<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v27i1e76571</article-id>
      <article-id pub-id-type="pmid">41269747</article-id>
      <article-id pub-id-type="doi">10.2196/76571</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Considerations for Patient Privacy of Large Language Models in Health Care: Scoping Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Coristine</surname>
            <given-names>Andrew</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Han</surname>
            <given-names>Peijin</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Hou</surname>
            <given-names>Zhen</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Pilgram</surname>
            <given-names>Lisa</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Zhong</surname>
            <given-names>Xiaoying</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-1861-4046</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Li</surname>
            <given-names>Siyi</given-names>
          </name>
          <degrees>MM</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0001-2649-9933</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>Zhao</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3911-1125</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Ge</surname>
            <given-names>Long</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff4" ref-type="aff">4</xref>
          <xref rid="aff5" ref-type="aff">5</xref>
          <xref rid="aff6" ref-type="aff">6</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3555-1107</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Yu</surname>
            <given-names>Dongdong</given-names>
          </name>
          <degrees>MM</degrees>
          <xref rid="aff7" ref-type="aff">7</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2759-7647</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>Shijia</given-names>
          </name>
          <degrees>MM</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0002-8054-9855</ext-link>
        </contrib>
        <contrib id="contrib7" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>You</surname>
            <given-names>Liangzhen</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7422-1680</ext-link>
        </contrib>
        <contrib id="contrib8" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Shang</surname>
            <given-names>Hongcai</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff8" ref-type="aff">8</xref>
          <address>
            <institution>Dongfang Hospital</institution>
            <institution>Beijing University of Chinese Medicine</institution>
            <addr-line>No. 6 Fangxingyuan 1st District, Fangzhuang, Fengtai District, Beijing</addr-line>
            <addr-line>Beijing, 100078</addr-line>
            <country>China</country>
            <phone>86 18202525733</phone>
            <email>shanghongcai@126.com</email>
          </address>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Dongzhimen Hospital</institution>
        <institution>Beijing University of Chinese Medicine</institution>
        <addr-line>Beijing, null</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Key Laboratory of Chinese Internal Medicine of the Ministry of Education</institution>
        <institution>Beijing University of Chinese Medicine</institution>
        <addr-line>Beijing, null</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Institute of Basic Research in Clinical Medicine</institution>
        <institution>China Academy of Chinese Medical Sciences</institution>
        <addr-line>Beijing</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Department of Health Policy and Health Management</institution>
        <institution>School of Public Health</institution>
        <institution>Lanzhou University</institution>
        <addr-line>Lanzhou</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff5">
        <label>5</label>
        <institution>Evidence-Based Social Science Research Center</institution>
        <institution>School of Public Health</institution>
        <institution>Lanzhou University</institution>
        <addr-line>Lanzhou</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff6">
        <label>6</label>
        <institution>WHO Collaborating Center for Guideline Implementation and Knowledge Translation</institution>
        <addr-line>Lanzhou</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff7">
        <label>7</label>
        <institution>Second Clinical College of Guangzhou University of Chinese Medicine</institution>
        <addr-line>Guangzhou</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff8">
        <label>8</label>
        <institution>Dongfang Hospital</institution>
        <institution>Beijing University of Chinese Medicine</institution>
        <addr-line>Beijing</addr-line>
        <country>China</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Hongcai Shang <email>shanghongcai@126.com</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2025</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>21</day>
        <month>11</month>
        <year>2025</year>
      </pub-date>
      <volume>27</volume>
      <elocation-id>e76571</elocation-id>
      <history>
        <date date-type="received">
          <day>26</day>
          <month>4</month>
          <year>2025</year>
        </date>
        <date date-type="rev-request">
          <day>16</day>
          <month>7</month>
          <year>2025</year>
        </date>
        <date date-type="rev-recd">
          <day>2</day>
          <month>11</month>
          <year>2025</year>
        </date>
        <date date-type="accepted">
          <day>3</day>
          <month>11</month>
          <year>2025</year>
        </date>
      </history>
      <copyright-statement>©Xiaoying Zhong, Siyi Li, Zhao Chen, Long Ge, Dongdong Yu, Shijia Wang, Liangzhen You, Hongcai Shang. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 21.11.2025.</copyright-statement>
      <copyright-year>2025</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2025/1/e76571" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The application of large language models (LLMs) in health care holds significant potential for enhancing patient care and advancing medical research. However, the protection of patient privacy remains a critical issue, especially when handling patient health information (PHI).</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This scoping review aims to evaluate the adequacy of current approaches and identify areas in need of improvement to ensure robust patient privacy protection in the existing studies about PHI-LLMs within the health care domain.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>A search of the literature published from January 1, 2022, to July 20, 2025, was performed on July 20, 2025, using 2 databases (PubMed and Embase). This scoping review focused on the following three research questions: (1) What studies on the development and application of LLMs using PHI currently exist within the health care domain? (2) What patient privacy considerations are addressed in existing PHI-LLMs research, and are these measures sufficient? (3) How can future research on the development and application of LLMs using PHI better protect patient privacy? Studies were included if they focused on the development and application of LLMs within health care using PHI, encompassing activities such as model construction, fine-tuning, optimization, testing, and performance comparison. Eligible literature comprised original research articles written in English. Conversely, studies were excluded if they used publicly available datasets, under the assumption that such data have been adequately deidentified. Additionally, non-English publications, reviews, abstracts, incomplete reports, and preprints were excluded from the review due to the lack of rigorous peer review.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>This study systematically identified 9823 studies on PHI-LLM and included 464 studies published between 2022 and 2025. Among the 464 studies, (1) a small number of studies neglected ethical review (n=45, 9.7%) and patient informed consent (n=148, 31.9%) during the research process, (2) more than a third of the studies (n=178, 38.4%) failed to report whether to implement effective measures to protect PHI, and (3) there was a significant lack of transparency and comprehensive detail in anonymization and deidentification methods.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>We propose comprehensive recommendations across 3 phases—study design, implementation, and reporting—to strengthen patient privacy protection and transparency in PHI-LLM. This study emphasizes the urgent need for the development of stricter regulatory frameworks and the adoption of advanced privacy protection technologies to effectively safeguard PHI. It is anticipated that future applications of LLMs in the health care field will achieve a balance between innovation and robust patient privacy protection, thereby enhancing ethical standards and scientific credibility.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>patient privacy</kwd>
        <kwd>patient health information</kwd>
        <kwd>large language models</kwd>
        <kwd>health care</kwd>
        <kwd>scoping review</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>The application of large language models (LLMs) within the medical domain is undergoing rapid growth [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. Key areas of investigation include assisted diagnosis [<xref ref-type="bibr" rid="ref3">3</xref>] and the structured representation of electronic health records [<xref ref-type="bibr" rid="ref4">4</xref>]. These models exhibit considerable potential, with preliminary findings from research and practical implementations showing promising results. LLMs through pretraining and fine-tuning on extensive datasets containing medical literature, clinical records, and biomedical knowledge bases, leverage deep learning methodologies to develop rich linguistic representations and demonstrate robust contextual understanding and knowledge integration [<xref ref-type="bibr" rid="ref5">5</xref>]. This results in significantly enhanced performance compared with traditional language processing tools across natural language understanding, pattern recognition, and correlation analysis, with notable advantages in processing intricate medical data and facilitating cross-domain knowledge transfer [<xref ref-type="bibr" rid="ref2">2</xref>]. While the pursuit of enhanced model performance remains crucial, ensuring robust protection of patient privacy and data security remains a paramount concern and a fundamental requirement for the responsible and sustainable advancement of LLM applications in health care. This presents a complex challenge that necessitates both technical and regulatory solutions [<xref ref-type="bibr" rid="ref6">6</xref>-<xref ref-type="bibr" rid="ref8">8</xref>].</p>
      <p>A substantial portion of current research on LLMs for health care applications uses publicly available resources [<xref ref-type="bibr" rid="ref9">9</xref>], such as the Medical Information Mart for Intensive Care-IV [<xref ref-type="bibr" rid="ref10">10</xref>]. However, some studies are conducted using internal patient health information (PHI) repositories, which often contain highly sensitive personally identifiable information (PII) [<xref ref-type="bibr" rid="ref11">11</xref>], including patient names, medical record numbers, age, zip code, admission date, and so on. This practice necessitates robust data governance frameworks to ensure patient privacy and data security. In conventional approaches to developing computer models using patient data, researchers typically processed and trained data within local or strictly regulated environments. This practice inherently reduced the risk of sensitive data compromise during transmission and storage [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref>]. However, deploying LLMs on the cloud often requires uploading vast amounts of raw medical data directly to remote servers. These servers may be distributed across different regions and are frequently not entirely under the control of health care institutions or researchers [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref14">14</xref>]. Beyond these conventional risks, LLMs introduce additional privacy concerns [<xref ref-type="bibr" rid="ref15">15</xref>] due to their generative nature; they may inadvertently reproduce sensitive information learned during training, and their large scale and complexity expose them to attacks such as model inversion or prompt injection. Together, these factors make the protection of medical data in LLM deployment especially challenging. Recent studies have highlighted concrete privacy threats associated with LLM use: fine-tuning can significantly increase PII memorization and vulnerability to leakage attacks, especially when tuning specific layers of the model [<xref ref-type="bibr" rid="ref16">16</xref>]; novel mitigation strategies like “Whispered Tuning,” which combine PII redaction, differential privacy, and output filtering, can markedly reduce leakage while preserving performance [<xref ref-type="bibr" rid="ref17">17</xref>]; and beyond memorization, pretrained LLMs can infer personal attributes (eg, location, income, and gender) from seemingly innocuous text with high accuracy [<xref ref-type="bibr" rid="ref18">18</xref>]. Consequently, data transmission and storage processes may encounter heightened risks of security vulnerabilities and unauthorized access. Whether through misuse by internal personnel or external cyberattacks, PHI is at risk of improper use or malicious disclosure [<xref ref-type="bibr" rid="ref15">15</xref>].</p>
      <p>Therefore, reconciling the potential of LLMs to enhance health care quality and efficiency with the imperative to protect patient privacy represents a significant challenge requiring careful consideration. The regulatory oversight of LLMs processing PHI is governed by a complex patchwork of national and international privacy laws, including the General Data Protection Regulation in the European Union and the Health Insurance Portability and Accountability Act (HIPAA) in the United States [<xref ref-type="bibr" rid="ref6">6</xref>]. Besides, Transparent Reporting of a Multivariable Prediction Model for Individual Prognosis or Diagnosis (TRIPOD)-LLM [<xref ref-type="bibr" rid="ref19">19</xref>] is an extension of the TRIPOD+AI statement, addressing the unique challenges of LLMs in biomedical and health care applications. There is a growing consensus within the academic community regarding the paramount importance of patient privacy protection in LLM research, with numerous concerns and queries being raised concerning the potential risks to sensitive data [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. A range of privacy-preserving techniques is being widely considered and adopted within the health care domain to ensure data security and regulatory compliance. These include established methods such as deidentification [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>], differential privacy [<xref ref-type="bibr" rid="ref24">24</xref>], federated learning [<xref ref-type="bibr" rid="ref25">25</xref>], and homomorphic encryption [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref27">27</xref>].</p>
