006870 function Effects 0.000 claims description 14
- 238000005457 optimization Methods 0.000 claims description 12
- 238000004364 calculation method Methods 0.000 claims description 4
- 230000031700 light absorption Effects 0.000 claims description 3
- 238000012216 screening Methods 0.000 claims description 3
- 101150049349 setA gene Proteins 0.000 claims description 3
- 238000009827 uniform distribution Methods 0.000 claims description 3
- 239000010410 layer Substances 0.000 description 23
- 230000005540 biological transmission Effects 0.000 description 4
- 230000003902 lesion Effects 0.000 description 3
- 230000002159 abnormal effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000013256 Gubra-Amylin NASH model Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 239000002355 dual-layer Substances 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 210000004072 lung Anatomy 0.000 description 1
- 238000002844 melting Methods 0.000 description 1
- 230000008018 melting Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 230000002787 reinforcement Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/004—Artificial life, i.e. computing arrangements simulating life
- G06N3/006—Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/0475—Generative networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/094—Adversarial learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/74—Image or video pattern matching; Proximity measures in feature spaces
- G06V10/761—Proximity, similarity or dissimilarity measures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/10—Internal combustion engine [ICE] based vehicles
- Y02T10/40—Engine management systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Evolutionary Computation (AREA)
- Computer Hardware Design (AREA)
- Artificial Intelligence (AREA)
- Computer Security & Cryptography (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biomedical Technology (AREA)
- Biophysics (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Molecular Biology (AREA)
- Mathematical Physics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Multimedia (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311148620.5A CN116881954B (zh) | 2023-09-07 | 2023-09-07 | 一种基于对抗生成覆盖策略的医疗影像数据安全销毁方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311148620.5A CN116881954B (zh) | 2023-09-07 | 2023-09-07 | 一种基于对抗生成覆盖策略的医疗影像数据安全销毁方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116881954A true CN116881954A (zh) | 2023-10-13 |
CN116881954B CN116881954B (zh) | 2024-02-02 |
Family
ID=88255434
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311148620.5A Active CN116881954B (zh) | 2023-09-07 | 2023-09-07 | 一种基于对抗生成覆盖策略的医疗影像数据安全销毁方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116881954B (zh) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103023877A (zh) * | 2012-11-23 | 2013-04-03 | 江苏乐买到网络科技有限公司 | 公共云中的数据保护和强制自我销毁 |
KR101657496B1 (ko) * | 2015-10-08 | 2016-09-19 | (주)와우소프트 | 전자문서 및 출력문서의 파기관리 시스템 |
US20200143079A1 (en) * | 2018-11-07 | 2020-05-07 | Nec Laboratories America, Inc. | Privacy-preserving visual recognition via adversarial learning |
CN114329549A (zh) * | 2021-12-28 | 2022-04-12 | 上海交通大学 | 一种基于生成对抗网络的图像隐私保护方法及系统 |
CN114580024A (zh) * | 2022-03-10 | 2022-06-03 | 中国人民解放军陆军工程大学 | 一种基于虚拟目标攻击的图像隐私保护方法及其装置 |
CN115292728A (zh) * | 2022-07-15 | 2022-11-04 | 浙江大学 | 一种基于生成对抗网络的图像数据隐私保护方法 |
CN116579006A (zh) * | 2023-07-13 | 2023-08-11 | 北京中超伟业信息安全技术股份有限公司 | 一种关键数据销毁方法、系统及电子设备 |
US20230274003A1 (en) * | 2022-02-28 | 2023-08-31 | Accenture Global Solutions Limited | Identifying and correcting vulnerabilities in machine learning models |
-
2023
- 2023-09-07 CN CN202311148620.5A patent/CN116881954B/zh active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103023877A (zh) * | 2012-11-23 | 2013-04-03 | 江苏乐买到网络科技有限公司 | 公共云中的数据保护和强制自我销毁 |
