{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:16:12Z","timestamp":1775009772585,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T00:00:00Z","timestamp":1678406400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T00:00:00Z","timestamp":1678406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["npj Digit. Med."],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    While nearly all computational methods operate on pseudonymized personal data, re-identification remains a risk. With personal health data, this re-identification risk may be considered a double-crossing of patients\u2019 trust. Herein, we present a new method to generate synthetic data of individual granularity while holding on to patients\u2019 privacy. Developed for sensitive biomedical data, the method is patient-centric as it uses a local model to generate random new synthetic data, called an \u201cavatar data\u201d, for each initial sensitive individual. This method, compared with 2 other synthetic data generation techniques (Synthpop, CT-GAN), is applied to real health data with a clinical trial and a cancer observational study to evaluate the protection it provides while retaining the original statistical information. Compared to Synthpop and CT-GAN, the Avatar method shows a similar level of signal maintenance while allowing to compute additional privacy metrics. In the light of distance-based privacy metrics, each individual produces an avatar simulation that is on average indistinguishable from 12 other generated avatar simulations for the clinical trial and 24 for the observational study. Data transformation using the Avatar method both preserves, the evaluation of the treatment\u2019s effectiveness with similar hazard ratios for the clinical trial (original HR\u2009=\u20090.49 [95% CI, 0.39\u20130.63] vs. avatar HR\u2009=\u20090.40 [95% CI, 0.31\u20130.52]) and the classification properties for the observational study (original AUC\u2009=\u200999.46 (\n                    <jats:italic>s.e<\/jats:italic>\n                    . 0.25) vs. avatar AUC\u2009=\u200999.84 (\n                    <jats:italic>s.e<\/jats:italic>\n                    . 0.12)). Once validated by privacy metrics, anonymous synthetic data enable the creation of value from sensitive pseudonymized data analyses by tackling the risk of a privacy breach.\n                  <\/jats:p>","DOI":"10.1038\/s41746-023-00771-5","type":"journal-article","created":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T07:02:46Z","timestamp":1678431766000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["Patient-centric synthetic data generation, no reason to risk re-identification in biomedical data analysis"],"prefix":"10.1038","volume":"6","author":[{"given":"Morgan","family":"Guillaudeux","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5726-9620","authenticated-orcid":false,"given":"Olivia","family":"Rousseau","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4568-0188","authenticated-orcid":false,"given":"Julien","family":"Petot","sequence":"additional","affiliation":[]},{"given":"Zineb","family":"Bennis","sequence":"additional","affiliation":[]},{"given":"Charles-Axel","family":"Dein","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1019-9821","authenticated-orcid":false,"given":"Thomas","family":"Goronflot","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3767-6210","authenticated-orcid":false,"given":"Nicolas","family":"Vince","sequence":"additional","affiliation":[]},{"given":"Sophie","family":"Limou","sequence":"additional","affiliation":[]},{"given":"Matilde","family":"Karakachoff","sequence":"additional","affiliation":[]},{"given":"Matthieu","family":"Wargny","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1131-9554","authenticated-orcid":false,"given":"Pierre-Antoine","family":"Gourraud","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,10]]},"reference":[{"key":"771_CR1","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1016\/j.im.2016.07.004","volume":"53","author":"M Gupta","year":"2016","unstructured":"Gupta, M. & George, J. F. Toward the development of a big data analytics capability. Inf. Manag. 53, 1049\u20131064 (2016).","journal-title":"Inf. Manag."