Privacy Protection and Data Utilization
Soo-Yong Shin
Healthc Inform Res. 2021;27(1):1-2.   Published online 2021 Jan 31     DOI:
Citations to this article as recorded by Crossref logo
Verification of De-Identification Techniques for Personal Information Using Tree-Based Methods with Shapley Values
Junhak Lee, Jinwoo Jeong, Sungji Jung, Jihoon Moon, Seungmin Rho
Journal of Personalized Medicine.2022; 12(2): 190.     CrossRef
Protected Health Information Recognition by Fine-Tuning a Pre-training Transformer Model
Seo Hyun Oh, Min Kang, Youngho Lee
Healthcare Informatics Research.2022; 28(1): 16.     CrossRef
A Privacy-Assured Data Lifecycle for Epidemic-Handling Systems
Abdul Majeed, Seong Oun Hwang
Computer.2022; 55(8): 57.     CrossRef
Towards Privacy Paradigm Shift Due to the Pandemic: A Brief Perspective
Abdul Majeed, Sungchang Lee
Inventions.2021; 6(2): 24.     CrossRef
Applications of Machine Learning and High-Performance Computing in the Era of COVID-19
Abdul Majeed, Sungchang Lee
Applied System Innovation.2021; 4(3): 40.     CrossRef
Data Pseudonymization in a Range That Does Not Affect Data Quality: Correlation with the Degree of Participation of Clinicians
Soo-Yong Shin, Hun-Sung Kim
Journal of Korean Medical Science.2021;[Epub]     CrossRef
A Comprehensive Analysis of Privacy Protection Techniques Developed for COVID-19 Pandemic
Abdul Majeed, Seong Oun Hwang
IEEE Access.2021; 9: 164159.     CrossRef