{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:04:21Z","timestamp":1732039461270},"reference-count":58,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1016\/j.comcom.2020.07.032","type":"journal-article","created":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T17:06:44Z","timestamp":1595869604000},"page":"160-171","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":68,"special_numbering":"C","title":["N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets"],"prefix":"10.1016","volume":"161","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-4350-3911","authenticated-orcid":false,"given":"Celestine","family":"Iwendi","sequence":"first","affiliation":[]},{"given":"Syed Atif","family":"Moqurrab","sequence":"additional","affiliation":[]},{"given":"Adeel","family":"Anjum","sequence":"additional","affiliation":[]},{"given":"Sangeen","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Senthilkumar","family":"Mohan","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9851-4103","authenticated-orcid":false,"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2020.07.032_b1","first-page":"3","article-title":"The internet of things in healthcare: An overview","volume":"1","author":"Yuehong","year":"2016","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.comcom.2020.07.032_b2","doi-asserted-by":"crossref","first-page":"28462","DOI":"10.1109\/ACCESS.2020.2968537","article-title":"Realizing an efficient iomt-assisted patient diet recommendation system through machine learning model","volume":"8","author":"Iwendi","year":"2020","journal-title":"IEEE Access"},{"year":"2011","series-title":"The Internet of Things for Resident Health Information Service Platform Research","author":"Wang","key":"10.1016\/j.comcom.2020.07.032_b3"},{"key":"10.1016\/j.comcom.2020.07.032_b4","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.imu.2018.05.002","article-title":"An iomt based cyber training framework for orthopedic surgery using next generation internet technologies","volume":"12","author":"Cecil","year":"2018","journal-title":"Inform. Med. Unlocked"},{"issue":"05","key":"10.1016\/j.comcom.2020.07.032_b5","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"K-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"issue":"1","key":"10.1016\/j.comcom.2020.07.032_b6","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1217299.1217302","article-title":"L-diversity: Privacy beyond k-anonymity","volume":"1","author":"Machanavajjhala","year":"2007","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"10.1016\/j.comcom.2020.07.032_b7","series-title":"International Conference on Theory and Applications of Models of Computation","first-page":"1","article-title":"Differential privacy: A survey of results","author":"Dwork","year":"2008"},{"key":"10.1016\/j.comcom.2020.07.032_b8","series-title":"2014 IEEE Network Operations and Management Symposium (NOMS)","first-page":"1","article-title":"Privacy protection of textual medical documents","author":"Batet","year":"2014"},{"key":"10.1016\/j.comcom.2020.07.032_b9","series-title":"2019 IEEE International Conference on Big Data (Big Data)","first-page":"4113","article-title":"Accurate spatial mapping of social media data with physical locations","author":"Mittal","year":"2019"},{"key":"10.1016\/j.comcom.2020.07.032_b10","doi-asserted-by":"crossref","unstructured":"P. Siriaraya, Y. Zhang, Y. Wang, Y. Kawai, M. Mittal, P. Jeszenszky, A. Jatowt, Witnessing crime through tweets: A crime investigation tool based on social media, in: Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019, pp. 568\u2013571.","DOI":"10.1145\/3347146.3359082"},{"key":"10.1016\/j.comcom.2020.07.032_b11","doi-asserted-by":"crossref","unstructured":"A. Al\u00a0Faresi, D. Wijesekera, K. Moidu, A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules, in: Proceedings of the 1st ACM International Health Informatics Symposium, 2010, pp. 637\u2013646.","DOI":"10.1145\/1882992.1883093"},{"issue":"5","key":"10.1016\/j.comcom.2020.07.032_b12","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1197\/jamia.M2441","article-title":"State-of-the-art anonymization of medical records using an iterative machine learning framework","volume":"14","author":"Szarvas","year":"2007","journal-title":"J. Amer. Med. Inform. Assoc."},{"issue":"6","key":"10.1016\/j.comcom.2020.07.032_b13","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1166\/jmihi.2017.2146","article-title":"Differential average diversity: an efficient privacy mechanism for electronic health records","volume":"7","author":"Moqurrab","year":"2017","journal-title":"J. Med. Imaging Health Inform."