},{"key":"771_CR2","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-10933-3","volume":"10","author":"L Rocher","year":"2019","unstructured":"Rocher, L., Hendrickx, J. M. & de Montjoye, Y.-A. Estimating the success of re-identifications in incomplete datasets using generative models. Nat. Commun. 10, 3069 (2019).","journal-title":"Nat. Commun."},{"key":"771_CR3","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376","volume":"3","author":"Y-A de Montjoye","year":"2013","unstructured":"de Montjoye, Y.-A., Hidalgo, C. A., Verleysen, M. & Blondel, V. D. Unique in the Crowd: the privacy bounds of human mobility. Sci. Rep. 3, 1376 (2013).","journal-title":"Sci. Rep."},{"key":"771_CR4","doi-asserted-by":"crossref","unstructured":"Douriez, M., Doraiswamy, H., Freire, J. & Silva, C. T. Anonymizing NYC taxi data: does it matter? in 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA) 140\u2013148 (2016).","DOI":"10.1109\/DSAA.2016.21"},{"key":"771_CR5","doi-asserted-by":"publisher","unstructured":"Lavrenovs, A. & Podins, K. Privacy violations in Riga open data public transport system. in 1\u20136 https:\/\/doi.org\/10.1109\/AIEEE.2016.7821808 (2016).","DOI":"10.1109\/AIEEE.2016.7821808"},{"key":"771_CR6","unstructured":"I Know Where You Were Last Summer: London\u2019s public bike data is telling everyone where you\u2019ve been. I Know Where You Were Last Summer April 10th https:\/\/vartree.blogspot.com\/2014\/04\/i-know-where-you-were-last-summer.html (2014)."},{"key":"771_CR7","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TBDATA.2018.2871693","volume":"6","author":"D Kondor","year":"2020","unstructured":"Kondor, D., Hashemian, B., de Montjoye, Y.-A. & Ratti, C. Towards matching user mobility traces in large-scale datasets. IEEE Trans. Big Data 6, 714\u2013726 (2020).","journal-title":"IEEE Trans. Big Data"},{"key":"771_CR8","unstructured":"Hern, A. \u2018Anonymous\u2019 browsing data can be easily exposed, researchers reveal. (The Guardian, 2017)."},{"key":"771_CR9","unstructured":"Ohm, P. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. https:\/\/papers.ssrn.com\/abstract=1450006 (2009)."},{"key":"771_CR10","unstructured":"Narayanan, A. & Felten, E. W. No Silver Bullet: De-identification Still Doesn\u2019t Work. 8 July 9th. http:\/\/randomwalker.info\/publications\/no-silver-bullet-de-identification.pdf (2014)"},{"key":"771_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/15265161.2010.494215","volume":"10","author":"MA Rothstein","year":"2010","unstructured":"Rothstein, M. A. Is Deidentification sufficient to protect health privacy in research? Am. J. Bioeth. 10, 3\u201311 (2010).","journal-title":"Am. J. Bioeth."},{"key":"771_CR12","doi-asserted-by":"publisher","unstructured":"Culnane, C., Rubinstein, B. & Teague, V. Health Data in an Open World. arXiv, https:\/\/doi.org\/10.48550\/arxiv.1712.05627 (2017).","DOI":"10.48550\/arxiv.1712.05627"},{"key":"771_CR13","doi-asserted-by":"crossref","unstructured":"Barth-Jones, D. The \u2018Re-Identification\u2019 of Governor William Weld\u2019s Medical Information: A Critical Re-Examination of Health Data Identification Risks and Privacy Protections, Then and Now. https:\/\/papers.ssrn.com\/abstract=2076397 (2012).","DOI":"10.2139\/ssrn.2076397"},{"key":"771_CR14","doi-asserted-by":"publisher","first-page":"e26","DOI":"10.1016\/j.ijmedinf.2010.10.001","volume":"80","author":"S Haas","year":"2011","unstructured":"Haas, S., Wohlgemuth, S., Echizen, I., Sonehara, N. & M\u00fcller, G. Aspects of privacy for electronic health records. Int. J. Med. Inf. 80, e26\u2013e31 (2011).","journal-title":"Int. J. Med. Inf."},{"key":"771_CR15","unstructured":"Spence, N., Bhardwaj, N., Iii, D. P. P. & Coustasse, A. Ransomware in Healthcare Facilities: A Harbinger of the Future? 22 https:\/\/mds.marshall.edu\/ (2018)."},{"key":"771_CR16","unstructured":"European Data Board Protection. Opinion 05\/2014 on Anonymisation Techniques (European Data Board Protection, 2014)."},{"key":"771_CR17","unstructured":"GDPR. Recital 26 EU General Data Protection Regulation (EU-GDPR) https:\/\/www.privacy-regulation.eu\/en\/recital-26-GDPR.htm (GDPR, 2021)."},{"key":"771_CR18","doi-asserted-by":"publisher","unstructured":"Mivule, K. Utilizing Noise Addition for Data Privacy, an Overview. ArXiv abs\/1309.3958, https:\/\/doi.org\/10.48550\/arXiv.1309.3958 (2013).","DOI":"10.48550\/arXiv.1309.3958"},{"key":"771_CR19","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L. k-ANONYMITY: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10, 557\u2013570 (2002).","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"771_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J. & Venkitasubramaniam, M. L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1, 3\u2013es (2007).","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"771_CR21","doi-asserted-by":"crossref","unstructured":"Dwork, C. Differential Privacy. in Automata, Languages and Programming (eds. Bugliesi, M., Preneel, B., Sassone, V. & Wegener, I.) 1\u201312 (Springer, 2006).","DOI":"10.1007\/11787006_1"},{"key":"771_CR22","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1080\/19393555.2011.560923","volume":"20","author":"J Stapleton","year":"2011","unstructured":"Stapleton, J. & Poore, R. S. Tokenization and other methods of security for cardholder data. Inf. Secur. J. Glob. Perspect. 20, 91\u201399 (2011).","journal-title":"Inf. Secur. J. Glob. Perspect."},{"key":"771_CR23","doi-asserted-by":"crossref","unstructured":"McGraw-Hill Dictionary of Scientific and Technical Terms, Sybil P. Parker, Editor-in-Chief. 1994. McGraw-Hill, Inc. New York, NY. 2,242 pages. ISBN: 0-07-042333-4. $110.50. Bull. Sci. Technol. Soc. 16, 89\u201389 (1996).","DOI":"10.1177\/027046769601600199"},{"key":"771_CR24","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MSEC.2020.2992821","volume":"18","author":"K El Emam","year":"2020","unstructured":"El Emam, K. Seven ways to evaluate the utility of synthetic data. IEEE Secur. Priv. 18, 56\u201359 (2020).","journal-title":"IEEE Secur. Priv."},{"key":"771_CR25","unstructured":"Xu, L. Synthesizing Tabular Data Using Conditional GAN. (Massachusetts Institute of Technology, 2020)."},{"key":"771_CR26","unstructured":"Xu, L. & Veeramachaneni, K. Synthesizing tabular data using generative adversarial networks. https:\/\/arxiv.org\/abs\/1811.11264 (2018)."},{"key":"771_CR27","doi-asserted-by":"publisher","unstructured":"Xu, L., Skoularidou, M., Cuesta-Infante, A. & Veeramachaneni, K. Modeling tabular data using conditional GAN. https:\/\/doi.org\/10.48550\/arXiv.1907.00503 (2019).","DOI":"10.48550\/arXiv.1907.00503"},{"key":"771_CR28","unstructured":"Zhao, Z., Kunar, A., Van der Scheer, H., Birke, R. & Chen, L. Y. CTAB-GAN: effective table data synthesizing. https:\/\/arxiv.org\/abs\/2102.08369 (2021)."},{"key":"771_CR29","doi-asserted-by":"publisher","unstructured":"Indhumathi, R. & Devi, S. Healthcare Cram\u00e9r Generative Adversarial Network (HCGAN). Distrib. Parallel Databases https:\/\/doi.org\/10.1007\/s10619-021-07346-x (2021).","DOI":"10.1007\/s10619-021-07346-x"},{"key":"771_CR30","doi-asserted-by":"crossref","unstructured":"Nowok, B., Raab, G. M. & Dibben, C. Synthpop: bespoke creation of synthetic data in R. J. Stat. Softw. 74, 1\u201326 (2016).","DOI":"10.18637\/jss.v074.i11"},{"key":"771_CR31","first-page":"549","volume":"25","author":"J Young","year":"2009","unstructured":"Young, J., Graham, P. & Penny, R. Using Bayesian networks to create synthetic data. J. Stat. 25, 549\u2013567 (2009).","journal-title":"J. Stat."},{"key":"771_CR32","doi-asserted-by":"crossref","unstructured":"Patki, N., Wedge, R. & Veeramachaneni, K. The synthetic data vault. in 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA) 399\u2013410 (IEEE, 2016).","DOI":"10.1109\/DSAA.2016.49"},{"key":"771_CR33","doi-asserted-by":"publisher","first-page":"e043497","DOI":"10.1136\/bmjopen-2020-043497","volume":"11","author":"Z Azizi","year":"2021","unstructured":"Azizi, Z., Zheng, C., Mosquera, L., Pilote, L. & Emam, K. E. Can synthetic data be a proxy for real clinical trial data? A validation study. BMJ Open 11, e043497 (2021).","journal-title":"BMJ Open"},{"key":"771_CR34","doi-asserted-by":"publisher","first-page":"e23139","DOI":"10.2196\/23139","volume":"22","author":"KE Emam","year":"2020","unstructured":"Emam, K. E., Mosquera, L. & Bass, J. Evaluating identity disclosure risk in fully synthetic health data: model development and validation. J. Med. Internet Res. 22, e23139 (2020).","journal-title":"J. Med. Internet Res."