2019
DOI: 10.1186/s12911-019-0867-z
|View full text |Cite
|
Sign up to set email alerts
|

A privacy-preserving distributed filtering framework for NLP artifacts

Abstract: Background Medical data sharing is a big challenge in biomedicine, which often hinders collaborative research. Due to privacy concerns, clinical notes cannot be directly shared. A lot of efforts have been dedicated to de-identifying clinical notes but it is still very challenging to accurately locate and scrub all sensitive elements from notes in an automatic manner. An alternative approach is to remove sentences that might contain sensitive terms related to personal information. Me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 34 publications
0
12
0
Order By: Relevance
“…During the process of random number generation, evaluating the amount of speckle randomness is highly significant for subsequent randomness extraction. The randomness of raw speckle images under different SLM configurations has been assessed by means of the min-entropy, which served as the conservative measure of randomness [47,48]. In our scenario, the min-entropy (E) of an 8-bit greyscale speckle image can be defined as follows…”
Section: Speckle Analysismentioning
confidence: 99%
“…During the process of random number generation, evaluating the amount of speckle randomness is highly significant for subsequent randomness extraction. The randomness of raw speckle images under different SLM configurations has been assessed by means of the min-entropy, which served as the conservative measure of randomness [47,48]. In our scenario, the min-entropy (E) of an 8-bit greyscale speckle image can be defined as follows…”
Section: Speckle Analysismentioning
confidence: 99%
“…Since manual de-identification approach is costly and time consuming, different techniques have been proposed to support automatic clinical text de-identification using traditional machine learning [11] and DL models [12]. However, automatically locating and scrubbing all sensitive information from clinical text is still highly challenging -deidentifying unstructured text in pathology reports is more challenging than structured data [13], and de-identification models trained on a specific dataset do not generalize well to other datasets [14]. Existing solutions typically cannot guarantee de-identification up to regulatory standards, especially with scattered PHI across the unstructured text of pathology reports; therefore, there is still need for alternative privacy-preserving methods to protect PHI and directly or indirectly share large corpora of pathology reports from various sources.…”
Section: Related Workmentioning
confidence: 99%
“…For example, as the industry is striving to automate ITO service delivery, NLP can help to improve the efficiency of collaboration among the client and service provider teams or to identify vulnerabilities in the software specification documentation produced by service provider organisations for their clients (Kang et al 2020;Zhang et al 2019). Similarly, NLP can be used to ensure privacy-preservation in multi-party ITO relationships (Sadat et al 2019). However, NLP comes with its own implications related to information security (Zhang et al 2019).…”
Section: Introductionmentioning
confidence: 99%
“…However, NLP comes with its own implications related to information security (Zhang et al 2019). The investigation of those implications is swiftly gaining the attention of researchers as the use of NLP for improving ITO experience results in information security vulnerabilities that are not yet fully understood (Alshemali and Kalita 2020;Feyisetan et al 2020;Sadat et al 2019;Winter and Rinderle-Ma 2018).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation