{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:31:23Z","timestamp":1765888283646,"version":"3.37.3"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T00:00:00Z","timestamp":1581379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T00:00:00Z","timestamp":1581379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:sec>\n                <jats:title>Background<\/jats:title>\n                <jats:p>Modern data driven medical research promises to provide new insights into the development and course of disease and to enable novel methods of clinical decision support. To realize this, machine learning models can be trained to make predictions from clinical, paraclinical and biomolecular data. In this process, privacy protection and regulatory requirements need careful consideration, as the resulting models may leak sensitive personal information. To counter this threat, a wide range of methods for integrating machine learning with formal methods of privacy protection have been proposed. However, there is a significant lack of practical tools to create and evaluate such privacy-preserving models. In this software article, we report on our ongoing efforts to bridge this gap.<\/jats:p>\n              <\/jats:sec><jats:sec>\n                <jats:title>Results<\/jats:title>\n                <jats:p>We have extended the well-known ARX anonymization tool for biomedical data with machine learning techniques to support the creation of privacy-preserving prediction models. Our methods are particularly well suited for applications in biomedicine, as they preserve the truthfulness of data (e.g. no noise is added) and they are intuitive and relatively easy to explain to non-experts. Moreover, our implementation is highly versatile, as it supports binomial and multinomial target variables, different types of prediction models and a wide range of privacy protection techniques. All methods have been integrated into a sound framework that supports the creation, evaluation and refinement of models through intuitive graphical user interfaces. To demonstrate the broad applicability of our solution, we present three case studies in which we created and evaluated different types of privacy-preserving prediction models for breast cancer diagnosis, diagnosis of acute inflammation of the urinary system and prediction of the contraceptive method used by women. In this process, we also used a wide range of different privacy models (k-anonymity, differential privacy and a game-theoretic approach) as well as different data transformation techniques.<\/jats:p>\n              <\/jats:sec><jats:sec>\n                <jats:title>Conclusions<\/jats:title>\n                <jats:p>With the tool presented in this article, accurate prediction models can be created that preserve the privacy of individuals represented in the training set in a variety of threat scenarios. Our implementation is available as open source software.<\/jats:p>\n              <\/jats:sec>","DOI":"10.1186\/s12911-020-1041-3","type":"journal-article","created":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T15:02:51Z","timestamp":1581433371000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A comprehensive tool for creating and evaluating privacy-preserving biomedical prediction models"],"prefix":"10.1186","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4871-0282","authenticated-orcid":false,"given":"Johanna","family":"Eicher","sequence":"first","affiliation":[]},{"given":"Raffael","family":"Bild","sequence":"additional","affiliation":[]},{"given":"Helmut","family":"Spengler","sequence":"additional","affiliation":[]},{"given":"Klaus A.","family":"Kuhn","sequence":"additional","affiliation":[]},{"given":"Fabian","family":"Prasser","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,11]]},"reference":[{"issue":"3","key":"1041_CR1","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1038\/nrclinonc.2010.227","volume":"8","author":"SH Friend","year":"2011","unstructured":"Hood L, Friend SH. Predictive, personalized, preventive, participatory (P4) cancer medicine. Nat Rev Clin oncol. 