|Mengying Sun||Michigan State University|
|Fengyi Tang||Michigan State University|
|Jinfeng Yi||Tencent AI Lab|
|Fei Wang||Weill Cornell Medical School|
|Jiayu Zhou||Michigan State University|
This paper studies electronic medical records (EHR). The authors propose an efficient and effective framework that learns a time-preferential minimum attack targeting the LSTM model with EHR inputs, and the authors leverage this attack strategy to screen medical records of patients and identify susceptible events and measurements.
The surging availability of electronic medical records (EHR) leads to increased research interests in medical predictive modeling. Recently many deep learning based predicted models are also developed for EHR data and demonstrated impressive performance. However, a series of recent studies showed that these deep models are not safe: they suffer from certain vulnerabilities. In short, a well-trained deep network can be extremely sensitive to inputs with negligible changes. These inputs are referred to as adversarial examples. In the context of medical informatics, such attacks could alter the result of a high performance deep predictive model by slightly perturbing a patient’s medical records. Such instability not only reflects the weakness of deep architectures, more importantly, it offers a guide on detecting susceptible parts on the inputs. In this paper, we propose an efficient and effective framework that learns a time-preferential minimum attack targeting the LSTM model with EHR inputs, and we leverage this attack strategy to screen medical records of patients and identify susceptible events and measurements. The efficient screening procedure can assist decision makers to pay extra attentions to the locations that can cause severe consequence if not measured correctly. We conduct extensive empirical studies on a real-world urgent care cohort and demonstrate the effectiveness of the proposed screening.