{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T14:06:17Z","timestamp":1772633177911,"version":"3.50.1"},"reference-count":137,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/tps-isa67132.2025.00067","type":"proceedings-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:50:15Z","timestamp":1772571015000},"page":"551-560","source":"Crossref","is-referenced-by-count":0,"title":["Privacy at Scale in Networked Healthcare"],"prefix":"10.1109","author":[{"given":"M. Amin","family":"Rahimian","sequence":"first","affiliation":[{"name":"University of Pittsburgh,Industrial Engineering,Pittsburgh,PA,USA"}]},{"given":"Benjamin","family":"Panny","sequence":"additional","affiliation":[{"name":"University of Pittsburgh,Intelligent Systems Program,Pittsburgh,PA,USA"}]},{"given":"James B.D.","family":"Joshi","sequence":"additional","affiliation":[{"name":"University of Pittsburgh,Informatics &#x0026; Networked Systems,Pittsburgh,PA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.17226\/12458","article-title":"The value and importance of health information privacy","volume-title":"in Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research","author":"Nass","year":"2009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-021-01614-0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1126\/science.abb6936"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-023-06952-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-023-00979-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-024-03113-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-023-43095-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/nature21056"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ophtha.2017.02.008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-018-0268-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/s41575-022-00701-y"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/s43856-024-00535-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-024-02975-y"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-023-02391-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/537S49a"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-024-01030-x"},{"key":"ref17","first-page":"1077","article-title":"Privacy of digital health information","author":"Miller","year":"2022","journal-title":"Economics of Privacy"},{"key":"ref18","volume-title":"Regulation (EU) 2016\/679 (general data protection regulation)","year":"2016"},{"key":"ref19","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum","year":"2004","journal-title":"in Washington Law Review"},{"key":"ref20","volume-title":"Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence","year":"2023"},{"key":"ref21","article-title":"National strategy to advance privacy-preserving data sharing and analytics","volume-title":"Executive Office of the President, Tech. Rep.","year":"2023"},{"key":"ref22","volume-title":"National privacy research strategy","year":"2025"},{"key":"ref23","volume-title":"Federal cybersecurity research and development strategic plan","year":"2023"},{"key":"ref24","volume-title":"NIST AI Risk Management Framework (AI RMF 1.0)","year":"2023"},{"key":"ref25","volume-title":"Blueprint for an AI Bill of Rights: Making Automated Systems Work for the American People","year":"2022"},{"key":"ref26","volume-title":"NIST privacy framework: A tool for improving privacy through enterprise risk management","year":"2020"},{"key":"ref27","year":"2020","journal-title":"Final NIH policy for data management and sharing (NOT-OD-21\u2013013)"},{"key":"ref28","year":"2023","journal-title":"Reminder: NIH policy for data management and sharing effective on january 25, 2023 (NOT-OD-23\u2013053)"},{"key":"ref29","year":"2024","journal-title":"FTC finalizes changes to the health breach notification rule"},{"key":"ref30","year":"2024","journal-title":"Health breach notification rule - final rule (Apr. 25, 2024)"},{"key":"ref31","year":"2024","journal-title":"Health breach notification rule: The basics for business (updated July 2024)"},{"key":"ref32","article-title":"Health data, technology, and interoperability: Certification program updates, algorithm transparency, and information sharing (HTI-1) - final rule","year":"2024","journal-title":"Federal Register"},{"key":"ref33","year":"2024","journal-title":"HTI-1 final rule resources on predictive decision support and information sharing"},{"key":"ref34","year":"2025","journal-title":"Designated QHINs"},{"key":"ref35","year":"2025","journal-title":"HIPAA privacy rule to support reproductive health care privacy - final rule fact sheet"},{"key":"ref36","year":"2025","journal-title":"Purl v. HHS (N.D. Tex. June 18, 2025) - order vacating the reproductive health privacy rule"},{"key":"ref37","year":"2025","journal-title":"Us judge invalidates biden rule protecting privacy for abortions"},{"key":"ref38","year":"2024","journal-title":"Regulation (eu) 2024\/1689 - artificial intelligence act (official journal, 12 july 2024)"},{"key":"ref39","year":"2024","journal-title":"Impact of GDPR and privacy laws on clinical research"},{"key":"ref40","year":"2018","journal-title":"California civil code \u00a7 1798.140 - definitions (CCPA\/CPRA)"},{"key":"ref41","year":"2017","journal-title":"Biometric identifiers, chapter 19.375 RCW"},{"key":"ref42","year":"2023","journal-title":"Washington my health my data act, chapter 19.373 RCW"},{"key":"ref43","year":"2024","journal-title":"Illinois BIPA amendments (SB 2979, Aug. 2, 2024): Per-person damages and electronic consent"},{"key":"ref44","year":"2024","journal-title":"Texas AG announces $1.4b settlement with meta over biometric data practices"},{"key":"ref45","year":"2025","journal-title":"Google to pay 1.4b to Texas in biometric and data-privacy settlement"},{"key":"ref46","author":"Trade Commission","year":"2023","journal-title":"Commission policy statement on biometric information"},{"key":"ref47","year":"2024","journal-title":"Understanding \u2019sensitive covered data\u2019 under the APRA discussion draft"},{"key":"ref48","author":"Congress","year":"2025","journal-title":"Traveler privacy protection act of 2025 (S.1691) - bill text"},{"key":"ref49","article-title":"A face is exposed for AOL searcher no. 4417749","author":"Barbaro","year":"2006","journal-title":"The New York Times"},{"key":"ref50","article-title":"Only you, your doctor, and many others may know","volume":"2015092903","author":"Sweeney","year":"2015","journal-title":"Technology Science"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1111\/j.1748-720X.1997.tb01885.x"},{"key":"ref53","author":"Hallaj","year":"2025","journal-title":"Open Data Sharing in Clinical Research and Participants Privacy: Challenges and Opportunities in the Era of Artificial Intelligence"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242657"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1162\/99608f92.cb06b469"},{"key":"ref56","volume-title":"Learning statistics with privacy, aided by the flip of a coin","author":"Erlingsson","year":"2014"},{"key":"ref57","volume-title":"Learning with privacy at scale","year":"2017"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00101"},{"key":"ref59","article-title":"Designing the pilot release of Israel\u2019s national registry of live births: Reconciling privacy with accuracy and usability","volume-title":"USENIX Conference on Privacy Engineering Practice and Respect (PEPR)","author":"Hod","year":"2023"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref62","article-title":"Differentially private distributed inference","author":"Papachristou","year":"2025","journal-title":"medRxiv"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1080\/24725854.2024.2337068"},{"key":"ref64","author":"Liu","year":"2025","journal-title":"Seeding with differentially private network information"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.65109\/SZSM3714"},{"key":"ref66","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum","year":"2004","journal-title":"Washington Law Review"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3614407.3643702"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1038\/s41576-022-00455-y"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-023-00888-7"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-024-01076-x"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCOUTCOMES.118.005122"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2023.3269639"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1080\/24725854.2022.2157912"},{"key":"ref74","article-title":"Federated learning with formal differential privacy guarantees","volume-title":"Google AI Blog","author":"McMahan","year":"2022"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3127448"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0186-1"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s41666-020-00082-4"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3500240"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2697856"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-93030-0"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0094"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1093\/bioadv\/vbab004"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v5i1.629"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-05539-7"},{"key":"ref85","article-title":"Differential privacy-enabled federated learning for sensitive health data","volume-title":"NeurIPS ML4H Workshop","author":"Choudhury","year":"2019"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1918257117"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2304415120"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3771543"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2022.930741"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3600169"},{"key":"ref91","article-title":"Privacy odometers and filters: Pay-as-you-go composition","volume":"29","author":"Rogers","year":"2016","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_26"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.11"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocae229"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref96","first-page":"374","article-title":"Towards federated learning at scale: System design","volume-title":"Proceedings of machine learning and systems (MLSys)","volume":"1","author":"Bonawitz"},{"key":"ref97","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"in Artificial Intelligence and Statistics (AISTATS)","author":"McMahan","year":"2017"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-25972-y"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocab135"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.106848"},{"key":"ref101","volume-title":"Standardized data: The OMOP common data model (OHDSI)","year":"2020"},{"key":"ref102","volume-title":"PCORnet: The national patient-centered clinical research network","year":"2025"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1136\/bmjopen-2024-097449"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1510502113"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2014-002747"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1126\/science.1229566"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8467.2pd"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511519"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btz837"},{"key":"ref111","first-page":"8672","article-title":"One-shot differentially private top- $k$ selection","volume-title":"Proceedings of the 38th International Conference on Machine Learning","author":"Qiao"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2009522117"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-022-01347-1"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.vaccine.2011.06.080"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1002\/jia2.26244"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-73510-5"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-021-01056-1"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.2196\/37367"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1093\/ofid\/ofaa657"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(23)00136-8"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-025-09394-5"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.epidem.2020.100386"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-156-8-201204170-00001"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1097\/QAD.0000000000000460"},{"key":"ref125","first-page":"1","article-title":"Adopting AI in health care will be slow and difficult","volume":"10","author":"Kuan","year":"2019","journal-title":"Harvard Business Review"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare10101878"},{"key":"ref127","volume-title":"Standards for privacy of individually identifiable health information (hipaa privacy rule)","year":"2002"},{"key":"ref128","year":"2008","journal-title":"Genetic information nondiscrimination act of 2008 (GINA), public law 110\u2013233"},{"key":"ref129","volume-title":"Federal policy for the protection of human subjects (common rule), 45 CFR 46 (2018 requirements)","year":"2018"},{"key":"ref130","volume-title":"NIH policy for data management and sharing","year":"2023"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref132","first-page":"1633","article-title":"On adaptive attacks to adversarial example defenses","volume":"33","author":"Tramer","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref133","first-page":"931","article-title":"Descent-to-delete: Gradientbased methods for machine unlearning","volume-title":"in Algorithmic Learning Theory (ALT)","author":"Neel","year":"2021"},{"key":"ref134","first-page":"3518","article-title":"Making AI forget you: Data deletion in machine learning","volume":"32","author":"Ginart","year":"2019","journal-title":"in Advances in neural information processing systems (NeurIPS)"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref136","article-title":"Census TopDown: Differentially private data, incremental schemas, and consistency with public knowledge","author":"Abowd","year":"2019","journal-title":"US Census Bureau, Tech. Rep."},{"key":"ref137","article-title":"Privacy-preserving data sharing in practice (PDaSP), NSF 24\u2013585","year":"2024","journal-title":"National Science Foundation, Program Solicitation"}],"event":{"name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","location":"Pittsburgh, PA, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11410113\/11410157\/11410231.pdf?arnumber=11410231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T07:18:06Z","timestamp":1772608686000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11410231\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":137,"URL":"https:\/\/doi.org\/10.1109\/tps-isa67132.2025.00067","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}