{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:04:22Z","timestamp":1775912662159,"version":"3.50.1"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2018YFC0910401"],"award-info":[{"award-number":["2018YFC0910401"]}]},{"name":"National Key R&#x0026;D Program of China","award":["2018YFC0910404"],"award-info":[{"award-number":["2018YFC0910404"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61721003"],"award-info":[{"award-number":["61721003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11801301"],"award-info":[{"award-number":["11801301"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Comput. Biol. and Bioinf."],"published-print":{"date-parts":[[2021,1,1]]},"DOI":"10.1109\/tcbb.2019.2948985","type":"journal-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T19:54:41Z","timestamp":1571860481000},"page":"173-182","source":"Crossref","is-referenced-by-count":33,"title":["A Method for Generating Synthetic Electronic Medical Record Text"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4515-0198","authenticated-orcid":false,"given":"Jiaqi","family":"Guan","sequence":"first","affiliation":[{"name":"Department of Computer Science, Univeristy of Illinois Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Runzhe","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Biostatistics, Johns Hopkins University, Baltimore, MD, USA"}]},{"given":"Sheng","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering, Center for Statistical Science, Institute for Data Science, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9684-5643","authenticated-orcid":false,"given":"Xuegong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Automation, Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1230"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.2.270"},{"key":"ref12","first-page":"286","article-title":"Generating multi-label discrete patient records using generative adversarial networks","author":"choi","year":"2017","journal-title":"Proc Mach Learn Healthcare Conf"},{"key":"ref13","article-title":"Real-valued (medical) time series generation with recurrent conditional GANs","author":"esteban","year":"2017"},{"key":"ref14","article-title":"Generative adversarial networks for electronic health records: A framework for exploring and evaluating methods for predicting drug-induced laboratory test trajectories","author":"yahi","year":"2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2012.2186810"},{"key":"ref16","article-title":"Conditional generative adversarial nets","author":"mirza","year":"2014","journal-title":"Comput Sci"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref18","article-title":"Neural machine translation by jointly learning to align and translate","author":"bahdanau","year":"2014","journal-title":"Comput Sci"},{"key":"ref19","article-title":"Neural text generation: Past, present and beyond","author":"lu","year":"2018"},{"key":"ref4","first-page":"1171","article-title":"Scheduled sampling for sequence prediction with recurrent neural networks","author":"bengio","year":"2015","journal-title":"Proc Advances Neural Inf Process Syst"},{"key":"ref27","article-title":"Auto-encoding variational bayes","author":"kingma","year":"2013","journal-title":"arXiv 1312 6114"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-24797-2","author":"graves","year":"2012","journal-title":"Supervised Sequence Labelling with Recurrent Neural Networks"},{"key":"ref6","first-page":"2852","article-title":"SeqGAN: Sequence generative adversarial nets with policy gradient","author":"yu","year":"2017","journal-title":"Proc 31st AAAI Conf Artif Intell"},{"key":"ref5","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc Advances Neural Inf Process Syst"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0028071"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref1","article-title":"Privacy-preserving data publishing: A survey on recent developments","volume":"42","author":"wang","year":"2010","journal-title":"ACM Comput Surveys"},{"key":"ref20","article-title":"Maximum-likelihood augmented discrete generative adversarial networks","author":"che","year":"2017","journal-title":"arXiv preprint arXiv 1702 05983"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"mnih","year":"2015","journal-title":"Nature"},{"key":"ref21","article-title":"Long text generation via adversarial training with leaked information","author":"guo","year":"2018","journal-title":"Thirty-Second AAAI Conf Artif Intell"},{"key":"ref24","year":"2013"},{"key":"ref23","year":"2013"},{"key":"ref26","year":"2017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210080"}],"container-title":["IEEE\/ACM Transactions on Computational Biology and Bioinformatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8857\/9346082\/08880542.pdf?arnumber=8880542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T20:24:53Z","timestamp":1722457493000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8880542\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":27,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcbb.2019.2948985","relation":{},"ISSN":["1545-5963","1557-9964","2374-0043"],"issn-type":[{"value":"1545-5963","type":"print"},{"value":"1557-9964","type":"electronic"},{"value":"2374-0043","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,1]]}}}