{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:44:04Z","timestamp":1774367044043,"version":"3.50.1"},"reference-count":71,"publisher":"Oxford University Press (OUP)","issue":"5","license":[{"start":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T00:00:00Z","timestamp":1588550400000},"content-version":"vor","delay-in-days":3,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000002","name":"US National Institutes of Health","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000002","name":"NIH","doi-asserted-by":"publisher","award":["OT3OD025462"],"award-info":[{"award-number":["OT3OD025462"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"NIH","doi-asserted-by":"publisher","award":["R00HG009680"],"award-info":[{"award-number":["R00HG009680"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"NIH","doi-asserted-by":"publisher","award":["R01HL136835"],"award-info":[{"award-number":["R01HL136835"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"NIH","doi-asserted-by":"publisher","award":["R01GM118609"],"award-info":[{"award-number":["R01GM118609"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"NIH","doi-asserted-by":"publisher","award":["U01EB023685"],"award-info":[{"award-number":["U01EB023685"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"name":"UCSD Academic Senate Research Grant","award":["RG084150"],"award-info":[{"award-number":["RG084150"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:sec>\n                  <jats:title>Objective<\/jats:title>\n                  <jats:p>Predicting patient outcomes using healthcare\/genomics data is an increasingly popular\/important area. However, some diseases are rare and require data from multiple institutions to construct generalizable models. To address institutional data protection policies, many distributed methods keep the data locally but rely on a central server for coordination, which introduces risks such as a single point of failure. We focus on providing an alternative based on a decentralized approach. We introduce the idea using blockchain technology for this purpose, with a brief description of its own potential advantages\/disadvantages.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Materials and Methods<\/jats:title>\n                  <jats:p>We explain how our proposed EXpectation Propagation LOgistic REgRession on Permissioned blockCHAIN (ExplorerChain) can achieve the same results when compared to a distributed model that uses a central server on 3 healthcare\/genomic datasets, and what trade-offs need to be considered when using centralized\/decentralized methods. We explain how the use of blockchain technology can help decrease some of the problems encountered in decentralized methods.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Results<\/jats:title>\n                  <jats:p>We showed that the discrimination power of ExplorerChain can be statistically similar to its counterpart central server-based algorithm. While ExplorerChain inherited some benefits of blockchain, it had a small increased running time.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Discussion<\/jats:title>\n                  <jats:p>ExplorerChain has the same prerequisites as a distributed model with a centralized server for coordination. In a manner similar to secure multi-party computation strategies, it assumes that participating institutions are honest, but \u201ccurious.\u201d<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Conclusion<\/jats:title>\n                  <jats:p>When evaluated on relatively small datasets, results suggest that ExplorerChain, which combines artificial intelligence and blockchain technologies, performs as well as a central server-based method, and may avoid some risks at the cost of efficiency.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1093\/jamia\/ocaa023","type":"journal-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T20:15:26Z","timestamp":1582661726000},"page":"747-756","source":"Crossref","is-referenced-by-count":54,"title":["EXpectation Propagation LOgistic REgRession on permissioned blockCHAIN (ExplorerChain): decentralized online healthcare\/genomics predictive model learning"],"prefix":"10.1093","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8728-4477","authenticated-orcid":false,"given":"Tsung-Ting","family":"Kuo","sequence":"first","affiliation":[{"name":"UCSD Health Department of Biomedical Informatics, University of California San Diego, La Jolla, California, USA"}]},{"given":"Rodney A","family":"Gabriel","sequence":"additional","affiliation":[{"name":"UCSD Health Department of Biomedical Informatics, University of California San Diego, La Jolla, California, USA"},{"name":"Department of Anesthesiology, University of California San Diego, San Diego, California, USA"}]},{"given":"Krishna R","family":"Cidambi","sequence":"additional","affiliation":[{"name":"Department of Orthopaedic Surgery, University of California at San Diego, San Diego, California, USA"}]},{"given":"Lucila","family":"Ohno-Machado","sequence":"additional","affiliation":[{"name":"UCSD