      <p>This leads us to our core research question: What measures are being used to protect patient privacy in the PHI-LLMs in the health care field, and are these measures sufficient? Although there are some systematic reviews or scope reviews of LLM research in health care, no scoping review has been published on this critical issue. The primary objective of this study is to conduct a scoping review of the existing literature on PHI-LLMs in health care, evaluate the adequacy of current approaches, and identify areas in need of improvement to ensure robust patient privacy protection.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Study Design</title>
        <p>This scoping review was guided by the framework for scoping studies by Arksey and O’Malley [<xref ref-type="bibr" rid="ref28">28</xref>]. Besides, the study reporting followed the Preferred Reporting Items for Systematic Reviews and Meta-Analyses extension for Scoping Reviews (PRISMA-ScR; checklist provided in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>) [<xref ref-type="bibr" rid="ref29">29</xref>]. We focused on the following three research questions: (1) What studies on the development and application of LLMs using PHI currently exist within the health care domain? (2) What patient privacy considerations are addressed in existing PHI-LLMs research, and are these measures sufficient? (3) How can future research on the development and application of LLMs using PHI better protect patient privacy?</p>
      </sec>
      <sec>
        <title>Eligibility Criteria</title>
        <p>The inclusion and exclusion criteria for studies are shown in <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>.</p>
        <boxed-text id="box1" position="float">
          <title>Inclusion and exclusion criteria.</title>
          <p>
            <bold>Inclusion criteria</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Studies were included if they focused on the development and application of large language models within health care using personal health information, encompassing activities such as model construction, fine-tuning, optimization, testing, and performance comparison.</p>
            </list-item>
            <list-item>
              <p>Eligible literature comprised original research articles written in English.</p>
            </list-item>
          </list>
          <p>
            <bold>Exclusion criteria</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Studies used publicly available datasets, under the assumption that such data have been adequately deidentified.</p>
            </list-item>
            <list-item>
              <p>Studies that were not reviews, abstracts, incomplete reports, or preprints were excluded from the review due to the lack of rigorous peer review.</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
      <sec>
        <title>Data Sources, Search Strategy, and Study Selection</title>
        <p>We searched PubMed and Embase for studies published between January 1, 2022, and July 20, 2025. This timeframe was chosen to coincide with the release and rapid adoption of advanced LLMs (eg, GPT-3.5 and ChatGPT) and the subsequent surge of their applications in health care. Earlier studies (published before 2022), which primarily investigated transformer-based or nongenerative models, were excluded as they fell outside the scope of this review. The search strategies were drafted by ZXY and further refined through team discussion. The final search strategy can be found in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>. The final search results were exported into EndNote X9, and duplicates were removed by a library technician.</p>
        <p>First, the titles and abstracts of identified studies were independently screened by 2 researchers (ZXY and LSY) based on the inclusion and exclusion criteria. Any disagreements between the reviewers were resolved through group discussions involving at least 2 researchers to ensure consensus and maintain the integrity of the selection process. The full-text review was also conducted by 2 researchers (ZXY and LSY) independently, with conflicts resolved through whole-group discussion.</p>
      </sec>
      <sec>
        <title>Data Extraction</title>
        <p>The data extraction form was initially drafted by ZXY based on the study objectives and research questions. Following the draft, the form was refined through group discussions to develop a preliminary extraction template. To ensure consistency in the definitions and extraction criteria, 10 articles were randomly selected for a pilot extraction. Feedback from this pilot phase was used to finalize the extraction form. Subsequently, ZXY and LSY independently extracted data from the included studies. Any conflicts or discrepancies encountered during the extraction process were resolved through comprehensive group discussions involving all researchers to maintain the integrity and consistency of the data extraction.</p>
        <p>The extracted data encompassed three main categories:</p>
        <list list-type="order">
          <list-item>
            <p>General characteristics of included studies: this included the first author’s name, publication year, country, the name and type of the LLMs used or developed, the disease domain as classified by the World Health Organization, and the type of tasks based on the classification outlined in the previous article [<xref ref-type="bibr" rid="ref9">9</xref>].</p>
          </list-item>
          <list-item>
            <p>General characteristics of clinical design: this section captured the sample size, the number of centers, the type of data used, the data collection method, the reporting statement they followed, and whether the study protocol was registered or not. The name of the LLM used or developed, the research objective, and the deployment type.</p>
          </list-item>
          <list-item>
            <p>Patient privacy protection considerations: this part focused on the data source, the purpose of using PHI, whether the study underwent ethical review or approval, the declaration of data availability, whether patient consent was obtained, and the PHI protection techniques used.</p>
          </list-item>
        </list>
        <p>All extracts are based on reports from the included study itself.</p>
      </sec>
      <sec>
        <title>Data Analysis</title>
        <p>Descriptive analyses were performed to summarize the characteristics of the included studies. Categorical variables were summarized as frequencies and percentages. Sample size was further categorized into predefined ranges and presented as frequencies and percentages, while other continuous or count-based variables were directly summarized as reported. All results were presented in tables or figures according to the main domains of study characteristics, data characteristics, and privacy protection measures.</p>
      </sec>
      <sec>
        <title>Patient and Public Involvement</title>
        <p>As this was a scoping review of previously published research, no patients or the public were involved in the design of this study.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Selection of Sources of Evidence</title>
        <p>After removing duplicates, a total of 6174 citations were identified through searches of electronic databases and references in review articles. Based on their titles and abstracts, 3181 full-text articles were retrieved and assessed for eligibility. Of these, 2993 were excluded for the following reasons: 4 were not written in English, 48 were preprint papers, 126 were unrelated to LLM research, 1387 were reviews, comments, or letters, 38 were protocols, and 1390 did not involve relevant patient data. Following the eligibility assessment, a total of 2717 records were excluded for the following reasons: 647 used only public databases or previously published cases, 439 simulated clinical scenarios or patients rather than using real-world data, 1587 focused on medical knowledge quizzes or examinations, and 44 represented secondary analyses. Ultimately, 464 studies were deemed eligible for this review (<xref rid="figure1" ref-type="fig">Figure 1</xref>) [<xref ref-type="bibr" rid="ref30">30</xref>]. The specific references included in the analysis are listed in the <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>PRISMA (Preferred Reporting Items for Systematic reviews and Meta-Analyses) study selection diagram.</p>
          </caption>
          <graphic xlink:href="jmir_v27i1e76571_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>General Characteristics of the Included Studies</title>
        <p>To provide an overview of the studies included in this review, we summarize their general characteristics in <xref ref-type="table" rid="table1">Table 1</xref>. This review encompasses studies published between January 1, 2022, and July 20, 2025. Of the 464 studies included in this review, the majority were published in 2025 (n=256, 55.2%), with a substantial proportion appearing in 2024 (n=188, 40.5%). In contrast, only a small number of studies were published in 2023 (19/464, 4.1%) and 2022 (1/464, 0.2%). This temporal distribution underscores the rapid and recent surge of research on LLM applications in health care, with most evidence emerging within the past 2 years. Based on the institutions of the first authors, the largest proportion of studies originated from the United States (153/464, 33.0%), followed by China (94/464, 20.3%) and Germany (37/464, 8.0%). Moderate contributions were observed from Turkey (31/464, 6.7%), Italy (17/464, 3.7%), Israel (13/464, 2.8%), South Korea (12/464, 2.6%), and the United Kingdom (12/464, 2.6%). Studies from other countries collectively accounted for 20.5% (n=95).</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>General characteristics of included studies.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="30"/>
            <col width="800"/>
            <col width="0"/>
            <col width="140"/>
            <thead>
              <tr valign="top">
                <td colspan="4">Characteristic</td>
                <td>Values</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="5">
                  <bold>Publication year, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">2025</td>
                <td colspan="2">256 (55.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">2024</td>
                <td colspan="2">188 (40.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">2023</td>
                <td colspan="2">19 (4.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">2022</td>
                <td colspan="2">1 (0.2)</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Country, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">United States</td>
                <td colspan="2">153 (33.0)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">China</td>
                <td colspan="2">94 (20.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Germany</td>
                <td colspan="2">37 (8.0)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Turkey</td>
                <td colspan="2">31 (6.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Italy</td>
                <td colspan="2">17 (3.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Israel</td>
                <td colspan="2">13 (2.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">South Korea</td>
                <td colspan="2">12 (2.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">United Kingdom</td>
                <td colspan="2">12 (2.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Other countries<sup>a</sup></td>
                <td colspan="2">95 (20.5)</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Model type, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Existing model</td>
                <td colspan="2">356 (76.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Fine-tuning model + existing model</td>
                <td colspan="2">49 (10.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Fine-tuning model</td>
                <td colspan="2">40 (8.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Self-developed model</td>
                <td colspan="2">17 (3.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Self-developed model + existing model</td>
                <td colspan="2">2 (0.4)</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Location of the large language model, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Cloud deployment</td>
                <td colspan="2">72 (15.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Local deployment</td>
                <td colspan="2">70 (15.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">External cloud service</td>
                <td colspan="2">69 (14.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Others<sup>b</sup></td>
                <td colspan="2">8 (1.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Cannot judge</td>
                <td colspan="2">57 (12.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Not report</td>
                <td colspan="2">188 (40.5)</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Task type, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Making diagnoses</td>
                <td colspan="2">134 (28.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Clinical note-taking</td>
                <td colspan="2">62 (13.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Making treatment recommendations</td>
                <td colspan="2">45 (9.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Generating medical reports</td>
                <td colspan="2">43 (9.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Biomedical data mining</td>
                <td colspan="2">38 (8.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Prognostic predictive model</td>
                <td colspan="2">22 (4.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Communicating with patients</td>
                <td colspan="2">20 (4.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Making diagnoses + Making treatment recommendations</td>
                <td colspan="2">19 (4.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Other tasks<sup>c</sup></td>
                <td colspan="2">81 (17.5)</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Sample size<sup>d</sup>, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="4">
                  <bold>Patients (n=342, 73.7%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>&#60;100</td>
                <td colspan="2">125 (36.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>100-1000</td>
                <td colspan="2">161 (47.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>1000-10,000</td>
                <td colspan="2">35 (10.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>≥10,000</td>
                <td colspan="2">19 (5.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Not report</td>
                <td colspan="2">2 (0.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="4">
                  <bold>Token (n=16, 3.4%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>100-1000</td>
                <td colspan="2">10 (62.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>1000-10,000</td>
                <td colspan="2">3 (18.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>≥10,000</td>
                <td colspan="2">2 (12.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Not report</td>
                <td colspan="2">1 (6.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="4">
                  <bold>Notes (n=94, 20.3%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>&#60;100</td>
                <td colspan="2">12 (12.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>100-1000</td>
                <td colspan="2">19 (20.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>1000-10,000</td>
                <td colspan="2">23 (24.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>≥10,000</td>
                <td colspan="2">38 (40.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Not report</td>
                <td colspan="2">2 (2.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="4">
                  <bold>Images (n=12, 2.6%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>&#60;100</td>
                <td colspan="2">2 (16.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>100-1000</td>
                <td colspan="2">7 (58.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>1000-10,000</td>
                <td colspan="2">1 (8.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>≥10,000</td>
                <td colspan="2">2 (16.7)</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Number of centers<sup>e</sup>, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">1</td>
                <td colspan="2">377 (81.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">2</td>
                <td colspan="2">41 (8.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">3</td>
                <td colspan="2">16 (3.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">4</td>
                <td colspan="2">7 (1.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">≥5</td>
                <td colspan="2">20 (4.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Not report</td>
                <td colspan="2">3 (0.6)</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Summarize the large language models used in the research, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">ChatGPT</td>
                <td colspan="2">341 (73.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Llama</td>
                <td colspan="2">74 (15.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Mistral</td>
                <td colspan="2">27 (5.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Flan</td>
                <td colspan="2">13 (2.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Claude</td>
                <td colspan="2">19 (4.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Gemini</td>
                <td colspan="2">32 (6.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Gemma</td>
                <td colspan="2">9 (1.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">GLM</td>
                <td colspan="2">9 (1.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Deepseek</td>
                <td colspan="2">6 (1.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Qwen</td>
                <td colspan="2">13 (2.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Fine-tuning</td>
                <td colspan="2">49 (10.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Others</td>
                <td colspan="2">73 (15.7)</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Type of data, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Text</td>
                <td colspan="2">366 (78.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Text + Image</td>
                <td colspan="2">35 (7.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Text + Audio</td>
                <td colspan="2">4 (0.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Image</td>
                <td colspan="2">56 (12.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Audio</td>
                <td colspan="2">2 (0.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Text + Image + Audio</td>
                <td colspan="2">1 (0.2)</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Data collection method, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Retrospective</td>
                <td colspan="2">409 (88.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Prospective</td>
                <td colspan="2">53 (11.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Prospective + retrospective</td>
                <td colspan="2">2 (0.4)</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Follow the statement, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Not report</td>
                <td colspan="2">435 (93.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">STROBE<sup>f</sup></td>
                <td colspan="2">17 (3.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">STARD<sup>g</sup></td>
                <td colspan="2">3 (0.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">TRIPOD<sup>h</sup></td>
                <td colspan="2">7 (1.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">CLAIM<sup>i</sup></td>
                <td colspan="2">2 (0.4)</td>
              </tr>
              <tr valign="top">
                <td colspan="5">
                  <bold>Registered, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">No</td>
                <td colspan="2">451 (97.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Yes</td>
                <td colspan="2">13 (2.8)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>Other countries: Japan (n=11), Australia (n=10), France (n=9), Spain (n=9), Canada (n=6), Switzerland (n=5), India (n=5), Singapore (n=4), Belgium (n=3), Brazil (n=3), Croatia (n=3), the Netherlands (n=3), Pakistan (n=3), Saudi Arabia (n=3), Ireland (n=2), Mexico (n=2), Portugal (n=2), Romania (n=2), Thailand (n=2), Burkina Faso (n=1), Finland (n=1), Iran (n=1), Jordan (n=1), Poland (n=1), Ukraine (n=1), United Arab Emirates (n=1), and Vietnam (n=1).</p>
            </fn>
            <fn id="table1fn2">
              <p><sup>b</sup>Other location of LLMs: local deployment + cloud deployment (n=5); local deployment + external cloud service (n=2); cloud deployment + external cloud service (n=1).</p>
            </fn>
            <fn id="table1fn3">
              <p><sup>c</sup>Other tasks: synthesizing data for research (n=15), translation (n=12), triaging patients (n=11), conducting medical research (n=7), making diagnoses + triaging patients + Making treatment recommendations (n=5), making diagnoses + generating medical reports (n=4), generating billing codes (n=3), writing prescriptions (n=3), making diagnoses + triaging patients (n=2), making diagnoses + biomedical data mining (n=2); educating patients (n=2), making treatment recommendations + triaging patients (n=2), communicating with patients + making treatment recommendations (n=2), clinical note-taking + making treatment recommendations (n=2); enhancing medical knowledge (n=1), educating patients + making treatment recommendations + making diagnoses (n=1), communicating with patients + making diagnoses + making treatment recommendations (n=1), triaging patients + prognostic (n=1), generating medical reports + making treatment recommendations (n=1), generating medical reports + prognostic (n=1), clinical note-taking + generating medical reports (n=1), clinical note-taking + prognostic (n=1), and clinical note-taking + translation (n=1).</p>
            </fn>
            <fn id="table1fn4">
              <p><sup>d</sup>Sample size was defined according to the primary data modality: number of patients (clinical studies), number of images (imaging studies), or number of clinical notes/documents (text-based studies), number of tokens (referring to the unit of original studies).</p>
            </fn>
            <fn id="table1fn5">
              <p><sup>e</sup>Referring to the number of clinical sites contributing patient data.</p>
            </fn>
            <fn id="table1fn6">
              <p><sup>f</sup>STROBE: Strengthening the Reporting of Observational Studies in Epidemiology.</p>
            </fn>
            <fn id="table1fn7">
              <p><sup>g</sup>STARD: Standards for Reporting of Diagnostic Accuracy.</p>
            </fn>
            <fn id="table1fn8">
              <p><sup>h</sup>TRIPOD: Transparent Reporting of a Multivariable Prediction Model for Individual Prognosis or Diagnosis.</p>
            </fn>
            <fn id="table1fn9">
              <p><sup>i</sup>CLAIM: Checklist for Artificial Intelligence in Medical Imaging.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>With respect to model type, 356 (76.7%) studies used existing models, 49 (10.6%) studies combined fine-tuning with existing models, 40 (8.6%) studies applied fine-tuning alone, 17 (3.7%) studies developed their own models, and 2 (0.4%) studies reported using both self-developed and existing models. Regarding the location of LLM deployment, 72 (15.5%) studies reported cloud deployment, 70 (15.1%) studies reported local deployment, and 69 (14.9%) studies reported the use of external cloud services. Eight (1.7%) studies used other deployment approaches, 57 (12.3%) studies could not be judged from the report, and 188 (40.5%) studies did not provide deployment information.</p>
        <p>A total of 134 (28.9%) studies focused on making diagnoses, 62 (13.4%) studies focused on clinical note-taking, 45 (9.7%) studies focused on making treatment recommendations, 43 (9.3%) studies focused on generating medical reports, and 38 (8.2%) studies focused on biomedical data mining. Prognostic predictive model tasks were examined in 22 (4.7%) studies, and communication with patients in 20 (4.3%) studies. In addition, 19 (4.1%) studies combined diagnostic and treatment recommendation tasks, while other tasks were reported in 81 (17.5%) studies.</p>
        <p>Regarding sample size, the distribution was varied: 125 (36.5%) studies enrolled fewer than 100 patients, 161 (47.1%) studies included 100-1000 patients, 35 (10.2%) studies included 1000-10,000 patients, 19 (5.6%) studies included more than 10,000 patients, and 2 (0.6%) studies did not report sample size. For token-based datasets (n=16), 10 (62.5%) studies used 100-1000 tokens, 3 (18.8%) studies used 1000-10,000, 2 (12.5%) studies used more than 10,000, and 1 (6.3%) study did not report. Regarding note-based datasets (n=94), 12 (12.8%) studies analyzed fewer than 100 notes, 19 (20.2%) studies used 100-1000, 23 (24.5%) studies used 1000-10,000, 38 (40.4%) studies used more than 10,000, and 2 (2.1%) studies did not report. For image-based datasets (n=12), 2 (16.7%) studies included fewer than 100 images, 7 (58.3%) studies included 100-1000, 1 (8.3%) studies included 1000-10,000, and 2 (16.7%) studies included more than 10,000.</p>
        <p>Regarding the number of centers, 377 (81.3%) studies were conducted in a single center, 41 (8.8%) studies were conducted in 2 centers, 16 (3.4%) studies were conducted in 3 centers, and 7 (1.5%) studies were conducted in 4 centers. Twenty (4.3%) studies involved 5 or more centers, while 3 (0.6%) studies did not report this information. As for LLMs used in the research, ChatGPT was the most frequently used model, accounting for 341 (73.5%) studies. This was followed by 74 (15.9%) studies used Llama, 32 (6.9%) studies used Gemini, 27 (5.8%) studies used Mistral, 19 (4.1%) studies used Claude, and 13 (2.8%) studies used Qwen. Additionally, 49 (10.6%) studies applied fine-tuning techniques, while 73 (15.7%) studies reported using other models not specifically listed. Regarding data type, 366 (78.9%) studies used text; 56 (12.1%) studies used image data; 35 (7.5%) studies combined text and image; 4 (0.9%) studies combined text and audio; 2 (0.4%) studies used audio only; and 1 (0.2%) study combined text, image, and audio. With respect to data collection method, 409 studies (88.1%) were retrospective, 53 (11.4%) studies were prospective, and 2 (0.4%) studies combined both prospective and retrospective approaches.</p>
        <p>With respect to reporting standards, 435 (93.8%) studies did not specify adherence to any guideline/statement, while 17 (3.7%) studies followed Strengthening the Reporting of Observational Studies in Epidemiology (STROBE) statement, 3 (0.6%) studies followed the Standards for Reporting of Diagnostic Accuracy (STARD) statement, 7 (1.5%) studies followed TRIPOD statement, and 2 (0.4%) studies followed Checklist for Artificial Intelligence in Medical Imaging. Regarding study registration, 451 (97.2%) studies were not registered, and only 13 (2.8%) studies reported registration.</p>
        <p>The Sankey diagram (<xref rid="figure2" ref-type="fig">Figure 2</xref>) shows that the most frequent disease-task pairs included tumors with making diagnoses (n=35), tumors with making treatment recommendations (n=23), and tumors with clinical note-taking (n=16). In addition, studies categorized as “not special” also frequently addressed making diagnoses (n=24) and clinical note-taking (n=15). Other notable pairs included musculoskeletal disorders with making diagnoses (n=17), neurological disorders with making diagnoses (n=13), and circulatory diseases with making diagnoses (n=11). Tasks such as generating medical reports and biomedical data mining were also commonly associated with tumors and “not special” categories. The summary table could be found in <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Sankey diagram of disease categories and task types.</p>
          </caption>
          <graphic xlink:href="jmir_v27i1e76571_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Characteristics of Privacy Protection</title>