},{"key":"10.1016\/j.comcom.2020.07.032_b14","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.jbi.2015.02.010","article-title":"Deepen: A negation detection system for clinical text incorporating dependency relation into negex","volume":"54","author":"Mehrabi","year":"2015","journal-title":"J. Biomed. Inform."},{"issue":"1","key":"10.1016\/j.comcom.2020.07.032_b15","article-title":"On the\u2019semantics\u2019 of differential privacy: A bayesian formulation","volume":"6","author":"Kasiviswanathan","year":"2014","journal-title":"J. Priv. Confid."},{"key":"10.1016\/j.comcom.2020.07.032_b16","series-title":"I2b2 Workshop on Challenges in Natural Language Processing for Clinical Data","first-page":"10","article-title":"Identifying personal health information using support vector machines","author":"Guo","year":"2006"},{"key":"10.1016\/j.comcom.2020.07.032_b17","series-title":"HIC 2009: Proceedings; Frontiers of Health Informatics-Redefining Healthcare, National Convention Centre Canberra, 19-21 August 2009","first-page":"188","article-title":"A simple pipeline application for identifying and negating snomed clinical terminology in free text","author":"Nguyen","year":"2009"},{"key":"10.1016\/j.comcom.2020.07.032_b18","series-title":"2012 Third International Conference on Computer and Communication Technology","first-page":"26","article-title":"Privacy preserving data mining techniques: current scenario and future prospects","author":"Malik","year":"2012"},{"year":"2016","author":"Lin","key":"10.1016\/j.comcom.2020.07.032_b19"},{"key":"10.1016\/j.comcom.2020.07.032_b20","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.jbi.2014.06.008","article-title":"Utility-preserving privacy protection of textual healthcare documents","volume":"52","author":"S\u00e1nchez","year":"2014","journal-title":"J. Biomed. Inform."},{"issue":"5","key":"10.1016\/j.comcom.2020.07.032_b21","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1136\/amiajnl-2011-000203","article-title":"2010 i2b2\/va challenge on concepts, assertions, and relations in clinical text","volume":"18","author":"Uzuner","year":"2011","journal-title":"J. Amer. Med. Inform. Assoc."},{"key":"10.1016\/j.comcom.2020.07.032_b22","doi-asserted-by":"crossref","first-page":"47258","DOI":"10.1109\/ACCESS.2018.2864111","article-title":"On detection of sybil attack in large-scale vanets using spider-monkey technique","volume":"6","author":"Iwendi","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2020.07.032_b23","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.jbi.2014.06.008","article-title":"Utility-preserving privacy protection of textual healthcare documents","volume":"52","author":"Sanchez","year":"2014","journal-title":"J. Biomed. Inform."},{"issue":"5","key":"10.1016\/j.comcom.2020.07.032_b24","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1197\/jamia.M2702","article-title":"A software tool for removing patient identifying information from clinical documents","volume":"15","author":"Friedlin","year":"2008","journal-title":"J. Amer. Med. Inform. Assoc."},{"key":"10.1016\/j.comcom.2020.07.032_b25","doi-asserted-by":"crossref","unstructured":"C. Li, T. Amagasa, H. Kitagawa, G. Srivastava, Label-bag based graph anonymization via edge addition, in: Proceedings of the 2014 International C* Conference on Computer Science & Software Engineering, 2014, pp. 1\u20139.","DOI":"10.1145\/2641483.2641516"},{"key":"10.1016\/j.comcom.2020.07.032_b26","first-page":"107","article-title":"K-anonymization of social networks by vertex addition.","volume":"789","author":"Chester","year":"2011","journal-title":"ADBIS (2)"},{"issue":"2","key":"10.1016\/j.comcom.2020.07.032_b27","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s13278-012-0059-7","article-title":"Complexity of social network anonymization","volume":"3","author":"Chester","year":"2013","journal-title":"Soc. Netw. Anal. Min."},{"key":"10.1016\/j.comcom.2020.07.032_b28","series-title":"2011 International Conference on Advances in Social Networks Analysis and Mining","first-page":"445","article-title":"Social network privacy for attribute disclosure attacks","author":"Chester","year":"2011"},{"issue":"3","key":"10.1016\/j.comcom.2020.07.032_b29","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/s13278-012-0084-6","article-title":"Why waldo befriended the dummy? k-anonymization of social networks with pseudo-nodes","volume":"3","author":"Chester","year":"2013","journal-title":"Soc. Netw. Anal. Min."