Health Department of Biomedical Informatics, University of California San Diego, La Jolla, California, USA"},{"name":"Division of Health Services Research & Development, VA San Diego Healthcare System, San Diego, California, USA"}]}],"member":"286","published-online":{"date-parts":[[2020,5,2]]},"reference":[{"key":"2020110613094626000_ocaa023-B1","first-page":"SP44","article-title":"Optimizing health information technology\u2019s role in enabling comparative effectiveness research","volume":"16 (12 Suppl HIT","author":"Navathe","year":"2010","journal-title":"Am J Manag Care"},{"issue":"5","key":"2020110613094626000_ocaa023-B2","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1038\/nbt.1837","article-title":"Accelerated clinical discovery using self-reported patient data collected online and a patient-matching algorithm","volume":"29","author":"Wicks","year":"2011","journal-title":"Nat Biotechnol"},{"key":"2020110613094626000_ocaa023-B3","author":"Grossman","year":"2008"},{"key":"2020110613094626000_ocaa023-B4","author":"Rice","year":"2015"},{"key":"2020110613094626000_ocaa023-B5","author":"Vecchione"},{"issue":"3","key":"2020110613094626000_ocaa023-B6","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1136\/amiajnl-2011-000100","article-title":"A secure protocol for protecting the identity of providers when disclosing data for disease surveillance","volume":"18","author":"El Emam","year":"2011","journal-title":"J Am Med Inform Assoc"},{"issue":"3","key":"2020110613094626000_ocaa023-B7","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1136\/jamia.2009.002725","article-title":"The disclosure of diagnosis codes can breach research participants\u2019 privacy","volume":"17","author":"Loukides","year":"2010","journal-title":"J Am Med Inform Assoc"},{"issue":"2","key":"2020110613094626000_ocaa023-B8","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1517\/phgs.4.2.107.22625","article-title":"Privacy issues in personalized medicine","volume":"4","author":"Vaszar","year":"2003","journal-title":"Pharmacogenomics"},{"issue":"4","key":"2020110613094626000_ocaa023-B9","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1097\/00006216-200207000-00009","article-title":"The new HIPAA law on privacy and confidentiality","volume":"26","author":"Calloway","year":"2002","journal-title":"Nurs Adm Q"},{"issue":"5","key":"2020110613094626000_ocaa023-B10","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1136\/amiajnl-2012-000862","article-title":"Grid binary LOgistic REgression (GLORE): building shared models without sharing data","volume":"19","author":"Wu","year":"2012","journal-title":". J Am Med Inform Assoc"},{"issue":"3","key":"2020110613094626000_ocaa023-B11","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1016\/j.jbi.2013.03.008","article-title":"Expectation propagation logistic regression (explorer): distributed privacy-preserving online model learning","volume":"46","author":"Wang","year":"2013","journal-title":"J Biomed Inform"},{"key":"2020110613094626000_ocaa023-B12","first-page":"29","article-title":"WebGLORE: a web service for Grid LOgistic REgression","author":"Jiang","year":"2013","journal-title":"Bioinformatics"},{"issue":"S3","key":"2020110613094626000_ocaa023-B13","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1186\/s12911-016-0316-1","article-title":"Secure Multi-pArty computation grid LOgistic REgression (SMAC-GLORE)","volume":"16","author":"Shi","year":"2016","journal-title":"BMC Med Inform Decis Mak"},{"issue":"5","key":"2020110613094626000_ocaa023-B14","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1093\/jamia\/ocy180","article-title":"Fair compute loads enabled by blockchain: sharing models by alternating client and server roles","volume":"26","author":"Kuo","year":"2019","journal-title":"J Am Med Inform Assoc"},{"key":"2020110613094626000_ocaa023-B15","doi-asserted-by":"crossref","DOI":"10.1093\/jamia\/ocz214","article-title":"Privacy-preserving model learning on blockchain network-of-networks","author":"Kuo","year":"2020","journal-title":"J Am Med Inform Assoc"},{"key":"2020110613094626000_ocaa023-B16","author":"Kuo","year":"2018"},{"key":"2020110613094626000_ocaa023-B17","author":"Kuo"},{"key":"2020110613094626000_ocaa023-B18","first-page":"1178","author":"Chen"},{"key":"2020110613094626000_ocaa023-B19","author":"McConaghy","year":"2016"},{"key":"2020110613094626000_ocaa023-B20","first-page":"1","volume-title":"Research Handbook on Digital Transformations","author":"Pilkington","year":"2016"},{"key":"2020110613094626000_ocaa023-B21","author":"Xu"},{"issue":"6","key":"2020110613094626000_ocaa023-B22","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.1093\/jamia\/ocx068","article-title":"Blockchain distributed ledger technologies for biomedical and health care applications","volume":"24","author":"Kuo","year":"2017","journal-title":"J Am Med Inform Assoc"},{"key":"2020110613094626000_ocaa023-B23","author":"Luu","year":"2015"},{"key":"2020110613094626000_ocaa023-B24","first-page":"803","article-title":"A