[HTML][HTML] Informed consent in biomedical research

FK Dankar, M Gergely, SK Dankar - Computational and structural …, 2019 - Elsevier
Informed consent is the result of tumultuous events in both the clinical and research arenas
over the last 100 years. Throughout this time, the notion of informed consent has shifted …

Anonymising and sharing individual patient data

K El Emam, S Rodgers, B Malin - bmj, 2015 - bmj.com
There is a strong movement to share individual patient data for secondary purposes,
particularly for research. A major obstacle to broad data sharing has been the concern for …

DeepFake knee osteoarthritis X-rays from generative adversarial neural networks deceive medical experts and offer augmentation potential to automatic classification

F Prezja, J Paloneva, I Pölönen, E Niinimäki… - Scientific Reports, 2022 - nature.com
Recent developments in deep learning have impacted medical science. However, new
privacy issues and regulatory frameworks have hindered medical data sharing and …

The development of large-scale de-identified biomedical databases in the age of genomics—principles and challenges

FK Dankar, A Ptitsyn, SK Dankar - Human genomics, 2018 - Springer
Contemporary biomedical databases include a wide range of information types from various
observational and instrumental sources. Among the most important features that unite …

Generating sequential electronic health records using dual adversarial autoencoder

D Lee, H Yu, X Jiang, D Rogith… - Journal of the …, 2020 - academic.oup.com
Objective Recent studies on electronic health records (EHRs) started to learn deep
generative models and synthesize a huge amount of realistic records, in order to address …

[HTML][HTML] Assessing and minimizing re-identification risk in research data derived from health care records

GE Simon, SM Shortreed, RY Coley, RB Penfold… - Egems, 2019 - ncbi.nlm.nih.gov
Background: Sharing of research data derived from health system records supports the rigor
and reproducibility of primary research and can accelerate research progress through …

Attack risk analysis in data anonymization in Internet of Things

T Yang, LS Cang, M Iqbal… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
An enormous volume of data is generated in the Internet of Things (IoT), which needs to be
anonymized before sharing with public or third parties to minimize reidentification risk and …

Differential privacy for the vast majority

HB Kartal, X Liu, XB Li - ACM Transactions on Management Information …, 2019 - dl.acm.org
Differential privacy has become one of the widely used mechanisms for protecting sensitive
information in databases and information systems. Although differential privacy provides a …

: Privacy-Preserving Integration and Sharing of Datasets

HW Lim, GS Poh, J Xu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In privacy-enhancing technology, it has been inevitably challenging to strike a reasonable
balance between privacy, efficiency, and usability (utility). To this, we propose a highly …

[HTML][HTML] A risk-based framework for biomedical data sharing

FK Dankar, R Badji - Journal of Biomedical Informatics, 2017 - Elsevier
The problem of biomedical data sharing is a form of gambling; on one hand it incurs the risk
of privacy violations and on the other it stands to profit from knowledge discovery. In general …