},{"key":"771_CR35","doi-asserted-by":"publisher","first-page":"785","DOI":"10.3233\/SJI-150153","volume":"33","author":"B Nowok","year":"2017","unstructured":"Nowok, B., Raab, G. M. & Dibben, C. Providing bespoke synthetic data for the UK Longitudinal Studies and other sensitive data with the synthpop package for R1. Stat. J. IAOS 33, 785\u2013796 (2017).","journal-title":"Stat. J. IAOS"},{"key":"771_CR36","doi-asserted-by":"publisher","unstructured":"Liu, K. S., Xiao, C., Li, B. & Gao, J. Performing co-membership attacks against deep generative models. https:\/\/doi.org\/10.48550\/arxiv.1805.09898 (2018).","DOI":"10.48550\/arxiv.1805.09898"},{"key":"771_CR37","first-page":"93","volume":"52","author":"J Pag\u00e8s","year":"2004","unstructured":"Pag\u00e8s, J. Analyse factorielle de donn\u00e9es mixtes. Rev. Stat. Appl. 52, 93\u2013111 (2004).","journal-title":"Rev. Stat. Appl."},{"key":"771_CR38","doi-asserted-by":"publisher","first-page":"543","DOI":"10.3102\/00346543045004543","volume":"45","author":"CJ Huberty","year":"1975","unstructured":"Huberty, C. J. Discriminant analysis. Rev. Educ. Res. 45, 543\u2013598 (1975).","journal-title":"Rev. Educ. Res."},{"key":"771_CR39","first-page":"2579","volume":"9","author":"L Maaten","year":"2008","unstructured":"Maaten, L. & Hinton, G. Visualizing data using t-SNE. J. Mach. Learn. Res. 9, 2579\u20132605 (2008).","journal-title":"J. Mach. Learn. Res."},{"key":"771_CR40","unstructured":"Hinton, G. E. & Zemel, R. Autoencoders, minimum description length and Helmholtz free energy. in Advances in Neural Information Processing Systems 6 (Morgan-Kaufmann, 1994)."},{"key":"771_CR41","unstructured":"Carreira-Perpi\u00f1\u00e1n, M. \u00c1. A review of dimension reduction techniques. 69. Technical Report CS\u201396\u201309, (University of Sheffield, 1997)."},{"key":"771_CR42","doi-asserted-by":"crossref","unstructured":"Bennis, Z. & Gourraud, P.-A. Application of a novel Anonymization Method for Electrocardiogram data. in The 7th Annual International Conference on Arab Women in Computing in Conjunction with the 2nd Forum of Women in Research 1\u20135 (Association for Computing Machinery, 2021).","DOI":"10.1145\/3485557.3485581"},{"key":"771_CR43","doi-asserted-by":"publisher","first-page":"365","DOI":"10.2190\/3H2H-3XJN-3KAY-G9NY","volume":"10","author":"R Crawford","year":"1980","unstructured":"Crawford, R. Healthism and the medicalization of everyday life. Int. J. Health Serv. Plan. Adm. Eval. 10, 365\u2013388 (1980).","journal-title":"Int. J. Health Serv. Plan. Adm. Eval."},{"key":"771_CR44","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T. & Venkatasubramanian, S. t-Closeness: privacy beyond k-anonymity and l-diversity. in 2007 IEEE 23rd International Conference on Data Engineering 106\u2013115 (IEEE, 2007).","DOI":"10.1109\/ICDE.2007.367856"},{"key":"771_CR45","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1525\/bio.2009.59.5.9","volume":"59","author":"MJ Costello","year":"2009","unstructured":"Costello, M. J. Motivating online publication of data. BioScience 59, 418\u2013427 (2009).","journal-title":"BioScience"},{"key":"771_CR46","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1136\/jnnp-2020-324371","volume":"92","author":"O Rousseau","year":"2021","unstructured":"Rousseau, O. et al. Location of intracranial aneurysms is the main factor associated with rupture in the ICAN population. J. Neurol. Neurosurg. Psychiatry 92, 122\u2013128 (2021).","journal-title":"J. Neurol. Neurosurg. Psychiatry"},{"key":"771_CR47","first-page":"20150202","volume":"374","author":"IT Jolliffe","year":"2016","unstructured":"Jolliffe, I. T. & Cadima, J. Principal component analysis: a review and recent developments. Philos. Trans. R. Soc. Math. Phys. Eng. Sci. 374, 20150202 (2016).","journal-title":"Philos. Trans. R. Soc. Math. Phys. Eng. Sci."},{"key":"771_CR48","unstructured":"Husson, F., Le, S. & Pag\u00e8s J. Exploratory Multivariate Analysis by Example Using R-2nd edn-F. https:\/\/www.taylorfrancis.com\/books\/mono\/10.1201\/b21874\/exploratory-multivariate-analysis-example-usingfrancois-husson-sebastien-le-j%C3%A9r%C3%B4me-pag%C3%A8s (2017)."