},{"key":"10.1016\/j.comcom.2020.07.032_b30","series-title":"2011 International Conference on Advances in Social Networks Analysis and Mining","first-page":"155","article-title":"Social network anonymization via edge addition","author":"Kapron","year":"2011"},{"key":"10.1016\/j.comcom.2020.07.032_b31","series-title":"International Conference on Artificial Intelligence and Soft Computing","first-page":"338","article-title":"Where\u2019s@ waldo?: Finding users on twitter","author":"Clarkson","year":"2019"},{"issue":"1","key":"10.1016\/j.comcom.2020.07.032_b32","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1186\/1472-6947-8-32","article-title":"Automated de-identification of free-text medical records","volume":"8","author":"Neamatullah","year":"2008","journal-title":"BMC Med. Inform. Decis. Mak."},{"issue":"1","key":"10.1016\/j.comcom.2020.07.032_b33","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1186\/1472-6947-6-12","article-title":"Development and evaluation of an open source software tool for deidentification of pathology reports","volume":"6","author":"Beckwith","year":"2006","journal-title":"BMC Med. Inform. Decis. Mak."},{"issue":"6","key":"10.1016\/j.comcom.2020.07.032_b34","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1109\/TIFS.2013.2239641","article-title":"Automatic general-purpose sanitization of textual documents","volume":"8","author":"Sanchez","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comcom.2020.07.032_b35","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.ins.2013.06.042","article-title":"Minimizing the disclosure risk of semantic correlations in document sanitization","volume":"249","author":"S\u00e1nchez","year":"2013","journal-title":"Inform. Sci."},{"key":"10.1016\/j.comcom.2020.07.032_b36","doi-asserted-by":"crossref","first-page":"S34","DOI":"10.1016\/j.jbi.2017.05.023","article-title":"De-identification of clinical notes via recurrent neural network and conditional random field","volume":"75","author":"Liu","year":"2017","journal-title":"J. Biomed. Inform."},{"issue":"2","key":"10.1016\/j.comcom.2020.07.032_b37","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1186\/s12911-017-0468-7","article-title":"Entity recognition from clinical texts via recurrent neural network","volume":"17","author":"Liu","year":"2017","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"10.1016\/j.comcom.2020.07.032_b38","doi-asserted-by":"crossref","first-page":"S54","DOI":"10.1016\/j.jbi.2017.05.001","article-title":"The uab informatics institute and 2016 cegs n-grid de-identification shared task challenge","volume":"75","author":"Bui","year":"2017","journal-title":"J. Biomed. Inform."},{"key":"10.1016\/j.comcom.2020.07.032_b39","series-title":"Proceedings of the AMIA Symposium","first-page":"105","article-title":"Evaluation of negation phrases in narrative clinical reports.","author":"Chapman","year":"2001"},{"key":"10.1016\/j.comcom.2020.07.032_b40","first-page":"188","article-title":"Negbio: a high-performance tool for negation and uncertainty detection in radiology reports","volume":"2018","author":"Peng","year":"2018","journal-title":"AMIA Summits Transl. Sci. Proc."},{"issue":"1","key":"10.1016\/j.comcom.2020.07.032_b41","article-title":"On the difficulties of disclosure prevention in statistical databases or the case for differential privacy","volume":"2","author":"Dwork","year":"2010","journal-title":"J. Priv. Confid."},{"key":"10.1016\/j.comcom.2020.07.032_b42","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.knosys.2013.09.022","article-title":"A general framework for privacy preserving data publishing","volume":"54","author":"Sattar","year":"2013","journal-title":"Knowl.-Based Syst."},{"issue":"1","key":"10.1016\/j.comcom.2020.07.032_b43","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1002\/asi.23363","article-title":"C-sanitized: A privacy model for document redaction and sanitization","volume":"67","author":"S\u00e1nchez","year":"2016","journal-title":"J. Assoc. Inform. Sci. Technol."},{"key":"10.1016\/j.comcom.2020.07.032_b44","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.engappai.2016.12.013","article-title":"Toward sensitive document release with privacy guarantees","volume":"59","author":"Sanchez","year":"2017","journal-title":"Eng. Appl. Artif. Intell."