Evaluating Model Accuracy

A model has been pretrained on existing credit card fraud data. The model will have its accuracy evaluated by comparing the true outcomes to the predicted results.

Accuracy

Real Time Fraud Detection

By creating a data set with a single transaction we can evaluate whether or not this transaction is fraudulent by encrypting it and sending it to a third party to be evaluated using an encrypted logistic regression model.

Patient Action Recommendation

In this demonstration a group of patients are evaluated against a pre-trained neural network. With the patient data being protected and highly sensitive information sending this data to a third party would be a breach of confidentiality but by encrypting it before having it evaluated we can circumvent these restrictions and avoid a breach.

Predictions

These are the results produced by the analysis. The true patient outcome is the action the patient should have taken in retrospect. The predicted patient outcome is the action we predict the patient should take analysing the encrypted data without knowledge of the true outcome.

True Patient Outcome
Predicted Patient Outcome

Accuracy

Time Spent

Time taken for all predictions: 0s

Time taken for each individual prediction: 0s

Search an Encrypted Database

A database can be searched by encrypting both the dataset and the query and running a search for the encrypted query. This means that organisations can keep their data encrypted while preserving its usefulness without having to unencrypt it at the time of query thus exposing it to security risks.

Results

The of is

Time Spent

Time taken to encrypt the database: 0s

Time taken to encrypt the query: 0s

Time taken to perform the search: 0s

Time taken to decrypt the result: 0s

Searching an Encrypted Database

A database can be searched by encrypting both the dataset and the query and running a search for the encrypted query. This means that organisations can keep their data encrypted while preserving its usefulness without having to unencrypt it at the time of query thus exposing it to security risks.

Results

The of is

Time Spent

Time taken to encrypt the database: 0s

Time taken to encrypt the query: 0s

Time taken to perform the search: 0s

Time taken to decrypt the result: 0s