},{"key":"771_CR49","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","volume":"46","author":"NS Altman","year":"1992","unstructured":"Altman, N. S. An introduction to Kernel and nearest-neighbor nonparametric regression. Am. Stat. 46, 175\u2013185 (1992).","journal-title":"Am. Stat."},{"key":"771_CR50","doi-asserted-by":"crossref","unstructured":"Danopoulos, D., Kachris, C. & Soudris, D. Approximate similarity search with FAISS framework using FPGAs on the cloud. in Embedded Computer Systems: Architectures, Modeling, and Simulation (eds. Pnevmatikatos, D. N., Pelcat, M. & Jung, M.) 373\u2013386 (Springer International Publishing, 2019).","DOI":"10.1007\/978-3-030-27562-4_27"},{"key":"771_CR51","unstructured":"Nedelec, Y. & Breillacq, O. FR3091602 Proc\u00e9d\u00e9 de cr\u00e9ation d\u2019avatars pour prot\u00e9ger des donn\u00e9es sensibles. https:\/\/patentscope.wipo.int\/search\/es\/detail.jsf;jsessionid=3DB8F9DC11B6BEC17366AD391AF613E2.wapp1nB?docId=FR300140598&_cid=P11-KDKJV6-45661-28 (2019)."},{"key":"771_CR52","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/BF02834632","volume":"4","author":"GJ McLachlan","year":"1999","unstructured":"McLachlan, G. J. Mahalanobis distance. Resonance 4, 20\u201326 (1999).","journal-title":"Resonance"},{"key":"771_CR53","unstructured":"Truex, S., Liu, L., Gursoy, M. E., Yu, L. & Wei, W. Towards demystifying membership inference attacks. https:\/\/arxiv.org\/abs\/1807.09173 (2019)."},{"key":"771_CR54","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1056\/NEJM199610103351501","volume":"335","author":"SM Hammer","year":"1996","unstructured":"Hammer, S. M. et al. A trial comparing nucleoside monotherapy with combination therapy in HIV-infected adults with CD4 cell counts from 200 to 500 per cubic millimeter. N. Engl. J. Med. 335, 1081\u20131090 (1996).","journal-title":"N. Engl. J. Med."},{"key":"771_CR55","unstructured":"Wolberg, W. H. UCI Machine Learning Repository: Breast Cancer Wisconsin (Original) Data Set. https:\/\/archive.ics.uci.edu\/ml\/datasets\/breast+cancer+wisconsin+(original) (1992)."},{"key":"771_CR56","doi-asserted-by":"publisher","first-page":"3240","DOI":"10.1016\/j.eswa.2008.01.009","volume":"36","author":"MF Akay","year":"2009","unstructured":"Akay, M. F. Support vector machines combined with feature selection for breast cancer diagnosis. Expert Syst. Appl. 36, 3240\u20133247 (2009).","journal-title":"Expert Syst. Appl."},{"key":"771_CR57","unstructured":"Hello from Octopize Docs | Octopize Docs. https:\/\/docs.octopize.io\/ (2023)."}],"container-title":["npj Digital Medicine"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.nature.com\/articles\/s41746-023-00771-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s41746-023-00771-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s41746-023-00771-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:06:56Z","timestamp":1729037216000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.nature.com\/articles\/s41746-023-00771-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,10]]},"references-count":57,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["771"],"URL":"https:\/\/doi.org\/10.1038\/s41746-023-00771-5","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1674043\/v1","asserted-by":"object"}]},"ISSN":["2398-6352"],"issn-type":[{"value":"2398-6352","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,10]]},"assertion":[{"value":"31 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"M.G., J.P., C.A.D. are employees of Octopize. Z.B. is a former trainee at Octopize. P.A.G. is the founder of Methodomics (2008) and the co-founder of Big data Sant\u00e9 (2018). He consults for major pharmaceutical companies, and start-ups, all of which are handled through academic pipelines (AstraZeneca, Biogen, Boston Scientific, Cook, Docaposte, Edimark, Ellipses, Elsevier, Methodomics, Merck, M\u00e9rieux, Octopize, Sanofi-Genzyme). P.A.G. is a volunteer board member at AXA not-for-profit mutual insurance company (2021). He has no prescription activity with either drugs or devices.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"37"}}