Published on in Vol 10, No 8 (2022): August

Preprints (earlier versions) of this paper are available at https://preprints.jmir.org/preprint/38440, first published .
Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study

Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study

Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study

Journals

  1. Mengara O, Avila A, Falk T. Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research Directions. IEEE Access 2024;12:29004 View
  2. Bryan J, Li D. Comments on Contemporary Uses of Machine Learning for Electronic Health Records. North Carolina Medical Journal 2024;85(4) View
  3. Kühlem R, Otten D, Ludwig D, Hudde A, Rosenbaum A, Mauthe A. Backdoor Attacks on DNN and GBDT: A Case Study From the Insurance Domain. Applied Stochastic Models in Business and Industry 2025;41(5) View
  4. Ural O, Yoshigoe K. SecurePoL: Integration of Watermarking With Proof-of-Learning to Enhance Security Against Spoofing Attacks. IEEE Access 2025;13:213067 View

Books/Policy Documents

  1. Robinette P, Nguyen T, Sasaki S, Johnson T. Computer Security – ESORICS 2025. View
  2. Eralp E, Yavuz A, Gursoy M. Adversarial Example Detection and Mitigation Using Machine Learning. View

Conference Proceedings

  1. Putri A, Budiman G, Wijayanto I. 2025 1st International Conference on Emerging Trends in Information Systems and Informatics (ICETISI). Deep Neural Network Watermarking to Detect Backdoor Attacks in Datasets Using Wet Paper Coding View