KR101657496B1 (ko) * | 2015-10-08 | 2016-09-19 | (주)와우소프트 | 전자문서 및 출력문서의 파기관리 시스템 |
US20200143079A1 (en) * | 2018-11-07 | 2020-05-07 | Nec Laboratories America, Inc. | Privacy-preserving visual recognition via adversarial learning |
CN114329549A (zh) * | 2021-12-28 | 2022-04-12 | 上海交通大学 | 一种基于生成对抗网络的图像隐私保护方法及系统 |
US20230274003A1 (en) * | 2022-02-28 | 2023-08-31 | Accenture Global Solutions Limited | Identifying and correcting vulnerabilities in machine learning models |
CN114580024A (zh) * | 2022-03-10 | 2022-06-03 | 中国人民解放军陆军工程大学 | 一种基于虚拟目标攻击的图像隐私保护方法及其装置 |
CN115292728A (zh) * | 2022-07-15 | 2022-11-04 | 浙江大学 | 一种基于生成对抗网络的图像数据隐私保护方法 |
CN116579006A (zh) * | 2023-07-13 | 2023-08-11 | 北京中超伟业信息安全技术股份有限公司 | 一种关键数据销毁方法、系统及电子设备 |
Non-Patent Citations (2)
Title |
---|
王耀杰;钮可;杨晓元;: "基于生成对抗网络的图像隐藏方案", 信息网络安全, no. 05 * |
高媛;吴帆;秦品乐;王丽芳;: "生成对抗残差网络的医学图像融合算法", 计算机应用, no. 12 * |
Also Published As
Publication number | Publication date |
---|---|
CN116881954B (zh) | 2024-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahmed et al. | False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure | |
US20120151553A1 (en) | System, method, and apparatus for data cognition incorporating autonomous security protection | |
Makkar et al. | Secureiiot environment: Federated learning empowered approach for securing iiot from data breach | |
Gaurav et al. | A novel approach for DDoS attacks detection in COVID-19 scenario for small entrepreneurs | |
Christen et al. | A review of value-conflicts in cybersecurity: an assessment based on quantitative and qualitative literature analysis | |
Neshenko et al. | A survey of methods supporting cyber situational awareness in the context of smart cities | |
US20230351036A1 (en) | Data Analytics Privacy Platform with Quantified Re-Identification Risk | |
US20210243223A1 (en) | Aggregation and flow propagation of elements of cyber-risk in an enterprise | |
EP3887988A1 (en) | People-centric threat scoring | |
Pirozmand et al. | Intrusion Detection into Cloud‐Fog‐Based IoT Networks Using Game Theory | |
Seh et al. | Machine learning based framework for maintaining privacy of healthcare data | |
Susanto et al. | Digital ecosystem security issues for organizations and governments: Digital ethics and privacy | |
Huang et al. | Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records | |
US20230421582A1 (en) | Cybersecurity operations case triage groupings | |
Nhlabatsi et al. | Quantifying satisfaction of security requirements of cloud software systems | |
CN116881954B (zh) | 一种基于对抗生成覆盖策略的医疗影像数据安全销毁方法 | |
CN116192512A (zh) | 数据传输方法、装置、计算机设备和存储介质 | |
US12069072B2 (en) | Systems and methods for detecting malicious network traffic using multi-domain machine learning | |
Rathee et al. | A secure emotion aware intelligent system for Internet of healthcare | |
KR20210053844A (ko) | 인공지능형 개인 정보 보안 시스템의 서버 | |
DeLeon et al. | Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress) | |
Rajadorai et al. | Data Protection and Data Privacy Act for BIG DATA Governance | |
CN118138312B (zh) | 一种智能支付端口加密方法及系统 | |
Jayagopalan et al. | Intelligent privacy preserving deep learning model for securing IoT healthcare system in cloud storage. | |
KR20190062296A (ko) | 사례기반추론기술 및 블록체인방식을 적용한 인공지능형 개인 정보 보안 시스템 및 그것의 서버 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: No. 801-802, Floor 8, Building 2, Smart Valley Park, the Taihu Lake Software Industrial Park, No. 1463, Wuzhong Avenue, Yuexi Street, Suzhou Economic Development Zone, Jiangsu Province, 215000 Applicant after: Suzhou Huiruikang Intelligent Technology Co.,Ltd. Applicant after: XUZHOU MEDICAL University Address before: 221000 No. 209 Tongshan Road, Yunlong District, Xuzhou City, Jiangsu Province Applicant before: XUZHOU MEDICAL University Applicant before: Suzhou Huiruikang Intelligent Technology Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |