The World Wide Web Conference 2019
DOI: 10.1145/3308558.3313528
|View full text |Cite
|
Sign up to set email alerts
|

Longitudinal Adversarial Attack on Electronic Health Records Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

2
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(18 citation statements)
references
References 10 publications
2
16
0
Order By: Relevance
“…Researchers are now looking for a possible solution to combine EHR with blockchain technology in the healthcare sector [15]. Data leaks and successful HIS attacks visualize the problems concerning the protection and sensitive handling of patient data, even though HIS are told to be secure [16]. Hospitals, private companies, and even international health and political organizations such as the EU discuss the benefits and possibilities of blockchain implementation for standardizing and facilitating EHR exchange.…”
Section: Introductionmentioning
confidence: 99%
“…Researchers are now looking for a possible solution to combine EHR with blockchain technology in the healthcare sector [15]. Data leaks and successful HIS attacks visualize the problems concerning the protection and sensitive handling of patient data, even though HIS are told to be secure [16]. Hospitals, private companies, and even international health and political organizations such as the EU discuss the benefits and possibilities of blockchain implementation for standardizing and facilitating EHR exchange.…”
Section: Introductionmentioning
confidence: 99%
“…To illustrate, existing studies mainly explore the robustness of deep health risk prediction models by white/gray-box adversarial attacks, which assume attackers can access the parameters of health risk prediction models. For example, Sun et al [21] propose a white-box one to identify susceptible locations in clinical time series data, An et al [1] generate adversarial EHR examples in the white/gray-box setting, and Wang et al [23] test a white-box evasion attack on EHRs. However, in the real world health analytics companies train their models with their private data and release them as black-box services on the cloud.…”
Section: Introductionmentioning
confidence: 99%
“…Contributions. To sum up, our contributions are as follows: (1) To the best of our knowledge, we are the first to explore the robustness of health risk prediction models via black-box adversarial attacks. Compared with white/gray-box setting, black-box adversarial attack is more realistic, so our work can better approximate the robustness of real-world health risk prediction models.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations