{"id":"https://openalex.org/W4416250695","doi":"https://doi.org/10.1109/ijcnn64981.2025.11229049","title":"Differential Privacy on Large Language Models for Privacy Preserving Clinical Coding","display_name":"Differential Privacy on Large Language Models for Privacy Preserving Clinical Coding","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416250695","doi":"https://doi.org/10.1109/ijcnn64981.2025.11229049"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11229049","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11229049","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113496537","display_name":"Ben Marshall","orcid":null},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ben Marshall","raw_affiliation_strings":["The University of Western Australia,Department of Computer Science and Software Engineering,Perth,Australia"],"affiliations":[{"raw_affiliation_string":"The University of Western Australia,Department of Computer Science and Software Engineering,Perth,Australia","institution_ids":["https://openalex.org/I177877127"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100701504","display_name":"Sirui Li","orcid":"https://orcid.org/0000-0002-2504-3790"},"institutions":[{"id":"https://openalex.org/I176790772","display_name":"Murdoch University","ror":"https://ror.org/00r4sry34","country_code":"AU","type":"education","lineage":["https://openalex.org/I176790772"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sirui Li","raw_affiliation_strings":["Murdoch University,School of Information Technology,Perth,Australia"],"affiliations":[{"raw_affiliation_string":"Murdoch University,School of Information Technology,Perth,Australia","institution_ids":["https://openalex.org/I176790772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090386908","display_name":"Shiv Meka","orcid":"https://orcid.org/0000-0003-2416-4790"},"institutions":[{"id":"https://openalex.org/I2799740997","display_name":"Royal Perth Hospital","ror":"https://ror.org/00zc2xc51","country_code":"AU","type":"healthcare","lineage":["https://openalex.org/I2799506148","https://openalex.org/I2799506148","https://openalex.org/I2799740997","https://openalex.org/I2800882159","https://openalex.org/I2800882159","https://openalex.org/I4388446364","https://openalex.org/I4388446364","https://openalex.org/I4407990082"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shiv Akarsh Meka","raw_affiliation_strings":["Royal Perth Hospital,Health In A Virtual Environment,Perth,Australia"],"affiliations":[{"raw_affiliation_string":"Royal Perth Hospital,Health In A Virtual Environment,Perth,Australia","institution_ids":["https://openalex.org/I2799740997"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100641142","display_name":"Wei Liu","orcid":"https://orcid.org/0000-0002-7409-0948"},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wei Liu","raw_affiliation_strings":["The University of Western Australia,Department of Computer Science and Software Engineering,Perth,Australia"],"affiliations":[{"raw_affiliation_string":"The University of Western Australia,Department of Computer Science and Software Engineering,Perth,Australia","institution_ids":["https://openalex.org/I177877127"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5113496537"],"corresponding_institution_ids":["https://openalex.org/I177877127"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18606438,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.6092000007629395,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.6092000007629395,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13702","display_name":"Machine Learning in Healthcare","score":0.1168999969959259,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.0908999964594841,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7631000280380249},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.6355999708175659},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6028000116348267},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5720999836921692},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.47130000591278076},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4325000047683716},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.38850000500679016},{"id":"https://openalex.org/keywords/record-linkage","display_name":"Record linkage","score":0.37950000166893005},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.3788999915122986}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7631000280380249},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7074999809265137},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.6355999708175659},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6028000116348267},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5720999836921692},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.47130000591278076},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4684999883174896},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.46399998664855957},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.43540000915527344},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4325000047683716},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.38850000500679016},{"id":"https://openalex.org/C142210648","wikidata":"https://www.wikidata.org/wiki/Q1266546","display_name":"Record linkage","level":3,"score":0.37950000166893005},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3788999915122986},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.36739999055862427},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.3610000014305115},{"id":"https://openalex.org/C31266012","wikidata":"https://www.wikidata.org/wiki/Q6554340","display_name":"Linkage (software)","level":3,"score":0.35920000076293945},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3578999936580658},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.33070001006126404},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.3287999927997589},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.3276999890804291},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.31949999928474426},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.31279999017715454},{"id":"https://openalex.org/C138958017","wikidata":"https://www.wikidata.org/wiki/Q190087","display_name":"Data type","level":2,"score":0.3118000030517578},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.30070000886917114},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2865000069141388},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.28450000286102295},{"id":"https://openalex.org/C154874363","wikidata":"https://www.wikidata.org/wiki/Q3518464","display_name":"Medical classification","level":2,"score":0.2782000005245209},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2743000090122223},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.2718999981880188},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.26840001344680786},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2671000063419342},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.2660999894142151},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2535000145435333}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11229049","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11229049","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/f64f7172-f519-4735-b5c0-99a8fd7d9c57","is_oa":false,"landing_page_url":"https://admin.research-repository.uwa.edu.au/en/publications/f64f7172-f519-4735-b5c0-99a8fd7d9c57","pdf_url":null,"source":{"id":"https://openalex.org/S4306402523","display_name":"UWA Profiles and Research Repository (University of Western Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177877127","host_organization_name":"The University of Western Australia","host_organization_lineage":["https://openalex.org/I177877127"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Marshall, B, Li, S, Meka, S A & Liu, W 2025, Differential Privacy on Large Language Models for Privacy Preserving Clinical Coding. in Proceedings of the International Joint Conference on Neural Networks. Proceedings of the International Joint Conference on Neural Networks, IEEE, Institute of Electrical and Electronics Engineers, 2025 International Joint Conference on Neural Networks, IJCNN 2025, Rome, Italy, 30/06/25. https://doi.org/10.1109/IJCNN64981.2025.11229049","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2091815328","https://openalex.org/W2109426455","https://openalex.org/W2473418344","https://openalex.org/W2535690855","https://openalex.org/W2963956191","https://openalex.org/W2970641574","https://openalex.org/W3016564562","https://openalex.org/W3154479671","https://openalex.org/W3177765786","https://openalex.org/W4205228770","https://openalex.org/W4231844697","https://openalex.org/W4241781926","https://openalex.org/W4292793781","https://openalex.org/W4385571534","https://openalex.org/W4385572039","https://openalex.org/W4385573108","https://openalex.org/W4385847487","https://openalex.org/W4391136507"],"related_works":[],"abstract_inverted_index":{"Recent":[0],"advancements":[1],"in":[2,28,116,126,192],"Large":[3],"Language":[4,14],"Models":[5],"(LLMs)":[6],"have":[7,45],"significantly":[8],"enhanced":[9],"performance":[10],"across":[11],"various":[12,64],"Natural":[13],"Processing":[15],"(NLP)":[16],"tasks.":[17],"In":[18,134],"certain":[19],"fields,":[20],"particularly":[21],"healthcare,":[22],"the":[23,85,99,117,139,145,177],"risk":[24],"of":[25,87,119,141,148,156,181],"data":[26,30,41,89,96,203],"leakage":[27],"research":[29],"management":[31],"is":[32,78,132],"a":[33,79,154,163,193],"critical":[34],"concern":[35],"when":[36],"employing":[37],"LLMs.":[38,217],"To":[39],"ensure":[40],"privacy,":[42],"recent":[43],"studies":[44],"adopted":[46],"approaches,":[47],"such":[48],"as":[49],"de-identification":[50],"by":[51,187],"masking":[52],"out":[53],"personal":[54],"identifiable":[55],"information.":[56],"However,":[57],"these":[58,168,189],"anonymisation":[59,81],"techniques":[60],"remain":[61],"vulnerable":[62],"to":[63,94,170,214],"attacks,":[65,68,71],"including":[66],"linkage":[67],"attribute":[69],"inference":[70,74],"and":[72,103,121,159,175,179],"membership":[73],"attacks.":[75],"Differential":[76],"privacy":[77,104,111,143,160,178,184],"robust":[80],"technique":[82],"that":[83,201],"constrains":[84],"influence":[86],"individual":[88],"samples":[90],"during":[91],"model":[92,157],"training":[93,185],"address":[95],"leakage.":[97],"Nonetheless,":[98],"trade-off":[100],"between":[101],"utility":[102,180],"protection":[105],"remains":[106],"challenging.":[107],"Moreover,":[108],"while":[109],"differential":[110,142,183,205],"has":[112],"been":[113],"extensively":[114],"studied":[115],"context":[118],"tabular":[120],"image":[122],"data,":[123,131,152],"its":[124],"application":[125],"NLP,":[127],"especially":[128],"with":[129],"clinical":[130,151,195],"limited.":[133],"this":[135],"paper,":[136],"we":[137],"explore":[138],"integration":[140],"into":[144],"fine-tuning":[146],"process":[147],"LLMs":[149,169,207],"for":[150],"covering":[153],"range":[155],"sizes":[158],"standards":[161],"within":[162],"healthcare":[164],"context.":[165],"We":[166],"utilise":[167],"generate":[171],"synthetic":[172,190,202],"medical":[173],"notes":[174,191],"assess":[176],"our":[182],"approach":[186],"deploying":[188],"downstream":[194],"coding":[196],"task.":[197],"Our":[198],"findings":[199],"demonstrate":[200],"from":[204],"privacy-based":[206,216],"achieve":[208],"comparable":[209],"or":[210],"superior":[211],"classification":[212],"accuracy":[213],"non-differential":[215]},"counts_by_year":[],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-11-14T00:00:00"}
