Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
BMC Med Inform Decis Mak ; 24(1): 54, 2024 Feb 16.
Artigo em Inglês | MEDLINE | ID: mdl-38365677

RESUMO

BACKGROUND: Electronic health records (EHRs) contain valuable information for clinical research; however, the sensitive nature of healthcare data presents security and confidentiality challenges. De-identification is therefore essential to protect personal data in EHRs and comply with government regulations. Named entity recognition (NER) methods have been proposed to remove personal identifiers, with deep learning-based models achieving better performance. However, manual annotation of training data is time-consuming and expensive. The aim of this study was to develop an automatic de-identification pipeline for all kinds of clinical documents based on a distant supervised method to significantly reduce the cost of manual annotations and to facilitate the transfer of the de-identification pipeline to other clinical centers. METHODS: We proposed an automated annotation process for French clinical de-identification, exploiting data from the eHOP clinical data warehouse (CDW) of the CHU de Rennes and national knowledge bases, as well as other features. In addition, this paper proposes an assisted data annotation solution using the Prodigy annotation tool. This approach aims to reduce the cost required to create a reference corpus for the evaluation of state-of-the-art NER models. Finally, we evaluated and compared the effectiveness of different NER methods. RESULTS: A French de-identification dataset was developed in this work, based on EHRs provided by the eHOP CDW at Rennes University Hospital, France. The dataset was rich in terms of personal information, and the distribution of entities was quite similar in the training and test datasets. We evaluated a Bi-LSTM + CRF sequence labeling architecture, combined with Flair + FastText word embeddings, on a test set of manually annotated clinical reports. The model outperformed the other tested models with a significant F1 score of 96,96%, demonstrating the effectiveness of our automatic approach for deidentifying sensitive information. CONCLUSIONS: This study provides an automatic de-identification pipeline for clinical notes, which can facilitate the reuse of EHRs for secondary purposes such as clinical research. Our study highlights the importance of using advanced NLP techniques for effective de-identification, as well as the need for innovative solutions such as distant supervision to overcome the challenge of limited annotated data in the medical domain.


Assuntos
Aprendizado Profundo , Humanos , Anonimização de Dados , Registros Eletrônicos de Saúde , Análise Custo-Benefício , Confidencialidade , Processamento de Linguagem Natural
2.
Stud Health Technol Inform ; 270: 412-416, 2020 Jun 16.
Artigo em Inglês | MEDLINE | ID: mdl-32570417

RESUMO

In this paper, we propose a new approach for performing privacy-preserving genome-wide association study (GWAS) in cloud environments. This method allows a Genomic Research Unit (GRU) who possesses genetic variants of diseased individuals (cases) to compare his/her data against genetic variants of healthy individuals (controls) from a Genomic Research Center (GRC). The originality of this work stands on a secure version of the collapsing method based on the logistic regression model considering that all data of GRU are stored into the cloud. To do so, we take advantage of fully homomorphic encryption and of secure multiparty computation. Experiment results carried out on real genetic data using the BGV cryptosystem indicate that the proposed scheme provides the same results as the ones achieved on clear data.


Assuntos
Segurança Computacional , Algoritmos , Computação em Nuvem , Feminino , Estudo de Associação Genômica Ampla , Genômica , Humanos , Modelos Logísticos , Masculino , Privacidade
3.
Annu Int Conf IEEE Eng Med Biol Soc ; 2019: 6494-6497, 2019 Jul.
Artigo em Inglês | MEDLINE | ID: mdl-31947329

RESUMO

In this paper, we propose a secure protocol that allows processing encrypted data emitted by a medical IOT device. Its originality stands on a new fast algorithm which makes possible the conversion of Combined Linear Congruential Generator (CLCG) encrypted data into data homomorphically encrypted with the Damgard-Jurik (D-J) cryptosystem. By doing so, an honest-but-curious third party, like a smartphone, can process data issued from the IOT devices (e.g. raising a health alert) without endangering data privacy while CLCG can be integrated in an IOT of low computation capabilities. Moreover, in order to reduce communication and computation complexities compared to existing solutions and to achieve a real time solution, we further propose a secure packed version of CLCG in the D-J domain. With it a medical IOT can encrypt several pieces of data at once while allowing a third party to independently convert and process them in their D-J homomorphic encrypted form. We theoretically and experimentally demonstrate the performance of our solution in the case of a connected knee prosthesis, the data of which are processed for patient monitoring.


Assuntos
Artroplastia do Joelho , Prótese do Joelho , Algoritmos , Segurança Computacional , Humanos
4.
Annu Int Conf IEEE Eng Med Biol Soc ; 2016: 2537-2540, 2016 Aug.
Artigo em Inglês | MEDLINE | ID: mdl-28268839

RESUMO

In this paper, we propose a new secure content based image retrieval (SCBIR) system adapted to the cloud framework. This solution allows a physician to retrieve images of similar content within an outsourced and encrypted image database, without decrypting them. Contrarily to actual CBIR approaches in the encrypted domain, the originality of the proposed scheme stands on the fact that the features extracted from the encrypted images are themselves encrypted. This is achieved by means of homomorphic encryption and two non-colluding servers, we however both consider as honest but curious. In that way an end to end secure CBIR process is ensured. Experimental results carried out on a diabetic retinopathy database encrypted with the Paillier cryptosystem indicate that our SCBIR achieves retrieval performance as good as if images were processed in their non-encrypted form.


Assuntos
Segurança Computacional , Bases de Dados Factuais , Retinopatia Diabética/epidemiologia , Retinopatia Diabética/terapia , Diagnóstico por Computador/métodos , Informática Médica/métodos , Algoritmos , Computação em Nuvem , Computadores , Registros Eletrônicos de Saúde , Humanos , Modelos Estatísticos , Distribuição Normal , Linguagens de Programação , Análise de Ondaletas
5.
Annu Int Conf IEEE Eng Med Biol Soc ; 2015: 2944-7, 2015 Aug.
Artigo em Inglês | MEDLINE | ID: mdl-26736909

RESUMO

In this paper, we propose a secure implementation of a content-based image retrieval (CBIR) method that makes possible diagnosis aid systems to work in externalized environment and with outsourced data as in cloud computing. This one works with homomorphic encrypted images from which it extracts wavelet based image features next used for subsequent image comparison. By doing so, our system allows a physician to retrieve the most similar images to a query image in an outsourced database while preserving data confidentiality. Our Secure CBIR is the first one that proposes to work with global image features extracted from encrypted images and does not induce extra communications in-between the client and the server. Experimental results show it achieves retrieval performance as good as if images were processed non-encrypted.


Assuntos
Bases de Dados Factuais , Computação em Nuvem , Confidencialidade , Armazenamento e Recuperação da Informação
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...