        <p><xref ref-type="table" rid="table2">Table 2</xref> outlines the characteristics of privacy protection measures implemented in the included studies. Regarding ethical oversight, 419 (90.3%) studies reported approval from an ethics committee, whereas 45 (9.7%) studies did not. With respect to patient consent, 224 (48.3%) studies reported a waiver of informed consent, 92 (19.8%) studies indicated that informed consent had been obtained, and 148 (31.9%) studies did not report consent information. For data availability, 203 (43.8%) studies did not provide a statement, 160 (34.5%) studies declared that data were available from the corresponding author upon reasonable request, 66 (14.2%) studies stated that data were not available, and 35 (7.5%) studies made data publicly accessible.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Characteristics of privacy protection. Our categorization of privacy protection methods is based on terminology as reported by the original studies. However, the definitions of “de-identification” and “anonymization” vary across contexts; thus, the risk implications should be interpreted with caution.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="30"/>
            <col width="740"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Characteristics</td>
                <td>Values, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>Ethical review</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Yes</td>
                <td>419 (90.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">No</td>
                <td>45 (9.7)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Patient consent</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Waiver of informed consent</td>
                <td>224 (48.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Not report</td>
                <td>148 (31.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Informed consent has been obtained</td>
                <td>92 (19.8)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Data availability declaration</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Not report</td>
                <td>203 (43.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Corresponding author on reasonable request</td>
                <td>160 (34.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Not open</td>
                <td>66 (14.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Public</td>
                <td>35 (7.5)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Privacy protection technology</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Not report</td>
                <td>178 (38.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">
                  <bold>Deidentification</bold>
                </td>
                <td>158 (34.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Cannot judge from report</td>
                <td>116 (73.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Based on manual</td>
                <td>17 (10.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Based on rule matching</td>
                <td>13 (8.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>Others<sup>a</sup></td>
                <td>12 (7.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Anonymization</td>
                <td>91 (19.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Deidentification+Anonymization</td>
                <td>23 (5.0)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Others<sup>b</sup></td>
                <td>14 (3.0)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Is there a statement to remove any personally identifiable information?</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">No</td>
                <td>363 (78.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Yes</td>
                <td>101 (21.8)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Were direct identifiers or indirect identifiers removed?</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Direct identifiers</td>
                <td>166 (35.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Indirect identifiers</td>
                <td>9 (1.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Cannot judge</td>
                <td>107 (23.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Not report</td>
                <td>182 (39.2)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Whether the degree of deidentification is assessed?</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">No</td>
                <td>458 (98.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Yes</td>
                <td>6 (1.3)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Reidentification protection technology used?</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">No</td>
                <td>455 (98.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Yes</td>
                <td>9 (1.9)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Declaration of compliance with safety standards</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Health Insurance Portability and Accountability Act</td>
                <td>44 (9.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">General Data Protection Regulation</td>
                <td>6 (1.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Both</td>
                <td>2 (0.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">Not report</td>
                <td>412 (88.8)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>Based on rule matching + machine learning + deep learning (n=3), based on LLMs (n=2), based on rule matching + manual (n=2), based on rule matching + machine learning (n=1), based on synthetic data (n=1), based on postprocessing (n=1), based on machine learning (n=1), and based on deep learning+ postprocessing (n=1).</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>Data hosting (n=5), anonymization + data hosting (n=3), federated learning (n=1), anonymization + data hosting + homomorphic encryption (n=1), anonymization + homomorphic encryption (n=1), deidentification + data hosting (n=1), data augmentation (likely referred to synthetic data generation; n=1), and homomorphic encryption (n=1).</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>When examining privacy protection technologies, 178 (38.4%) studies did not report the methods used, while 158 (34.1%) studies applied deidentification, 91 (19.6%) studies used anonymization, 23 (5.0%) studies reported combining both, and 14 (3.0%) studies used other technologies. Among those providing more detail about deidentification, 17 (10.8%) studies used manual methods, 13 (8.2%) studies applied rule-based matching, 12 (7.6%) studies reported other approaches, and 116 (73.4%) studies cannot be judged from the reports.</p>
        <p>Concerning statements on the removal of personally identifiable information, 363 (78.2%) studies did not provide such a statement, while 101 (21.8%) studies explicitly reported it. About the type of identifiers removed, 166 (35.8%) studies specified the removal of direct identifiers, 9 (1.9%) studies reported the removal of indirect identifiers, 107 (23.1%) studies could not be judged from the report, and 182 (39.2%) studies did not provide this information. Regarding assessment of the degree of deidentification, 458 (98.7%) studies did not report such an assessment, while 6 (1.3%) studies did. Concerning reidentification protection technologies, 455 (98.1%) studies did not use them, and 9 (1.9%) studies reported their use. With respect to compliance with safety standards, 44 (9.5%) studies declared adherence to HIPAA, 6 (1.3%) studies to the General Data Protection Regulation, and 2 (0.4%) studies to both, whereas 412 (88.8%) studies did not provide such information.</p>
        <p><xref ref-type="table" rid="table3">Table 3</xref> shows the characteristics of privacy protection technology for different data types. Among text-based studies (n=366), 131 (35.8%) studies applied deidentification, 74 (20.2%) studies used anonymization, 15 (4.1%) studies combined both, 4 (1.1%) studies reported data hosting, 2 (0.5%) studies reported anonymization with data hosting, 6 (1.6%) studies used other methods, and 134 (36.6%) studies did not report. For image-based studies (n=56), 12 (21.4%) studies reported deidentification, 10 (17.9%) studies reported anonymization, 5 (8.9%) studies reported both, 1 (1.8%) study reported anonymization with data hosting, 1 (1.8%) study reported data hosting, and 27 (48.2%) studies did not report. For audio-based studies (n=2), one (50.0%) study reported anonymization and one (50.0%) study did not. For combined text and image studies (n=35), 14 (40.0%) studies used deidentification, 6 (17.1%) studies used anonymization, 3 (8.6%) studies used both, and 12 (34.3%) studies did not report. For text and audio studies (n=4), one (25.0%) study reported deidentification, and 3 (75.0%) studies did not. The single study using text, image, and audio data did not report its privacy protection method.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Characteristics of privacy protection technology for different data types.</p>
          </caption>
          <table border="1" rules="groups" cellpadding="5" frame="hsides" width="1000" cellspacing="0">
            <col width="30"/>
            <col width="670"/>
            <col width="300"/>
            <thead>
              <tr valign="bottom">
                <td colspan="2">Type of data and privacy protection technology<sup>a</sup></td>
                <td>Values, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>Text (n=366)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Deidentification</td>
                <td>131 (35.8)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Anonymization</td>
                <td>74 (20.2)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Deidentification + anonymization</td>
                <td>15 (4.1)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Data hosting</td>
                <td>4 (1.1)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Anonymization + data hosting</td>
                <td>2 (0.5)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Others<sup>b</sup></td>
                <td>6 (1.6)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Not reported</td>
                <td>134 (36.6)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Images (n=56)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Deidentification</td>
                <td>12 (21.4)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Anonymization</td>
                <td>10 (17.9)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Deidentification + anonymization</td>
                <td>5 (8.9)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Anonymization + data hosting</td>
                <td>1 (1.8)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Data hosting</td>
                <td>1 (1.8)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Not reported</td>
                <td>27 (48.2)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Audio (n=2)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Anonymization</td>
                <td>1 (50.0)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Not reported</td>
                <td>1 (50.0)</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Text</bold>+<bold>Images (n=35)</bold></td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Deidentification</td>
                <td>14 (40.0)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Anonymization</td>
                <td>6 (17.1)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Deidentification + anonymization</td>
                <td>3 (8.6)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Not reported</td>
                <td>12 (34.3)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Text+Audio (n=4)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Deidentification</td>
                <td>1 (25.0)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Not reported</td>
                <td>3 (75.0)</td>
              </tr>
              <tr valign="top">
                <td colspan="3"><bold>Text</bold> + <bold>Images</bold> + <bold>Audio (n=1)</bold></td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Not reported</td>
                <td>1 (100.0)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table3fn1">
              <p><sup>a</sup>Classify according to the conditions reported in the original articles of the included studies.</p>
            </fn>
            <fn id="table3fn2">
              <p><sup>b</sup>Anonymization + data hosting + homomorphic encryption (n=1), anonymization + homomorphic encryption (n=1), federated learning (n=1), data augmentation (n=1), deidentification + data hosting (n=1), and homomorphic encryption (n=1).</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Main Findings</title>
        <p>In this scoping review, we identified 464 studies published between 2022 and 2025 that focus on the development and application of LLMs in health care using PHI. Strikingly, 256 (55.2%) of these studies were published in 2025 alone, compared with 188 (40.5%) studies in 2024, 19 (4.1%) studies in 2023, and only one (0.2%) study in 2022. This sharp increase highlights the extremely rapid pace of research in this emerging field and reflects the growing recognition of both the opportunities and challenges associated with LLM deployment in health care. These studies encompass a variety of countries, disease domains, and task types. Overall, the ethical reviews of these studies have been largely satisfactory. The vast majority of studies have reported on the approval of the ethics committee, ensuring that their procedures meet the relevant ethical standards. Nevertheless, there remains a shortfall in reporting on informed consent in certain prospective studies. It is concerning that a small number of LLM research projects using imaging data or retrospective data from electronic medical records fail to adequately report ethical review processes and the consideration of patient-informed consent, including whether consent was obtained or formally waived. Even when research involves only patient imaging data or retrospective data, it must still undergo rigorous ethical review [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. Strict adherence to ethical review processes is essential to ensure the fairness and scientific integrity of medical research and to safeguard patient rights.</p>