},{"year":"2012","series-title":"Principles of Health Interoperability HL7 and SNOMED","author":"Benson","key":"10.1016\/j.comcom.2020.07.032_b45"},{"issue":"9","key":"10.1016\/j.comcom.2020.07.032_b46","first-page":"54","article-title":"Snomed ct milestones: Endorsements are added to already-impressive standards credentials.","volume":"21","author":"Spackman","year":"2004","journal-title":"Healthc. Inform.: Bus. Mag. Inf. Commun. Syst."},{"key":"10.1016\/j.comcom.2020.07.032_b47","series-title":"International Conference on Theory and Applications of Models of Computation","first-page":"1","article-title":"Differential privacy: A survey of results","author":"Dwork","year":"2008"},{"issue":"393","key":"10.1016\/j.comcom.2020.07.032_b48","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1080\/01621459.1986.10478229","article-title":"Disclosure-limited data dissemination","volume":"81","author":"Duncan","year":"1986","journal-title":"J. Amer. Statist. Assoc."},{"key":"10.1016\/j.comcom.2020.07.032_b49","doi-asserted-by":"crossref","first-page":"81542","DOI":"10.1109\/ACCESS.2019.2923707","article-title":"Effective heart disease prediction using hybrid machine learning techniques","volume":"7","author":"Mohan","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2020.07.032_b50","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1016\/j.comcom.2019.12.015","article-title":"An efficient public key secure scheme for cloud and iot security","volume":"150","author":"Thirumalai","year":"2020","journal-title":"Comput. Commun.","ISSN":"http:\/\/id.crossref.org\/issn\/0140-3664","issn-type":"print"},{"issue":"2","key":"10.1016\/j.comcom.2020.07.032_b51","doi-asserted-by":"crossref","first-page":"326","DOI":"10.3390\/s19020326","article-title":"A decentralized privacy-preserving healthcare blockchain for iot","volume":"19","author":"Dwivedi","year":"2019","journal-title":"Sensors"},{"key":"10.1016\/j.comcom.2020.07.032_b52","series-title":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","first-page":"135","article-title":"Optimized blockchain model for internet of things based healthcare applications","author":"Dwivedi","year":"2019"},{"key":"10.1016\/j.comcom.2020.07.032_b53","doi-asserted-by":"crossref","first-page":"155779","DOI":"10.1109\/ACCESS.2019.2937177","article-title":"Eca: An edge computing architecture for privacy-preserving in iot-based smart city","volume":"7","author":"Gheisari","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2020.07.032_b54","doi-asserted-by":"crossref","unstructured":"L. Malina, G. Srivastava, P. Dzurenda, J. Hajny, R. Fujdiak, A secure publish\/subscribe protocol for internet of things, in: Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019, pp. 1\u201310.","DOI":"10.1145\/3339252.3340503"},{"issue":"1","key":"10.1016\/j.comcom.2020.07.032_b55","doi-asserted-by":"crossref","DOI":"10.5210\/ojphi.v11i1.9698","article-title":"Cross disciplinary consultancy: Negation detection use case","volume":"11","author":"Conway","year":"2019","journal-title":"Online J. Public Health Inform."},{"issue":"3","key":"10.1016\/j.comcom.2020.07.032_b56","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s10844-009-0103-x","article-title":"Ontology-driven web-based semantic similarity","volume":"35","author":"Sanchez","year":"2010","journal-title":"J. Intell. Inf. Syst."},{"issue":"3","key":"10.1016\/j.comcom.2020.07.032_b57","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/TKDE.2007.48","article-title":"The google similarity distance","volume":"19","author":"Cilibrasi","year":"2007","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.comcom.2020.07.032_b58","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.ins.2014.03.103","article-title":"Utility-preserving sanitization of semantically correlated terms in textual documents","volume":"279","author":"Sanchez","year":"2014","journal-title":"Inform. Sci."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366420318442?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366420318442?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T21:35:49Z","timestamp":1723325749000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366420318442"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":58,"alternative-id":["S0140366420318442"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2020.07.032","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[2020,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2020.07.032","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}