2011; 8(3):184.","journal-title":"Nat Rev Clin oncol"},{"issue":"23","key":"1041_CR2","doi-asserted-by":"publisher","first-page":"2161","DOI":"10.1056\/NEJMp1401111","volume":"370","author":"S Schneeweiss","year":"2014","unstructured":"Schneeweiss S. Learning from big health care data. N Engl J Med. 2014; 370(23):2161\u20133.","journal-title":"N Engl J Med"},{"issue":"1","key":"1041_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1038\/s41591-018-0316-z","volume":"25","author":"A Esteva","year":"2019","unstructured":"Esteva A, Robicquet A, Ramsundar B, Kuleshov V, DePristo M, Chou K, et al.A guide to deep learning in healthcare. Nat Med. 2019; 25(1):24.","journal-title":"Nat Med"},{"issue":"14","key":"1041_CR4","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.1001\/jama.2015.2252","volume":"313","author":"V Liu","year":"2015","unstructured":"Liu V, Musen MA, Chou T. Data breaches of protected health information in the United States. JAMA. 2015; 313(14):1471\u20133.","journal-title":"JAMA"},{"issue":"6","key":"1041_CR5","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1038\/nrg3208","volume":"13","author":"PB Jensen","year":"2012","unstructured":"Jensen PB, Jensen LJ, Brunak S. Mining electronic health records: towards better research applications and clinical care. Nat Rev Genet. 2012; 13(6):395\u2013405.","journal-title":"Nat Rev Genet"},{"issue":"1","key":"1041_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.2310\/JIM.0b013e3181c9b2ea","volume":"58","author":"B Malin","year":"2010","unstructured":"Malin B, Karp D, Scheuermann RH. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research. J Invest Med. 2010; 58(1):11\u201318.","journal-title":"J Invest Med"},{"key":"1041_CR7","volume-title":"Sharing Clinical Trial Data: Maximizing Benefits, Minimizing Risk","author":"K El Emam","year":"2015","unstructured":"El Emam K, Malin B. Appendix B: Concepts and Methods for De-identifying Clinical Trial Data. In: Sharing Clinical Trial Data: Maximizing Benefits, Minimizing Risk. Washington, DC: The National Academies Press: 2015."},{"issue":"6245","key":"1041_CR8","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1126\/science.aaa8415","volume":"349","author":"MI Jordan","year":"2015","unstructured":"Jordan MI, Mitchell TM. Machine learning: Trends, perspectives, and prospects. Science. 2015; 349(6245):255\u201360.","journal-title":"Science"},{"key":"1041_CR9","volume-title":"Proceedings of the 22nd ACM SIGSAC conference on computer and communications security","author":"R Shokri","year":"2015","unstructured":"Shokri R, Shmatikov V. Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. New York: ACM: 2015. p. 1310\u20131321."},{"issue":"2","key":"1041_CR10","doi-asserted-by":"publisher","first-page":"e12702","DOI":"10.2196\/12702","volume":"7","author":"FK Dankar","year":"2019","unstructured":"Dankar FK, Madathil N, Dankar SK, Boughorbel S. Privacy-Preserving Analysis of Distributed Biomedical Data: Designing Efficient and Secure Multiparty Computations Using Distributed Statistical Learning Theory. JMIR Med Inform. 2019; 7(2):e12702.","journal-title":"JMIR Med Inform"},{"key":"1041_CR11","doi-asserted-by":"publisher","unstructured":"Shokri R, Stronati M, Song C, Shmatikov V. Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE: 2017. https:\/\/doi.org\/10.1109\/sp.2017.41.","DOI":"10.1109\/sp.2017.41"},{"key":"1041_CR12","volume-title":"Anonymizing health data: Case studies and methods to get you started. 1st ed.","author":"K El Emam","year":"2013","unstructured":"El Emam K, Arbuckle L. Anonymizing health data: Case studies and methods to get you started. 1st ed.Sebastopol: O\u2019Reilly Media, Inc.; 2013."},{"issue":"5","key":"1041_CR13","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1093\/jamia\/ocv004","volume":"22","author":"W Xia","year":"2015","unstructured":"Xia W, Heatherly R, Ding X, Li J, Malin BA. R-U policy frontiers for health data de-identification. J Am Med Inform Assoc. 2015; 22(5):1029\u201341.","journal-title":"J Am Med Inform Assoc"},{"key":"1041_CR14","doi-asserted-by":"crossref","unstructured":"Narayanan A, Shmatikov V. Robust de-anonymization of large sparse datasets. In: Symposium on Security and Privacy. IEEE: 2008. p. 111\u2013125.","DOI":"10.1109\/SP.2008.33"},{"key":"1041_CR15","volume-title":"Computational disclosure control - A primer on data privacy protection","author":"L Sweeney","year":"2001","unstructured":"Sweeney L. Computational disclosure control - A primer on data privacy protection. Cambridge: Massachusetts Institute of Technology; 2001."