U.S. flag

An official website of the United States government

Display Settings:

Items per page

PMC Full-Text Search Results

Items: 9

1.
Figure 2

Figure 2. From: Optimizing Annotation Resources for Natural Language De-identification via a Game Theoretic Framework.

A natural language data de-identification and sharing pipeline from the publisher (left) to the attacker (right).

Muqun Li, et al. J Biomed Inform. ;61:97-109.
2.
Figure 4

Figure 4. From: Optimizing Annotation Resources for Natural Language De-identification via a Game Theoretic Framework.

Performance for the publisher’s de-identification model as a function of the number of documents provided for training.

Muqun Li, et al. J Biomed Inform. ;61:97-109.
3.
Figure 7

Figure 7. From: Optimizing Annotation Resources for Natural Language De-identification via a Game Theoretic Framework.

Decision making process of the publisher and corresponding strategies of the attacker in the Mid-high case when the attacker pays the penalty back to the publisher.

Muqun Li, et al. J Biomed Inform. ;61:97-109.
4.
Figure 6

Figure 6. From: Optimizing Annotation Resources for Natural Language De-identification via a Game Theoretic Framework.

Decision making process of the publisher and corresponding strategies of the attacker in the Mid-high case when the attacker’s pays the penalty forward to a third party.

Muqun Li, et al. J Biomed Inform. ;61:97-109.
5.
Figure 5

Figure 5. From: Optimizing Annotation Resources for Natural Language De-identification via a Game Theoretic Framework.

The influence of the publisher’s training dataset size on the attacker’s (a) precision, (b) recall, and (c) f-measure.

Muqun Li, et al. J Biomed Inform. ;61:97-109.
6.
Figure 3

Figure 3. From: Optimizing Annotation Resources for Natural Language De-identification via a Game Theoretic Framework.

Experimental design for performance and cost model evaluations of the publisher and the attacker. Note that a specific experiment consists of the publisher and attacker choosing one level of training each.

Muqun Li, et al. J Biomed Inform. ;61:97-109.
7.
Figure 1

Figure 1. From: Optimizing Annotation Resources for Natural Language De-identification via a Game Theoretic Framework.

A depiction of the traditional view on natural language de-identification (left) and an augmented view that accounts for potential attackers (right) and translation of traditional information retrieval measures into economic factors.

Muqun Li, et al. J Biomed Inform. ;61:97-109.
8.
Figure 9

Figure 9. From: Optimizing Annotation Resources for Natural Language De-identification via a Game Theoretic Framework.

Sensitivity of attacker’s and publisher’s payoffs to the attacker’s value per true positive (v) and loss per false positive (la) for four policies when attacker’s annotation cost per EMR (ca) is $4. The Mid-high case (v = $0.5, la = $0.5) is circled.

Muqun Li, et al. J Biomed Inform. ;61:97-109.
9.
Figure 8

Figure 8. From: Optimizing Annotation Resources for Natural Language De-identification via a Game Theoretic Framework.

Sensitivity of attacker’s and publisher’s payoffs to the attacker’s value per true positive (v) and loss per false positive (la) for policies Traditional, Safe-forward, Attack-forward and Attack-back when the attacker’s annotation cost per EMR (ca) is $1. The result for the Low case (v = $0.1, la = $0.3) is circled in each figure.

Muqun Li, et al. J Biomed Inform. ;61:97-109.

Display Settings:

Items per page

Supplemental Content

Recent activity

Your browsing activity is empty.

Activity recording is turned off.

Turn recording back on

See more...
Support Center