Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation

Search Page

Filters

My NCBI Filters

Results by year

Table representation of search results timeline featuring number of search results per year.

Year Number of Results
2017 1
2018 1
2020 1
2024 0

Text availability

Article attribute

Article type

Publication date

Search Results

2 results

Results by year

Citations

1 article found by citation matching

Search results

Filters applied: . Clear all
Page 1
An Open Source Tool for Game Theoretic Health Data De-Identification.
Prasser F, Gaupp J, Wan Z, Xia W, Vorobeychik Y, Kantarcioglu M, Kuhn K, Malin B. Prasser F, et al. AMIA Annu Symp Proc. 2018 Apr 16;2017:1430-1439. eCollection 2017. AMIA Annu Symp Proc. 2018. PMID: 29854212 Free PMC article.
To realize these activities at scale, data must be shared beyond its initial point of collection. To maintain privacy, healthcare organizations often de-identify data, but they assume worst-case adversaries, inducing high levels of data corruption. ... …
To realize these activities at scale, data must be shared beyond its initial point of collection. To maintain privacy, healthcare org …
A comprehensive tool for creating and evaluating privacy-preserving biomedical prediction models.
Eicher J, Bild R, Spengler H, Kuhn KA, Prasser F. Eicher J, et al. BMC Med Inform Decis Mak. 2020 Feb 11;20(1):29. doi: 10.1186/s12911-020-1041-3. BMC Med Inform Decis Mak. 2020. PMID: 32046701 Free PMC article.
In this process, we also used a wide range of different privacy models (k-anonymity, differential privacy and a game-theoretic approach) as well as different data transformation techniques. ...Our implementation is available as open source softw …
In this process, we also used a wide range of different privacy models (k-anonymity, differential privacy and a game-theoretic