        <p>According to our findings, more than half of LLMs use cloud deployments, and the generative nature of LLMs can accidentally expose private data learned during training [<xref ref-type="bibr" rid="ref33">33</xref>], including PII [<xref ref-type="bibr" rid="ref16">16</xref>]. And the vast parameter counts and extensive training corpora of LLMs enlarge their memorization footprint, leakage vectors, and prompt-manipulation surface, thereby exposing critical vulnerabilities that render these models prime targets for prompt-injection and data-poisoning attacks. Therefore, it is necessary to enhance the privacy protection of PHI. Cloud deployment offers the advantages of cost-effectiveness and scalability, as users are not required to invest in expensive hardware and can dynamically scale computing resources as needed. Additionally, cloud services provide established tools and global accessibility, facilitating rapid iteration and collaboration among distributed teams. However, cloud deployments also face significant data privacy risks, as data must be uploaded to third-party servers, which can lead to risks such as data breaches, unauthorized access, compliance issues, service disruptions, and model exploitation. These risks can be effectively mitigated through the integration of technical countermeasures like zero-trust architecture [<xref ref-type="bibr" rid="ref34">34</xref>], edge computing [<xref ref-type="bibr" rid="ref35">35</xref>], data encryption [<xref ref-type="bibr" rid="ref36">36</xref>], and access control.</p>
        <p>Given the inherently high sensitivity of medical data and the significant risk of irreversible harm upon disclosure, the development of privacy-preserving safeguards for LLMs has become imperative. This requirement is not merely a technical prerequisite but also reflects an uncompromising mandate at the ethical and regulatory levels. In current research on the application of LLMs to health care, approximately one-third of the studies fail to mention any techniques for effectively protecting PHI. PHI includes PII such as patient names, addresses, Social Security numbers, and medical record numbers. Once compromised, such information can lead to serious privacy breaches and security risks. Therefore, removing PII is the first crucial step in safeguarding patient privacy [<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. By effectively eliminating or obfuscating these direct identifiers, it becomes possible to mitigate the risk of unauthorized access to PHI and thereby reduce the negative consequences of potential data breaches. The failure to prioritize PII protection in the deployment of LLMs within health care poses significant risks that extend beyond immediate privacy concerns. It threatens the integrity of patient-provider relationships, exposes individuals to financial and identity-related crimes, stifles technological and scientific progress, and raises critical ethical issues. Among the included studies, only one mentioned the use of federated learning techniques, and none used homomorphic encryption. Despite this, federated learning and homomorphic encryption are emerging as pivotal techniques for privacy-preserving in LLMs. Federated learning, due to its distributed training and decentralized model architecture, has gained significant traction in health care [<xref ref-type="bibr" rid="ref39">39</xref>]. Future research should prioritize the development of comprehensive data privacy protection to facilitate the broader adoption of federated learning and homomorphic encryption in health care. Synthetic data generation has emerged as a promising solution to address privacy concerns in health care research and LLMs [<xref ref-type="bibr" rid="ref40">40</xref>]. This approach uses AI models to create realistic, anonymized patient data that preserves privacy while enabling data access for secondary purposes [<xref ref-type="bibr" rid="ref41">41</xref>]. While synthetic data offers benefits in promoting privacy, equity, safety, and continual learning, challenges remain, including the potential introduction of flaws and biases. Further research is needed to develop unified quality assessment metrics and address the current deficiency in longitudinal synthetic data generation [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
        <p>In studies involving PHI deidentification techniques or the use of anonymized data, the related descriptions are often very vague. Although these studies mention the removal of PII or the use of anonymized data, they typically do not specify which PII elements were removed or merely use ambiguous phrases such as “removing PII” or “using anonymized data,” lacking detailed technical explanations and transparency. First, the absence of clear technical descriptions undermines the credibility and reproducibility of the research, making it difficult for other researchers to replicate the results under the same conditions and thereby affecting the scientific validity and the effectiveness of subsequent applications. Second, privacy protection may be at risk because the lack of transparency in the deidentification process can result in PII not being fully removed, increasing the risk of data breaches. Finally, ethical issues arise as well. If the data processing for deidentification and anonymization is not sufficiently transparent, it can lead to ethical disputes regarding privacy protection and informed consent, especially when assessing whether there remains a risk of reidentifying individuals from the data. This lack of transparency may result in failing to meet the requirements of ethical reviews. According to the Food and Drug Administration, even deidentified data must retain traceability to meet regulatory requirements. Traceability after deidentification is not only a critical component of privacy protection but also essential for ensuring data availability, compliance, and credibility. It plays an indispensable role in data sharing, research transparency, emergency response, and other areas, providing a robust foundation for data-driven decision-making and innovation. When designing and implementing deidentification schemes, the need for traceability must be carefully considered to achieve a balance between privacy protection and data utility. In addition, the descriptions of “de-identification assessment” provided in current studies often lack transparency, leaving their scope and rigor unclear. For instance, it remains uncertain whether such assessments involved quantitative estimation of reidentification risk, reference to regulatory standards such as HIPAA Safe Harbor, or validation by external independent experts. The absence or ambiguity of these elements makes it difficult to determine the effectiveness and compliance of deidentification practices. Future studies should explicitly report these aspects in both methodology and results to ensure greater rigor and credibility in protecting patient privacy.</p>
        <p>The HIPAA establishes standards and practices for deidentifying PHI. According to this rule, there are 2 methods for deidentifying PHI: expert determination, which requires a formal assessment by a qualified expert; and Safe Harbor, which involves the removal of specified identifiers so that covered entities and business associates cannot identify individuals from the remaining information. Although HIPAA does not explicitly use the term “anonymization,” anonymization is often considered an irreversible process that ensures data can no longer identify individuals. Anonymization requirements are more stringent than deidentification, as they guarantee that the data cannot be reidentified under any circumstances. While this study retains the original terminology used in the articles reviewed, most studies are vague in their descriptions of deidentification and anonymization, making it difficult to determine which specific methods were used. Researchers should clearly specify the approaches used to protect data privacy to ensure transparency and accuracy.</p>
        <p>Medical big data exhibits unique multimodal characteristics. The term “multimodal” refers to the diverse sources and forms of medical data, which include laboratory data (eg, laboratory results), imaging data (eg, computed tomographic scans, x-rays, ultrasounds, and electrocardiograms), and video data containing audio (eg, fetal ultrasounds). Depending on the specific data type, its confidentiality, integrity, and availability are ensured through various methods. In our research, we found that current medical data privacy protection primarily relies on deidentification and anonymization techniques. However, in the context of multimodal medical data, a single privacy protection method is often insufficient to effectively prevent data leakage, tampering, and misuse. Therefore, designing multimodal data privacy protection technologies represents a critical direction for future research.</p>
      </sec>
      <sec>
        <title>Strengths and Limitations</title>
        <p>While existing literature reviews predominantly focus on the applications of LLMs in health care, there remains a notable gap in comprehensive scoping reviews that specifically evaluate privacy protection measures for PHI within LLM implementations (PHI-LLMs). Previous analyses addressing privacy concerns have primarily examined broader contexts rather than focusing specifically on patient information protection in language model applications, resulting in insufficient coverage of both technical safeguards and systemic compliance aspects within health care ecosystems.</p>
        <p>A limitation of this study is that the evaluation of privacy protection measures relies solely on the information reported in published papers. Therefore, if certain studies have implemented privacy protection methods but did not disclose them in detail within their articles, we are unable to identify them. This situation may affect the comprehensiveness and accuracy of our evaluation. While we catalogued the adoption of different privacy protection methods, our review did not evaluate their security levels, implementation quality, or practical trade-offs. Future research should systematically assess the effectiveness and applicability of these techniques in health care-specific settings.</p>
      </sec>
      <sec>
        <title>Implications for Research and Practice</title>
        <p>Based on the 3 key findings outlined above, we offer the following additional recommendations for protecting patient privacy in health care–related LLM research, structured around 3 phases: study design, implementation, and reporting. When conducting research reports, the key terms can be referred to for a standardized design. The glossary of key terms (<xref ref-type="boxed-text" rid="box2">Textbox 2</xref>) can be found in the <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>.</p>
        <boxed-text id="box2" position="float">
          <title>Glossary of key terms.</title>
          <list list-type="bullet">
            <list-item>
              <p>Protected health information: Individually identifiable health information relating to health status, care, or payment that is protected under the Health Insurance Portability and Accountability Act.</p>
            </list-item>
            <list-item>
              <p>Personally identifiable information: It refers to any information that can directly or indirectly identify a specific individual, including name, ID number, address, contact information, and data that can identify identity when combined with other information. Personally identifiable information is a broad concept that encompasses all data that can identify an individual.</p>
            </list-item>
            <list-item>
              <p>Deidentification (Safe Harbor, Health Insurance Portability and Accountability Act): Removal of 18 specified identifiers (eg, name, address, phone number, and dates) such that the data is no longer considered protected health information.</p>
            </list-item>
            <list-item>
              <p>Deidentification (Ontario Guidance): A risk-based statistical approach that quantifies reidentification risk and determines whether it is acceptably small.</p>
            </list-item>
            <list-item>
              <p>Anonymization (General Data Protection Regulation): Data is processed in such a way that reidentification is no longer possible by any means “reasonably likely to be used.”</p>
            </list-item>
            <list-item>
              <p>Rule-based matching: Algorithmic detection and removal of direct identifiers (eg, names, addresses) using predefined rules or dictionaries.</p>
            </list-item>
            <list-item>
              <p>Federated learning: A decentralized machine learning paradigm where models are trained collaboratively without exchanging raw data.</p>
            </list-item>
            <list-item>
              <p>Reidentification protection technology: Technical and organizational measures (eg, k-anonymity and differential privacy) that reduce the likelihood of reidentifying individuals, acknowledging that zero risk is unattainable but very low residual risk is acceptable under most regulations.</p>
            </list-item>
            <list-item>
              <p>Direct identifiers: Variables that can uniquely and directly identify an individual, such as name, social security number, phone number, full address, and medical record number.</p>
            </list-item>
            <list-item>
              <p>Indirect identifiers (quasi-identifiers): Variables that cannot identify an individual alone but may enable reidentification when combined with other data, such as age, gender, zip code, and admission date.</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
      <sec>
        <title>Considerations in Research Design</title>
        <p>In the design phase of LLM research, patient privacy protection must be prioritized. First, the data minimization principle should be strictly adhered to, meaning only the minimum necessary PHI required to achieve the research objectives should be collected and used [<xref ref-type="bibr" rid="ref42">42</xref>]. Second, a clear definition of research purpose and usage scope is essential, ensuring that all PII used has a well-defined purpose and is not repurposed for unauthorized studies or commercial applications. Additionally, ethical approval and informed consent are critical components of the design phase. Researchers must submit detailed research plans to an Institutional Review Board or Ethics Committee, outlining how PII will be obtained, used, and protected. Where applicable, obtaining informed consent from patients is necessary to ensure they are aware of how their data will be used and safeguarded.</p>
      </sec>
      <sec>
        <title>Considerations in Research Implementation</title>
        <p>In the implementation phase, priority should be given to deploying the LLM locally. During model training, multiple patient privacy protection strategies such as deidentification, anonymization, federated learning, synthetic data, and differential privacy should be used. Due to the potential risk of reidentification, continuous security monitoring and auditing are indispensable. The research team should conduct regular security assessments and vulnerability scans to promptly identify and address potential security vulnerabilities. Postbreach responses also constitute an indispensable part of a comprehensive privacy protection framework. Effective incident response should include rapid detection, containment, patient notification, and remediation strategies, which are increasingly emphasized in health care data governance guidelines.</p>
      </sec>
      <sec>
        <title>Considerations in Research Reporting</title>
        <p>Research reports should fully embody the principles of transparency and reproducibility. Researchers should disclose in detail the data sources, ethical approval processes, informed consent procedures, and privacy protection techniques used. Selecting appropriate reporting guidelines (such as STROBE [<xref ref-type="bibr" rid="ref43">43</xref>], STARD [<xref ref-type="bibr" rid="ref44">44</xref>], CONSORT-AI [Consolidated Standards of Reporting Trials–Artificial Intelligence] [<xref ref-type="bibr" rid="ref45">45</xref>], and TRIPOD-LLM [<xref ref-type="bibr" rid="ref19">19</xref>]) can improve report quality and provide a reference for other researchers.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Our scoping review sounds an alarm on the inadequately addressed imperative of patient privacy protection in medical research using LLMs. In response, we formulate comprehensive recommendations for the study design, implementation, and reporting phases to fortify PHI protection and foster transparency in PHI-LLM research. Our findings compellingly argue for the urgent development of stricter regulatory frameworks and the integration of advanced privacy-preserving technologies to safeguard PHI. It is anticipated that such measures will enable future health care applications of LLMs to achieve a balance between innovation and rigorous patient privacy protection, thus elevating ethical standards and scientific credibility.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>PRISMA-ScR checklist.</p>
        <media xlink:href="jmir_v27i1e76571_app1.docx" xlink:title="DOCX File , 66 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Search strategy for scoping review.</p>
        <media xlink:href="jmir_v27i1e76571_app2.docx" xlink:title="DOCX File , 15 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>The specific references included in the analysis.</p>
        <media xlink:href="jmir_v27i1e76571_app3.docx" xlink:title="DOCX File , 1438 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">CONSORT-AI</term>
          <def>
            <p>Consolidated Standards of Reporting Trials–Artificial Intelligence</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">HIPAA</term>
          <def>
            <p>Health Insurance Portability and Accountability Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">LLM</term>
          <def>
            <p>large language model</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">PHI</term>
          <def>
            <p>patient health information</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">PII</term>
          <def>
            <p>personally identifiable information</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">PRISMA-ScR</term>
          <def>
            <p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses Extension for Scoping Reviews</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">STARD</term>
          <def>
            <p>Standards for Reporting of Diagnostic Accuracy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">STROBE</term>
          <def>
            <p>Strengthening the Reporting of Observational Studies in Epidemiology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">TRIPOD</term>
          <def>
            <p>Transparent Reporting of a Multivariable Prediction Model for Individual Prognosis or Diagnosis</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <notes>
      <title>Data Availability</title>
      <p>The data generated during the scoping review are available from the corresponding author on reasonable request. However, the majority of such data have been presented on paper in tables, figures, and text.</p>
    </notes>
    <notes>
      <title>Funding</title>
      <p>This study is supported by the National Key Research and Development Program of China (numbers 2022YFC3502300 and 2022YFC3502305). The funders had no role in considering the study design or in the collection, analysis, interpretation of data, writing of the report, or decision to submit the article for publication.</p>
    </notes>
    <fn-group>
      <fn fn-type="con">
        <p>ZXY and LSY conceptualized the study, defined the methodology, performed the database searches, and managed the screening process. ZXY and LSY also performed data extraction and authored the original draft. CZ, YDD, and WSJ reviewed the literature, charted the data, and conducted the analyses. GL, YLZ, and SHC provided supervision and contributed to the writing review. All authors contributed to the discussion of literature screening, data extraction, and writing of the paper. All authors reviewed and approved the final version of the paper. The corresponding author attests that all listed authors meet authorship criteria and that no others meeting the criteria have been omitted. All authors affirm that the manuscript is an honest, accurate, and transparent account of the study being reported; that no important aspects of the study have been omitted; and that any discrepancies from the study as planned (and, if relevant, registered) have been explained.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wan</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Ni</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Song</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Clayton</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Malin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Yin</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Applications and concerns of ChatGPT and other conversational large language models in health care: systematic review</article-title>
          <source>J Med Internet Res</source>
          <year>2024</year>
          <volume>26</volume>
          <fpage>e22769</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2024//e22769/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/22769</pub-id>
          <pub-id pub-id-type="medline">39509695</pub-id>
          <pub-id pub-id-type="pii">v26i1e22769</pub-id>
          <pub-id pub-id-type="pmcid">PMC11582494</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Varghese</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chapiro</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>ChatGPT: the transformative influence of generative AI on science and healthcare</article-title>
          <source>J Hepatol</source>
          <year>2024</year>
          <volume>80</volume>
          <issue>6</issue>
          <fpage>977</fpage>
          <lpage>980</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S0168-8278(23)05039-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jhep.2023.07.028</pub-id>
          <pub-id pub-id-type="medline">37544516</pub-id>
          <pub-id pub-id-type="pii">S0168-8278(23)05039-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Su</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Kang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lyu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Nie</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Pan</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Application of large language models in disease diagnosis and treatment</article-title>
          <source>Chin Med J (Engl)</source>
          <year>2025</year>
          <volume>138</volume>
          <issue>2</issue>
          <fpage>130</fpage>
          <lpage>142</lpage>
          <pub-id pub-id-type="doi">10.1097/CM9.0000000000003456</pub-id>
          <pub-id pub-id-type="medline">39722188</pub-id>
          <pub-id pub-id-type="pii">00029330-990000000-01376</pub-id>
          <pub-id pub-id-type="pmcid">PMC11745858</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Doneva</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Qin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sick</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Ellendorff</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Goldman</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Schneider</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Ineichen</surname>
              <given-names>BV</given-names>
            </name>
          </person-group>
          <article-title>Large language models to process, analyze, and synthesize biomedical texts: a scoping review</article-title>
          <source>Discov Artif Intell</source>
          <year>2024</year>
          <volume>4</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.1007/s44163-024-00197-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Miao</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Opportunities, challenges, and future directions of large language models, including ChatGPT in medical education: a systematic scoping review</article-title>
          <source>J Educ Eval Health Prof</source>
          <year>2024</year>
          <volume>21</volume>
          <fpage>6</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/38486402"/>
          </comment>
          <pub-id pub-id-type="doi">10.3352/jeehp.2024.21.6</pub-id>
          <pub-id pub-id-type="medline">38486402</pub-id>
          <pub-id pub-id-type="pii">jeehp.2024.21.6</pub-id>
          <pub-id pub-id-type="pmcid">PMC11035906</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kibriya</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>WZ</given-names>
            </name>
            <name name-style="western">
              <surname>Siddiqa</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>MK</given-names>
            </name>
          </person-group>
          <article-title>Privacy issues in large language models: a survey</article-title>
          <source>Comput Electr Eng</source>
          <year>2024</year>
          <volume>120</volume>
          <fpage>109698</fpage>
          <pub-id pub-id-type="doi">10.1016/j.compeleceng.2024.109698</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williamson</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Prybutok</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Balancing privacy and progress: a review of privacy challenges, systemic oversight, and patient perceptions in ai-driven healthcare</article-title>
          <source>Appl Sci</source>
          <year>2024</year>
          <volume>14</volume>
          <issue>2</issue>
          <fpage>675</fpage>
          <pub-id pub-id-type="doi">10.3390/app14020675</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jawad</surname>
              <given-names>LA</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy in digital healthcare systems: challenges and mitigation strategies</article-title>
          <source>Sage J</source>
          <year>2024</year>
          <volume>42</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.1177/09702385241233073</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bedi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Orr-Ewing</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Dash</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Koyejo</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Callahan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fries</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Wornow</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Swaminathan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lehmann</surname>
              <given-names>LS</given-names>
            </name>
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Kashyap</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Chaurasia</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Shah</surname>
              <given-names>NR</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Tazbaz</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Milstein</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Pfeffer</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Shah</surname>
              <given-names>NH</given-names>
            </name>
          </person-group>
          <article-title>Testing and evaluation of health care applications of large language models: a systematic review</article-title>
          <source>JAMA</source>
          <year>2025</year>
          <volume>333</volume>
          <issue>4</issue>
          <fpage>319</fpage>
          <lpage>328</lpage>
          <pub-id pub-id-type="doi">10.1001/jama.2024.21700</pub-id>
          <pub-id pub-id-type="medline">39405325</pub-id>
          <pub-id pub-id-type="pii">2825147</pub-id>
          <pub-id pub-id-type="pmcid">PMC11480901</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hager</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Jungmann</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Holland</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Bhagat</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Hubrecht</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Knauer</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vielhauer</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Makowski</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Braren</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kaissis</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Rueckert</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Evaluation and mitigation of the limitations of large language models in clinical decision-making</article-title>
          <source>Nat Med</source>
          <year>2024</year>
          <volume>30</volume>
          <issue>9</issue>
          <fpage>2613</fpage>
          <lpage>2622</lpage>
          <pub-id pub-id-type="doi">10.1038/s41591-024-03097-1</pub-id>
          <pub-id pub-id-type="medline">38965432</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41591-024-03097-1</pub-id>
          <pub-id pub-id-type="pmcid">PMC11405275</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pool</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Akhlaghpour</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Fatehi</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Burton-Jones</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A systematic analysis of failures in protecting personal health data: a scoping review</article-title>
          <source>Int J Inf Manag</source>
          <year>2024</year>
          <volume>74</volume>
          <fpage>102719</fpage>
          <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2023.102719</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shickel</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Tighe</surname>
              <given-names>PJ</given-names>
            </name>