},{"key":"1041_CR16","volume-title":"The Health Insurance Portability and Accountability Act (HIPAA)","author":"United States","year":"2004","unstructured":"United States. The Health Insurance Portability and Accountability Act (HIPAA). Washington: U.S. Dept. of Labor, Employee Benefits Security Administration; 2004."},{"key":"1041_CR17","first-page":"119","volume":"1","author":"EU General Data Protection Regulation","year":"2016","unstructured":"EU General Data Protection Regulation. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation). Off J Eur Union. 2016; 1:119.","journal-title":"Off J Eur Union"},{"key":"1041_CR18","doi-asserted-by":"publisher","unstructured":"Prasser F, Eicher J, Bild R, Spengler H, Kuhn KA. A Tool for Optimizing De-identified Health Data for Use in Statistical Classification. In: 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS). IEEE: 2017. https:\/\/doi.org\/10.1109\/cbms.2017.105.","DOI":"10.1109\/cbms.2017.105"},{"key":"1041_CR19","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-319-23633-9_6","volume-title":"Medical Data Privacy Handbook","author":"Fabian Prasser","year":"2015","unstructured":"Prasser F, Kohlmayer F. Putting statistical disclosure control into practice: The ARX data anonymization tool. In: Medical Data Privacy Handbook. Springer International Publishing: 2015. p. 111\u2013148. https:\/\/doi.org\/10.1007\/978-3-319-23633-9_6."},{"key":"1041_CR20","volume-title":"Data mining: Practical machine learning tools and techniques","author":"IH Witten","year":"2016","unstructured":"Witten IH, Eibe F. Data mining: Practical machine learning tools and techniques. San Francisco: Morgan Kaufmann; 2016."},{"issue":"1","key":"1041_CR21","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1186\/s12911-016-0287-2","volume":"16","author":"F Prasser","year":"2016","unstructured":"Prasser F, Kohlmayer F, Kuhn KA. Efficient and effective pruning strategies for health data de-identification. BMC Med Inform Decis Making. 2016; 16(1):49.","journal-title":"BMC Med Inform Decis Making"},{"key":"1041_CR22","unstructured":"ARX - Power Data Anonymization. http:\/\/arx.deidentifier.org\/. Accessed 21 June 2019."},{"key":"1041_CR23","volume-title":"Encyclopedia of Cryptography and Security","author":"C Dwork","year":"2011","unstructured":"Dwork C. Differential privacy. In: Encyclopedia of Cryptography and Security. Heidelberg: Springer: 2011. p. 338\u2013340."},{"issue":"1","key":"1041_CR24","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1515\/popets-2018-0004","volume":"2018","author":"R Bild","year":"2018","unstructured":"Bild R, Kuhn KA, Prasser F. SafePub: A Truthful Data Anonymization Algorithm With Strong Privacy Guarantees. Proc Priv Enhancing Technol. 2018; 2018(1):67\u201387.","journal-title":"Proc Priv Enhancing Technol"},{"issue":"3","key":"1041_CR25","doi-asserted-by":"publisher","first-page":"e0120592","DOI":"10.1371\/journal.pone.0120592","volume":"10","author":"Z Wan","year":"2015","unstructured":"Wan Z, Vorobeychik Y, Xia W, Clayton EW, Kantarcioglu M, Ganta R, et al.A game theoretic framework for analyzing re-identification risk. PloS One. 2015; 10(3):e0120592. Cambridge.","journal-title":"PloS One"},{"key":"1041_CR26","unstructured":"Prasser F, Gaupp J, Wan Z, Xia W, Vorobeychik Y, Kantarcioglu M, et al.An Open Source Tool for Game Theoretic Health Data De-Identification. In: AMIA Annual Symposium Proceedings. AMIA: 2017. Accepted for AMIA 2017 Annual Symposium (AMIA 2017)."},{"key":"1041_CR27","doi-asserted-by":"crossref","unstructured":"Iyengar VS. Transforming data to satisfy privacy constraints. In: International Conference on Knowledge Discovery and Data Mining. ACM: 2002. p. 279\u201388.","DOI":"10.1145\/775047.775089"},{"key":"1041_CR28","unstructured":"World Health Organization. International statistical classification of diseases and related health problems. 2016. https:\/\/www.who.int\/classifications\/icd\/en\/. Accessed 21 June 2019."},{"issue":"2","key":"1041_CR29","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1023\/A:1007413511361","volume":"29","author":"P Domingos","year":"1997","unstructured":"Domingos P, Pazzani M. On the optimality of the simple Bayesian classifier under zero-one loss. Mach Learn. 1997; 29(2):103\u2013130.","journal-title":"Mach Learn"},{"issue":"1","key":"1041_CR30","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L. Random forests. Mach Learn. 2001; 45(1):5\u201332.","journal-title":"Mach Learn"},{"key":"1041_CR31","unstructured":"Apache Software Foundation. Apache Mahout: Scalable machine-learning and data-mining library. 2011. http:\/\/mahout.apache.org\/. Accessed 21 June 2019."},{"key":"1041_CR32","unstructured":"Smile \u2013 Statistical Machine Intelligence and Learning Engine. https:\/\/haifengl.github.io\/smile\/. Accessed 21 June 2019."},{"key":"1041_CR33","volume-title":"Proceedings of the 13th International Joint Conference on Artifical Intelligence","author":"TL Bailey","year":"1993","unstructured":"Bailey TL, Elkan C. Estimating the Accuracy of Learned Concepts. In: Proceedings of the 13th International Joint Conference on Artifical Intelligence. San Francisco: Morgan Kaufmann Publishers Inc.: 1993. p. 895\u2013900."},{"key":"1041_CR34","doi-asserted-by":"publisher","unstructured":"Li T, Li N. On the tradeoff between privacy and utility in data publishing. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD \u201909. ACM Press: 2009. https:\/\/doi.org\/10.1145\/1557019.1557079.","DOI":"10.1145\/1557019.1557079"},{"key":"1041_CR35","doi-asserted-by":"publisher","unstructured":"Inan A, Kantarcioglu M, Bertino E. Using anonymized data for classification. In: 2009 IEEE 25th International Conference on Data Engineering. IEEE: 2009. https:\/\/doi.org\/10.1109\/icde.2009.19.","DOI":"10.1109\/icde.2009.19"},{"issue":"8","key":"1041_CR36","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett T. An introduction to ROC analysis. Pattern Recog Lett. 2006; 27(8):861\u201374.","journal-title":"Pattern Recog Lett"},{"issue":"1","key":"1041_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1175\/1520-0493(1950)078<0001:VOFEIT>2.0.CO;2","volume":"78","author":"GW Brier","year":"1950","unstructured":"Brier GW. Verification of forecasts expressed in terms of probability. Mon Weather Rev. 1950; 78(1):1\u20133.","journal-title":"Mon Weather Rev"},{"issue":"653","key":"1041_CR38","doi-asserted-by":"publisher","first-page":"2109","DOI":"10.1002\/qj.709","volume":"136","author":"DS Wilks","year":"2010","unstructured":"Wilks DS. Sampling distributions of the Brier score and Brier skill score under serial dependence. Q J R Meteorol Soc. 2010; 136(653):2109\u201318.","journal-title":"Q J R Meteorol Soc"},{"issue":"2","key":"1041_CR39","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1109\/JBHI.2017.2676880","volume":"22","author":"F Prasser","year":"2017","unstructured":"Prasser F, Kohlmayer F, Spengler H, Kuhn KA. A scalable and pragmatic method for the safe sharing of high-quality health data. IEEE J Biomed Health Inform. 2017; 22(2):611\u201322.","journal-title":"IEEE J Biomed Health Inform"},{"key":"1041_CR40","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-1-4419-9226-0_5","volume-title":"Artificial Intelligence and Security in Computing Systems","author":"Jacek Czerniak","year":"2003","unstructured":"Czerniak J, Zarzycki H. Application of rough sets in the presumptive diagnosis of urinary system diseases. In: Artificial Intelligence and Security in Computing Systems. Springer: 2003. p. 41\u201351. https:\/\/doi.org\/10.1007\/978-1-4419-9226-0_5."},{"key":"1041_CR41","unstructured":"Dua D, Graff C. UCI Machine Learning Repository. 2017. http:\/\/archive.ics.uci.edu\/ml. Accessed 21 June 2019."},{"key":"1041_CR42","unstructured":"European Medicines Agency. External guidance on the implementation of the European Medicines Agency policy on the publication of clinical data for medicinal products for human use. 2016:1\u201399. EMA\/90915\/2016."