暂无分享,去创建一个
Jimeng Sun | Bradley Malin | Walter F. Stewart | Jon Duke | Edward Choi | Siddharth Biswal | Jimeng Sun | B. Malin | E. Choi | W. Stewart | J. Duke | S. Biswal | Siddharth Biswal
[1] Peter Szolovits,et al. MIMIC-III, a freely accessible critical care database , 2016, Scientific Data.
[2] John Glover. Modeling documents with Generative Adversarial Networks , 2016, ArXiv.
[3] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[4] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[5] Lantao Yu,et al. SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient , 2016, AAAI.
[6] Koray Kavukcuoglu,et al. Pixel Recurrent Neural Networks , 2016, ICML.
[7] Zhe Gan,et al. Generating Text via Adversarial Training , 2016 .
[8] Alex Graves,et al. Conditional Image Generation with PixelCNN Decoders , 2016, NIPS.
[9] B. Fitzgerald. Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule , 2015 .
[10] Laura A. Levit,et al. Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research. Washington, DC: National Academies Press , 2009 .
[11] David L. Buckeridge,et al. The re-identification risk of Canadians from longitudinal demographics , 2011, BMC Medical Informatics Decis. Mak..
[12] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[13] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[14] Jörg Drechsler,et al. Synthetic datasets for statistical disclosure control , 2011 .
[15] Ronald J. Williams,et al. Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning , 2004, Machine Learning.
[16] David Pfau,et al. Unrolled Generative Adversarial Networks , 2016, ICLR.
[17] Wojciech Zaremba,et al. Improved Techniques for Training GANs , 2016, NIPS.
[18] Kudakwashe Dube,et al. Using the CareMap with Health Incidents Statistics for Generating the Realistic Synthetic Electronic Healthcare Record , 2016, 2016 IEEE International Conference on Healthcare Informatics (ICHI).
[19] Jeffrey M. Hausdorff,et al. Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .
[20] Jerome P. Reiter,et al. Satisfying Disclosure Restrictions With Synthetic Data Sets , 2002 .
[21] Yoshua Bengio,et al. Extracting and composing robust features with denoising autoencoders , 2008, ICML '08.
[22] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[23] Rob Fergus,et al. Deep Generative Image Models using a Laplacian Pyramid of Adversarial Networks , 2015, NIPS.
[24] Yee Whye Teh,et al. The Concrete Distribution: A Continuous Relaxation of Discrete Random Variables , 2016, ICLR.
[25] Matt J. Kusner,et al. GANS for Sequences of Discrete Elements with the Gumbel-softmax Distribution , 2016, ArXiv.
[26] Simon Osindero,et al. Conditional Generative Adversarial Nets , 2014, ArXiv.
[27] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[28] Randolph A. Miller,et al. Reducing patient re-identification risk for laboratory results within research datasets , 2013, J. Am. Medical Informatics Assoc..
[29] L. Gostin,et al. Legal issues concerning electronic health information: privacy, quality, and liability. , 1999, JAMA.
[30] Joydeep Ghosh,et al. Perturbed Gibbs Samplers for Generating Large-Scale Privacy-Safe Synthetic Health Data , 2013, 2013 IEEE International Conference on Healthcare Informatics.
[31] Ben Poole,et al. Categorical Reparameterization with Gumbel-Softmax , 2016, ICLR.
[32] Joshua C. Denny,et al. The disclosure of diagnosis codes can breach research participants' privacy , 2010, J. Am. Medical Informatics Assoc..
[33] Jonathon Shlens,et al. Conditional Image Synthesis with Auxiliary Classifier GANs , 2016, ICML.
[34] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[35] Yaniv Erlich,et al. Routes for breaching and protecting genetic privacy , 2013, Nature Reviews Genetics.
[36] Ian J. Goodfellow,et al. NIPS 2016 Tutorial: Generative Adversarial Networks , 2016, ArXiv.
[37] Bradley Malin,et al. Anonymising and sharing individual patient data , 2015, BMJ : British Medical Journal.
[38] L Sweeney,et al. Weaving Technology and Policy Together to Maintain Confidentiality , 1997, Journal of Law, Medicine & Ethics.
[39] Anna L. Buczak,et al. Data-driven approach for creating synthetic electronic medical records , 2010, BMC Medical Informatics Decis. Mak..
[40] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[41] Bernt Schiele,et al. Generative Adversarial Text to Image Synthesis , 2016, ICML.
[42] Bradley Malin,et al. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems , 2004, J. Biomed. Informatics.