Anonymisation models for text data: State of the art, challenges and future directions

P Lison, I Pilán, D Sánchez, M Batet… - Proceedings of the 59th …, 2021 - aclanthology.org
This position paper investigates the problem of automated text anonymisation, which is a
prerequisite for secure sharing of documents containing sensitive information about …

Persian sentiment analysis of an online store independent of pre-processing using convolutional neural network with fastText embeddings

S Shumaly, M Yazdinejad, Y Guo - PeerJ Computer Science, 2021 - peerj.com
Sentiment analysis plays a key role in companies, especially stores, and increasing the
accuracy in determining customers' opinions about products assists to maintain their …

A novel covid-19 data set and an effective deep learning approach for the de-identification of italian medical records

R Catelli, F Gargiulo, V Casola, G De Pietro… - Ieee …, 2021 - ieeexplore.ieee.org
In the last years, the need to de-identify privacy-sensitive information within Electronic
Health Records (EHRs) has become increasingly felt and extremely relevant to encourage …

Applying and sharing pre-trained BERT-models for named entity recognition and classification in Swedish electronic patient records

M Grancharova, H Dalianis - … of the 23rd nordic conference on …, 2021 - aclanthology.org
To be able to share the valuable information in electronic patient records (EPR) they first
need to be de-identified in order to protect the privacy of their subjects. Named entity …

Creating and evaluating a synthetic Norwegian clinical corpus for de-identification

S Bråthen, W Wie, H Dalianis - … of the 23rd Nordic Conference on …, 2021 - aclanthology.org
Building tools to remove sensitive information such as personal names, addresses, and
telephone numbers-so called Protected Health Information (PHI)-from clinical free text is an …

[PDF][PDF] Automated Quality Assessment of Natural Language Requirements

P Kummler - 2021 - core.ac.uk
High demands on quality and increasing complexity are major challenges in the
development of industrial software in general. The development of automotive software in …

A data corruption detection scheme based on ciphertexts in cloud environment.

S Guo, S He, L Su, X Zhang… - KSII Transactions on …, 2021 - search.ebscohost.com
With the advent of the data era, people pay much more attention to data corruption. Aiming
at the problem that the majority of existing schemes do not support corruption detection of …

[引用][C] Electronic Health Record Sharing and Access Controlling Blockchain Architecture using Data De-identi cation Method

MRA Muid, A Jubaida, H Hamid - 2021 - Department of Computer Science …

[引用][C] SAFEGUARDING PRIVACY THROUGH DEEP LEARNING TECHNIQUES