            <name name-style="western">
              <surname>Bihorac</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rashidi</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Deep EHR: A survey of recent advances in deep learning techniques for electronic health record (EHR) analysis</article-title>
          <source>IEEE J Biomed Health Inform</source>
          <year>2018</year>
          <volume>22</volume>
          <issue>5</issue>
          <fpage>1589</fpage>
          <lpage>1604</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/29989977"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/JBHI.2017.2767063</pub-id>
          <pub-id pub-id-type="medline">29989977</pub-id>
          <pub-id pub-id-type="pmcid">PMC6043423</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Esteva</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Robicquet</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ramsundar</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Kuleshov</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>DePristo</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Chou</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Cui</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Corrado</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Thrun</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dean</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>A guide to deep learning in healthcare</article-title>
          <source>Nat Med</source>
          <year>2019</year>
          <volume>25</volume>
          <issue>1</issue>
          <fpage>24</fpage>
          <lpage>29</lpage>
          <pub-id pub-id-type="doi">10.1038/s41591-018-0316-z</pub-id>
          <pub-id pub-id-type="medline">30617335</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41591-018-0316-z</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy protection in cloud computing: discussions and challenges</article-title>
          <source>J Netw Comput Appl</source>
          <year>2020</year>
          <volume>160</volume>
          <fpage>102642</fpage>
          <pub-id pub-id-type="doi">10.1016/j.jnca.2020.102642</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Duan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Cai</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>A survey on large language model (LLM) security and privacy: the good, the bad, and the ugly</article-title>
          <source>High-Confid Comput</source>
          <year>2024</year>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>100211</fpage>
          <pub-id pub-id-type="doi">10.1016/j.hcc.2024.100211</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aditya</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Chawla</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dhingra</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Rai</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Sood</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Wase</surname>
              <given-names>ZM</given-names>
            </name>
            <name name-style="western">
              <surname>Bahga</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Madisetti</surname>
              <given-names>VK</given-names>
            </name>
          </person-group>
          <article-title>Evaluating privacy leakage and memorization attacks on large language models (LLMs) in generative AI applications</article-title>
          <source>J Softw Eng Appl</source>
          <year>2024</year>
          <volume>17</volume>
          <issue>05</issue>
          <fpage>421</fpage>
          <lpage>447</lpage>
          <pub-id pub-id-type="doi">10.4236/jsea.2024.175023</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Aditya</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Madisetti</surname>
              <given-names>VK</given-names>
            </name>
            <name name-style="western">
              <surname>Bahga</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Whispered tuning: data privacy preservation in fine-tuning llms through differential privacy</article-title>
          <source>J Softw Eng Appl</source>
          <year>2024</year>
          <volume>17</volume>
          <issue>01</issue>
          <fpage>1</fpage>
          <lpage>22</lpage>
          <pub-id pub-id-type="doi">10.4236/jsea.2024.171001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Staab</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Vero</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Balunovic</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vechev</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Beyond memorization: violating privacy via inference with large language models</article-title>
          <source>arXiv:2310.07298</source>
          <year>2024</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/2310.07298"/>
          </comment>
          <pub-id pub-id-type="doi">10.48550/arXiv.2310.07298</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gallifant</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Afshar</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ameen</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Aphinyanaphongs</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Cacciamani</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Demner-Fushman</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Dligach</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Daneshjou</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Fernandes</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Hansen</surname>
              <given-names>LH</given-names>
            </name>
            <name name-style="western">
              <surname>Landman</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lehmann</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>McCoy</surname>
              <given-names>LG</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Moreno</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Munch</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Restrepo</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Savova</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Umeton</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Gichoya</surname>
              <given-names>JW</given-names>
            </name>
            <name name-style="western">
              <surname>Collins</surname>
              <given-names>GS</given-names>
            </name>
            <name name-style="western">
              <surname>Moons</surname>
              <given-names>KGM</given-names>
            </name>
            <name name-style="western">
              <surname>Celi</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Bitterman</surname>
              <given-names>DS</given-names>
            </name>
          </person-group>
          <article-title>The TRIPOD-LLM reporting guideline for studies using large language models</article-title>
          <source>Nat Med</source>
          <year>2025</year>
          <volume>31</volume>
          <issue>1</issue>
          <fpage>60</fpage>
          <lpage>69</lpage>
          <pub-id pub-id-type="doi">10.1038/s41591-024-03425-5</pub-id>
          <pub-id pub-id-type="medline">39779929</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41591-024-03425-5</pub-id>
          <pub-id pub-id-type="pmcid">PMC12104976</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Minssen</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Vayena</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Cohen</surname>
              <given-names>IG</given-names>
            </name>
          </person-group>
          <article-title>The challenges for regulating medical use of CHATGPT and other large language models</article-title>
          <source>JAMA</source>
          <year>2023</year>
          <volume>330</volume>
          <issue>4</issue>
          <fpage>315</fpage>
          <lpage>316</lpage>
          <pub-id pub-id-type="doi">10.1001/jama.2023.9651</pub-id>
          <pub-id pub-id-type="medline">37410482</pub-id>
          <pub-id pub-id-type="pii">2807167</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marks</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Haupt</surname>
              <given-names>CE</given-names>
            </name>
          </person-group>
          <article-title>AI chatbots, health privacy, and challenges to HIPAA compliance</article-title>
          <source>JAMA</source>
          <year>2023</year>
          <volume>330</volume>
          <issue>4</issue>
          <fpage>309</fpage>
          <lpage>310</lpage>
          <pub-id pub-id-type="doi">10.1001/jama.2023.9458</pub-id>
          <pub-id pub-id-type="medline">37410450</pub-id>
          <pub-id pub-id-type="pii">2807170</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Aziz</surname>
              <given-names>MMA</given-names>
            </name>
            <name name-style="western">
              <surname>Mohammed</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>De-identification of electronic health record using neural network</article-title>
          <source>Sci Rep</source>
          <year>2020</year>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>18600</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/s41598-020-75544-1"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41598-020-75544-1</pub-id>
          <pub-id pub-id-type="medline">33122735</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41598-020-75544-1</pub-id>
          <pub-id pub-id-type="pmcid">PMC7596089</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mercorelli</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Nguyen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Gartell</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Brookes</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Morris</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tam</surname>
              <given-names>CS</given-names>
            </name>
          </person-group>
          <article-title>A framework for de-identification of free-text data in electronic medical records enabling secondary use</article-title>
          <source>Aust Health Rev</source>
          <year>2022</year>
          <volume>46</volume>
          <issue>3</issue>
          <fpage>289</fpage>
          <lpage>293</lpage>
          <pub-id pub-id-type="doi">10.1071/AH21361</pub-id>
          <pub-id pub-id-type="medline">35546422</pub-id>
          <pub-id pub-id-type="pii">AH21361</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dwork</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Roth</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The algorithmic foundations of differential privacy</article-title>
          <source>Found Trends Theor Comput Sci</source>
          <year>2014</year>
          <volume>9</volume>
          <issue>3-4</issue>
          <fpage>211</fpage>
          <lpage>407</lpage>
          <pub-id pub-id-type="doi">10.1561/0400000042</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yurdem</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Kuzlu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gullu</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Catak</surname>
              <given-names>FO</given-names>
            </name>
            <name name-style="western">
              <surname>Tabassum</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Federated learning: overview, strategies, applications, tools and future directions</article-title>
          <source>Heliyon</source>
          <year>2024</year>
          <volume>10</volume>
          <issue>19</issue>
          <fpage>e38137</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2405-8440(24)14168-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.heliyon.2024.e38137</pub-id>
          <pub-id pub-id-type="medline">39391509</pub-id>
          <pub-id pub-id-type="pii">S2405-8440(24)14168-0</pub-id>
          <pub-id pub-id-type="pmcid">PMC11466570</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marcolla</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Sucasas</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Manzano</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bassoli</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Fitzek</surname>
              <given-names>FHP</given-names>
            </name>
            <name name-style="western">
              <surname>Aaraj</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Survey on fully homomorphic encryption, theory, and applications</article-title>
          <source>Proc IEEE</source>
          <year>2022</year>
          <volume>110</volume>
          <issue>10</issue>
          <fpage>1572</fpage>
          <lpage>1609</lpage>
          <pub-id pub-id-type="doi">10.1109/jproc.2022.3205665</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Geva</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Gusev</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Polyakov</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Liram</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Rosolio</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Alexandru</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Genise</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Blatt</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Duchin</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Waissengrin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Mirelman</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Bukstein</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Blumenthal</surname>
              <given-names>DT</given-names>
            </name>
            <name name-style="western">
              <surname>Wolf</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Pelles-Avraham</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Schaffer</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Lavi</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Micciancio</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Vaikuntanathan</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Badawi</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Goldwasser</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Collaborative privacy-preserving analysis of oncological data using multiparty homomorphic encryption</article-title>
          <source>Proc Natl Acad Sci U S A</source>
          <year>2023</year>
          <volume>120</volume>
          <issue>33</issue>
          <fpage>e2304415120</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pnas.org/doi/10.1073/pnas.2304415120?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1073/pnas.2304415120</pub-id>
          <pub-id pub-id-type="medline">37549296</pub-id>