decentralized public key infrastructure with identity retention","volume":"2014","author":"Fromknecht","year":"2014","journal-title":"IACR Cryptol ePrint Arch"},{"key":"2020110613094626000_ocaa023-B25","author":"Bissias"},{"issue":"3","key":"2020110613094626000_ocaa023-B26","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1145\/357172.357176","article-title":"The Byzantine general\u2019s problem","volume":"4","author":"Lamport","year":"1982","journal-title":"ACM Trans Program Lang Syst"},{"key":"2020110613094626000_ocaa023-B27","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"International Workshop on Peer-to-Peer Systems","author":"Douceur","year":"2002"},{"key":"2020110613094626000_ocaa023-B28","author":"Greenspan","year":"2015"},{"key":"2020110613094626000_ocaa023-B29","author":"Nakamoto","year":"2008"},{"key":"2020110613094626000_ocaa023-B30","author":"Martin","year":"2019"},{"key":"2020110613094626000_ocaa023-B31","author":"Miller","year":"2014"},{"key":"2020110613094626000_ocaa023-B32","volume-title":"proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Garay"},{"key":"2020110613094626000_ocaa023-B33","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"2020110613094626000_ocaa023-B34","first-page":"1","author":"Abbas"},{"key":"2020110613094626000_ocaa023-B35","year":"2014"},{"key":"2020110613094626000_ocaa023-B36","author":"Meiklejohn"},{"key":"2020110613094626000_ocaa023-B37","first-page":"112","volume-title":"International Workshop on Open Problems in Network Security","author":"Vukoli\u0107"},{"issue":"3","key":"2020110613094626000_ocaa023-B38","first-page":"38","article-title":"Sharing ledgers for sharing economies: an exploration of mutual distributed ledgers (aka blockchain technology)","volume":"3","author":"Mainelli","year":"2015","journal-title":"J Financ Perspect"},{"key":"2020110613094626000_ocaa023-B39"},{"key":"2020110613094626000_ocaa023-B40"},{"key":"2020110613094626000_ocaa023-B41","author":"Buterin","year":"2014"},{"key":"2020110613094626000_ocaa023-B42","author":"Wood","year":"2014"},{"key":"2020110613094626000_ocaa023-B43"},{"key":"2020110613094626000_ocaa023-B44","year":"2019"},{"key":"2020110613094626000_ocaa023-B45"},{"issue":"5","key":"2020110613094626000_ocaa023-B46","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1093\/jamia\/ocy185","article-title":"Comparison of blockchain platforms: a systematic review and healthcare examples","volume":"26","author":"Kuo","year":"2019","journal-title":"J Am Med Inform Assoc"},{"issue":"SI","key":"2020110613094626000_ocaa023-B47","doi-asserted-by":"crossref","first-page":"2508","DOI":"10.1109\/TIT.2006.874516","article-title":"Randomized gossip algorithms","volume":"14","author":"Boyd","year":"2006","journal-title":"IEEE Trans Inform Theory"},{"key":"2020110613094626000_ocaa023-B48","author":"Boyd"},{"issue":"1","key":"2020110613094626000_ocaa023-B49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/1300000014","article-title":"Gossip algorithms","volume":"3","author":"Shah","year":"2007","journal-title":"FNT Netw"},{"key":"2020110613094626000_ocaa023-B50","first-page":"27","author":"Fontenla-Romero","year":"2013"},{"issue":"2","key":"2020110613094626000_ocaa023-B51","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1561\/2200000018","article-title":"Online learning and online convex optimization","volume":"4","author":"Shalev-Shwartz","year":"2011","journal-title":"FNT Mach Learn"},{"issue":"11","key":"2020110613094626000_ocaa023-B52","doi-asserted-by":"crossref","first-page":"2483","DOI":"10.1109\/TKDE.2012.191","article-title":"Distributed autonomous online learning: Regrets and intrinsic privacy-preserving properties","volume":"25","author":"Yan","year":"2013","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"8","key":"2020110613094626000_ocaa023-B53","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1093\/oxfordjournals.eurheartj.a015035","article-title":"Early diagnosis of acute myocardial infarction using clinical and electrocardiographic data at presentation: Derivation and evaluation of logistic regression models","volume":"17","author":"Kennedy","year":"1996","journal-title":"Eur Heart J"},{"key":"2020110613094626000_ocaa023-B54","volume-title":"Statistical Evaluation of Diagnostic Performance: Topics in ROC Analysis","author":"Zou","year":"2011"},{"key":"2020110613094626000_ocaa023-B55","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.jclinane.2018.07.009","article-title":"Predicting patients requiring discharge to post-acute care facilities following primary total hip replacement: Does anesthesia type play a role?","volume":"51","author":"Sharma","year":"2018","journal-title":"J Clin Anesth"},{"issue":"5","key":"2020110613094626000_ocaa023-B56","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1213\/ANE.0000000000001827","article-title":"A predictive model for extended postanesthesia care unit length of stay in outpatient surgeries","volume":"124","author":"Gabriel","year":"2017","journal-title":"Anesth