},{"issue":"23","key":"1041_CR43","doi-asserted-by":"publisher","first-page":"9193","DOI":"10.1073\/pnas.87.23.9193","volume":"87","author":"WH Wolberg","year":"1990","unstructured":"Wolberg WH, Mangasarian OL. Multisurface method of pattern separation for medical diagnosis applied to breast cytology. Proc Natl Acad Sci. 1990; 87(23):9193\u20136.","journal-title":"Proc Natl Acad Sci"},{"issue":"1","key":"1041_CR44","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1186\/1755-8794-4-13","volume":"4","author":"CA McCarty","year":"2011","unstructured":"McCarty CA, Chisholm RL, Chute CG, Kullo IJ, Jarvik GP, Larson EB, et al.The eMERGE Network: a consortium of biorepositories linked to electronic medical records data for conducting genomic studies. BMC Med Genomics. 2011; 4(1):13.","journal-title":"BMC Med Genomics"},{"key":"1041_CR45","volume-title":"14th International Conference on Knowledge Discovery and Data Mining (SIGKDD)","author":"J Brickell","year":"2008","unstructured":"Brickell J, Shmatikov V. The cost of privacy: Destruction of data-mining utility in anonymized data publishing. In: 14th International Conference on Knowledge Discovery and Data Mining (SIGKDD). Las Vegas: ACM: 2008. p. 70\u201378."},{"key":"1041_CR46","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-0-387-70992-5_2","volume-title":"Privacy-Preserving Data Mining","author":"Charu C. Aggarwal","year":"2008","unstructured":"Aggarwal CC, Yu PS. A general survey of privacy-preserving data mining models and algorithms. In: Privacy-Preserving Data Mining. Springer: 2008. p. 11\u201352. https:\/\/doi.org\/10.1007\/978-0-387-70992-5_2."},{"key":"1041_CR47","doi-asserted-by":"publisher","DOI":"10.1201\/9781420091502","volume-title":"Introduction to privacy-preserving data publishing: Concepts and techniques. 1st ed.","author":"BCM Fung","year":"2010","unstructured":"Fung BCM, Wang K, Fu AWC, Yu PS. Introduction to privacy-preserving data publishing: Concepts and techniques. 1st ed.Boca Raton: CRC Press; 2010."},{"key":"1041_CR48","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-319-66808-6_11","volume-title":"Lecture Notes in Computer Science","author":"Bernd Malle","year":"2017","unstructured":"Malle B, Kieseberg P, Holzinger A. Do not disturb? classifier behavior on perturbed datasets. In: International Cross-Domain Conference for Machine Learning and Knowledge Extraction. Springer: 2017. p. 155\u201373. https:\/\/doi.org\/10.1007\/978-3-319-66808-6_11."},{"issue":"12","key":"1041_CR49","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1016\/j.datak.2011.07.001","volume":"70","author":"J Li","year":"2011","unstructured":"Li J, Liu J, Baig M, Wong RCW. Information based data anonymization for classification utility. Data Knowl Eng. 2011; 70(12):1030\u201345.","journal-title":"Data Knowl Eng"},{"key":"1041_CR50","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.ins.2013.07.034","volume":"256","author":"M Last","year":"2014","unstructured":"Last M, Tassa T, Zhmudyak A, Shmueli E. Improving accuracy of classification models induced from anonymized datasets. Inf Sci. 2014; 256:138\u2013161.","journal-title":"Inf Sci"},{"issue":"11","key":"1041_CR51","doi-asserted-by":"publisher","first-page":"1704","DOI":"10.1109\/TKDE.2010.193","volume":"23","author":"KP Lin","year":"2011","unstructured":"Lin KP, Chen MS. On the design and analysis of the privacy-preserving SVM classifier. IEEE Trans Knowl Data Eng. 2011; 23(11):1704\u201317.","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"1041_CR52","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1109\/TKDE.2010.226","volume":"24","author":"PK Fong","year":"2012","unstructured":"Fong PK, Weber-Jahnke JH. Privacy preserving decision tree learning using unrealized data sets. Trans Knowl Data Eng. 2012; 24(2):353\u2013364.","journal-title":"Trans Knowl Data Eng"},{"issue":"1","key":"1041_CR53","first-page":"51","volume":"7","author":"V Sazonova","year":"2014","unstructured":"Sazonova V, Matwin S. Combining Binary Classifiers for a Multiclass Problem with Differential Privacy. Trans Data Priv. 2014; 7(1):51\u201370.","journal-title":"Trans Data Priv"},{"key":"1041_CR54","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1137\/1.9781611974973.73","volume-title":"Proceedings of the 2017 SIAM International Conference on Data Mining","author":"Koray Mancuhan","year":"2017","unstructured":"Mancuhan K, Clifton C. Statistical Learning Theory Approach for Data Classification with \u2113-diversity. In: Proceedings of the 2017 SIAM International Conference on Data Mining. SIAM: 2017. p. 651\u2013659. https:\/\/doi.org\/10.1137\/1.9781611974973.73."