Analg"},{"issue":"2","key":"2020110613094626000_ocaa023-B57","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1136\/jamia.2009.000026","article-title":"Evaluating re-identification risks with respect to the HIPAA privacy rule","volume":"17","author":"Benitez","year":"2010","journal-title":"J Am Med Inform Assoc"},{"issue":"12","key":"2020110613094626000_ocaa023-B58","doi-asserted-by":"crossref","first-page":"e28071","DOI":"10.1371\/journal.pone.0028071","article-title":"A systematic review of re-identification attacks on health data","volume":"6","author":"El Emam","year":"2011","journal-title":"PLoS One"},{"issue":"2","key":"2020110613094626000_ocaa023-B59","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1197\/jamia.M2902","article-title":"Evaluating predictors of geographic area population size cut-offs to manage re-identification risk","volume":"16","author":"El Emam","year":"2009","journal-title":"J Am Med Inform Assoc"},{"issue":"8 0 3","key":"2020110613094626000_ocaa023-B60","doi-asserted-by":"crossref","first-page":"S58","DOI":"10.1097\/MLR.0b013e31829b1d10","article-title":"Privacy technology to support data sharing for comparative effectiveness research: A systematic review","volume":"51","author":"Jiang","year":"2013","journal-title":"Med Care"},{"issue":"1","key":"2020110613094626000_ocaa023-B61","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1136\/amiajnl-2012-001032","article-title":"SHARE: System design and case studies for statistical health information release","volume":"20","author":"Gardner","year":"2013","journal-title":"J Am Med Inform Assoc"},{"issue":"4","key":"2020110613094626000_ocaa023-B62","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/572260.572261","article-title":"Privacy of medical records: IT implications of HIPAA","volume":"30","author":"Baumer","year":"2000","journal-title":"Sigcas Comput Soc"},{"issue":"1","key":"2020110613094626000_ocaa023-B63","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1136\/amiajnl-2012-000936","article-title":"Building public trust in uses of Health Insurance Portability and Accountability Act de-identified data","volume":"20","author":"McGraw","year":"2013","journal-title":"J Am Med Inform Assoc"},{"key":"2020110613094626000_ocaa023-B64","doi-asserted-by":"crossref","first-page":"S66","DOI":"10.1097\/MLR.0b013e31829b1d9f","article-title":"Development of a privacy and security policy framework for a multistate comparative effectiveness research network","volume":"51","author":"Kim","year":"2013","journal-title":"Med Care"},{"issue":"2","key":"2020110613094626000_ocaa023-B65","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1136\/amiajnl-2011-000538","article-title":"iDASH. Integrating data for analysis, anonymization, and sharing","volume":"19","author":"Ohno-Machado","year":"2012","journal-title":"J Am Med Inform Assoc"},{"issue":"165","key":"2020110613094626000_ocaa023-B66","doi-asserted-by":"crossref","first-page":"165cm15","DOI":"10.1126\/scitranslmed.3004454","article-title":"To share or not to share: That is not the question","volume":"4","author":"Ohno-Machado","year":"2012","journal-title":"Sci Transl Med"},{"issue":"5","key":"2020110613094626000_ocaa023-B67","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1016\/j.jbi.2005.02.008","article-title":"The use of receiver operating characteristic curves in biomedical informatics","volume":"38","author":"Lasko","year":"2005","journal-title":"J Biomed Inform"},{"issue":"1","key":"2020110613094626000_ocaa023-B68","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1148\/radiology.143.1.7063747","article-title":"The meaning and use of the area under a receiver operating characteristic (ROC) curve","volume":"143","author":"Hanley","year":"1982","journal-title":"Radiology"},{"key":"2020110613094626000_ocaa023-B69","author":"Bauerle"},{"key":"2020110613094626000_ocaa023-B70","author":"Meunier","year":"2016"},{"issue":"5","key":"2020110613094626000_ocaa023-B71","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1097\/NOR.0b013e31826649b6","article-title":"The American joint replacement registry","volume":"31","author":"Smith","year":"2012","journal-title":"Orthop Nurs"}],"container-title":["Journal of the American Medical Informatics Association"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/jamia\/article-pdf\/27\/5\/747\/34152560\/ocaa023.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/jamia\/article-pdf\/27\/5\/747\/34152560\/ocaa023.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T19:29:12Z","timestamp":1604690952000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jamia\/article\/27\/5\/747\/5828203"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,1]]},"references-count":71,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2020,5,2]]},"published-print":{"date-parts":[[2020,5,1]]}},"URL":"https:\/\/doi.org\/10.1093\/jamia\/ocaa023","relation":{},"ISSN":["1527-974X"],"issn-type":[{"value":"1527-974X","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2020,5]]},"published":{"date-parts":[[2020,5,1]]}}}