},{"key":"1041_CR55","volume-title":"Proceedings of the 2016 SIGSAC Conference on Computer and Communications Security","author":"M Abadi","year":"2016","unstructured":"Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, et al.Deep learning with differential privacy. In: Proceedings of the 2016 SIGSAC Conference on Computer and Communications Security. New York: ACM: 2016. p. 308\u2013318."},{"key":"1041_CR56","unstructured":"Esteban C, Hyland SL, R\u00e4tsch G. Real-valued (Medical) Time Series Generation with Recurrent Conditional GANs. arXiv preprint arXiv:170602633. 2017."},{"key":"1041_CR57","unstructured":"Choi E, Biswal S, Malin B, Duke J, Stewart WF, Sun J. Generating Multi-label Discrete Electronic Health Records using Generative Adversarial Networks. arXiv preprint arXiv:170306490. 2017."},{"key":"1041_CR58","doi-asserted-by":"publisher","unstructured":"Friedman A, Schuster A. Data mining with differential privacy. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD \u201910. ACM: 2010. https:\/\/doi.org\/10.1145\/1835804.1835868.","DOI":"10.1145\/1835804.1835868"},{"key":"1041_CR59","doi-asserted-by":"publisher","unstructured":"Zhang N, Li M, Lou W. Distributed data mining with differential privacy. In: IEEE International Conference on Communications (ICC). IEEE: 2011. https:\/\/doi.org\/10.1109\/icc.2011.5962863.","DOI":"10.1109\/icc.2011.5962863"},{"issue":"1","key":"1041_CR60","first-page":"19","volume":"6","author":"X Jiang","year":"2013","unstructured":"Jiang X, Ji Z, Wang S, Mohammed N, Cheng S, Ohno-Machado L. Differential-private data publishing through component analysis. Trans Data Priv. 2013; 6(1):19.","journal-title":"Trans Data Priv"},{"key":"1041_CR61","doi-asserted-by":"publisher","unstructured":"Zaman ANK, Obimbo C, Dara RA. A Novel Differential Privacy Approach that Enhances Classification Accuracy. In: Proceedings of the Ninth International C* Conference on Computer Science & Software Engineering - C3S2E \u201916. ACM: 2016. https:\/\/doi.org\/10.1145\/2948992.2949027.","DOI":"10.1145\/2948992.2949027"},{"key":"1041_CR62","volume-title":"Canadian Conference on Artificial Intelligence","author":"ANK Zaman","year":"2017","unstructured":"Zaman ANK, Obimbo C, Dara RA. An Improved Data Sanitization Algorithm for Privacy Preserving Medical Data Publishing. In: Canadian Conference on Artificial Intelligence. Basel: Springer: 2017. p. 64\u201370."},{"key":"1041_CR63","unstructured":"De Waal A, Hundepool A, Willenborg L. C. R. J. Argus: Software for statistical disclosure control of microdata. US Census Bureau: 1995."},{"issue":"2","key":"1041_CR64","first-page":"67","volume":"1","author":"M Templ","year":"2008","unstructured":"Templ M. Statistical disclosure control for microdata using the R-package sdcMicro. Trans Data Priv. 2008; 1(2):67\u201385.","journal-title":"Trans Data Priv"},{"key":"1041_CR65","volume-title":"The Elements of Statistical Learning: Data Mining, Inference, and Prediction","author":"T Hastie","year":"2016","unstructured":"Hastie T, Tibshirani R, Friedman J. The Elements of Statistical Learning: Data Mining, Inference, and Prediction. New York: Springer; 2016."},{"issue":"1","key":"1041_CR66","first-page":"35","volume":"6","author":"FK Dankar","year":"2013","unstructured":"Dankar FK, El Emam K. Practicing differential privacy in health care: A review. Trans Data Priv. 2013; 6(1):35\u201367.","journal-title":"Trans Data Priv"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-020-1041-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s12911-020-1041-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-020-1041-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T00:49:14Z","timestamp":1612918154000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/s12911-020-1041-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,11]]},"references-count":66,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1041"],"URL":"https:\/\/doi.org\/10.1186\/s12911-020-1041-3","relation":{},"ISSN":["1472-6947"],"issn-type":[{"type":"electronic","value":"1472-6947"}],"subject":[],"published":{"date-parts":[[2020,2,11]]},"assertion":[{"value":"27 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Not applicable.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"29"}}