          <pub-id pub-id-type="pmcid">PMC10437415</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arksey</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>O'Malley</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Scoping studies: towards a methodological framework</article-title>
          <source>Int J Soc Res Methodol</source>
          <year>2005</year>
          <volume>8</volume>
          <issue>1</issue>
          <fpage>19</fpage>
          <lpage>32</lpage>
          <pub-id pub-id-type="doi">10.1080/1364557032000119616</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tricco</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Lillie</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zarin</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>O'Brien</surname>
              <given-names>KK</given-names>
            </name>
            <name name-style="western">
              <surname>Colquhoun</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Levac</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>MDJ</given-names>
            </name>
            <name name-style="western">
              <surname>Horsley</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Weeks</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hempel</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Akl</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>McGowan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Stewart</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hartling</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Aldcroft</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>MG</given-names>
            </name>
            <name name-style="western">
              <surname>Garritty</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lewin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Godfrey</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Macdonald</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Langlois</surname>
              <given-names>EV</given-names>
            </name>
            <name name-style="western">
              <surname>Soares-Weiser</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Moriarty</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Clifford</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Tunçalp</surname>
              <given-names>Ö</given-names>
            </name>
            <name name-style="western">
              <surname>Straus</surname>
              <given-names>SE</given-names>
            </name>
          </person-group>
          <article-title>PRISMA extension for scoping reviews (PRISMA-ScR): checklist and explanation</article-title>
          <source>Ann Intern Med</source>
          <year>2018</year>
          <volume>169</volume>
          <issue>7</issue>
          <fpage>467</fpage>
          <lpage>473</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.acpjournals.org/doi/10.7326/M18-0850?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.7326/M18-0850</pub-id>
          <pub-id pub-id-type="medline">30178033</pub-id>
          <pub-id pub-id-type="pii">2700389</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Page</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>McKenzie</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Bossuyt</surname>
              <given-names>PM</given-names>
            </name>
            <name name-style="western">
              <surname>Boutron</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Hoffmann</surname>
              <given-names>TC</given-names>
            </name>
            <name name-style="western">
              <surname>Mulrow</surname>
              <given-names>CD</given-names>
            </name>
            <name name-style="western">
              <surname>Shamseer</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Tetzlaff</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Akl</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Brennan</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Chou</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Glanville</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Grimshaw</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Hróbjartsson</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lalu</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Loder</surname>
              <given-names>EW</given-names>
            </name>
            <name name-style="western">
              <surname>Mayo-Wilson</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>McDonald</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>McGuinness</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Stewart</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Thomas</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tricco</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Welch</surname>
              <given-names>VA</given-names>
            </name>
            <name name-style="western">
              <surname>Whiting</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The PRISMA 2020 statement: an updated guideline for reporting systematic reviews</article-title>
          <source>BMJ</source>
          <year>2021</year>
          <volume>372</volume>
          <fpage>n71</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bmj.com/lookup/pmidlookup?view=long&#38;pmid=33782057"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj.n71</pub-id>
          <pub-id pub-id-type="medline">33782057</pub-id>
          <pub-id pub-id-type="pmcid">PMC8005924</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de Lange</surname>
              <given-names>DW</given-names>
            </name>
            <name name-style="western">
              <surname>Guidet</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Andersen</surname>
              <given-names>FH</given-names>
            </name>
            <name name-style="western">
              <surname>Artigas</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bertolini</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Moreno</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Christensen</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Cecconi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Agvald-Ohman</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Gradisek</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Jung</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Marsh</surname>
              <given-names>BJ</given-names>
            </name>
            <name name-style="western">
              <surname>Oeyen</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bollen Pinto</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Szczeklik</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Watson</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Zafeiridis</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Flaatten</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Huge variation in obtaining ethical permission for a non-interventional observational study in Europe</article-title>
          <source>BMC Med Ethics</source>
          <year>2019</year>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>39</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedethics.biomedcentral.com/articles/10.1186/s12910-019-0373-y"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12910-019-0373-y</pub-id>
          <pub-id pub-id-type="medline">31159853</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12910-019-0373-y</pub-id>
          <pub-id pub-id-type="pmcid">PMC6547492</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Junod</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Elger</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Retrospective research: what are the ethical and legal requirements?</article-title>
          <source>Swiss Med Wkly</source>
          <year>2010</year>
          <volume>140</volume>
          <fpage>w13041</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.4414/smw.2010.13041"/>
          </comment>
          <pub-id pub-id-type="doi">10.4414/smw.2010.13041</pub-id>
          <pub-id pub-id-type="medline">20349361</pub-id>
          <pub-id pub-id-type="pii">smw-12972</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaplan</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Systematic testing of security-related vulnerabilities in llm-based applications</article-title>
          <year>2025</year>
          <conf-name>2025 IEEE/ACM 4th International Conference on AI Engineering – Software Engineering for AI (CAIN)</conf-name>
          <conf-date>2025 April 27-28</conf-date>
          <conf-loc>Ottawa, Ontario, Canada</conf-loc>
          <fpage>27</fpage>
          <lpage>28</lpage>
          <pub-id pub-id-type="doi">10.1109/cain66642.2025.00043</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rose</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Borchert</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Mitchell</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Connelly</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Zero trust architecture</article-title>
          <source>National Institute of Standards and Technology</source>
          <year>2020</year>
          <access-date>2025-11-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.SP.800-207.pdf">https://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.SP.800-207.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shi</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Cao</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Edge computing: vision and challenges</article-title>
          <source>IEEE Internet Things J</source>
          <year>2016</year>
          <volume>3</volume>
          <issue>5</issue>
          <fpage>637</fpage>
          <lpage>646</lpage>
          <pub-id pub-id-type="doi">10.1109/jiot.2016.2579198</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mageshwaran</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Ramya</surname>
              <given-names>PS</given-names>
            </name>
          </person-group>
          <article-title>Data protection in the era of big data advanced encryption standard vs data encryption standard</article-title>
          <year>2024</year>
          <conf-name>Second International Conference Computational and Characterization Techniques in Engineering &#38; Sciences (IC3TES)</conf-name>
          <conf-date>2024  November 15-16</conf-date>
          <conf-loc>Lucknow, India</conf-loc>
          <fpage>15</fpage>
          <lpage>16</lpage>
          <pub-id pub-id-type="doi">10.1109/ic3tes62412.2024.10877503</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bowman</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Maxwell</surname>
              <given-names>RA</given-names>
            </name>
          </person-group>
          <article-title>A beginner's guide to avoiding Protected Health Information (PHI) issues in clinical research - with how-to's in REDCap data management software</article-title>
          <source>J Biomed Inform</source>
          <year>2018</year>
          <volume>85</volume>
          <fpage>49</fpage>
          <lpage>55</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(18)30134-5"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2018.07.008</pub-id>
          <pub-id pub-id-type="medline">30017974</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(18)30134-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Andriole</surname>
              <given-names>KP</given-names>
            </name>
          </person-group>
          <article-title>Security of electronic medical information and patient privacy: what you need to know</article-title>
          <source>J Am Coll Radiol</source>
          <year>2014</year>
          <volume>11</volume>
          <issue>12 Pt B</issue>
          <fpage>1212</fpage>
          <lpage>1216</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jacr.2014.09.011</pub-id>
          <pub-id pub-id-type="medline">25467897</pub-id>
          <pub-id pub-id-type="pii">S1546-1440(14)00546-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Sabrina</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Fan</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Sohail</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>A review of privacy enhancement methods for federated learning in healthcare systems</article-title>
          <source>Int J Environ Res Public Health</source>
          <year>2023</year>
          <volume>20</volume>
          <issue>15</issue>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=ijerph20156539"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/ijerph20156539</pub-id>
          <pub-id pub-id-type="medline">37569079</pub-id>
          <pub-id pub-id-type="pii">ijerph20156539</pub-id>
          <pub-id pub-id-type="pmcid">PMC10418741</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Altalla'</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Abdalla</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Altamimi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bitar</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Al Omari</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kardan</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Sultan</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Evaluating GPT models for clinical note de-identification</article-title>
          <source>Sci Rep</source>
          <year>2025</year>
          <volume>15</volume>
          <issue>1</issue>
          <fpage>3852</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/s41598-025-86890-3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41598-025-86890-3</pub-id>
          <pub-id pub-id-type="medline">39890969</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41598-025-86890-3</pub-id>
          <pub-id pub-id-type="pmcid">PMC11785955</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jadon</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Leveraging generative AI models for synthetic data generation in healthcare: balancing research and privacy</article-title>
          <year>2023</year>
          <conf-name>International Conference on Smart Applications, Communications and Networking (SmartNets)</conf-name>
          <conf-date>2023 July 25-27</conf-date>
          <conf-loc>Istanbul, Turkiye</conf-loc>
          <fpage>25</fpage>
          <lpage>27</lpage>
          <pub-id pub-id-type="doi">10.1109/smartnets58706.2023.10215825</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Snickars</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Weibull</surname>
              <given-names>JW</given-names>
            </name>
          </person-group>
          <article-title>A minimum information principle</article-title>
          <source>Reg Sci Urban Econ</source>
          <year>1977</year>
          <volume>7</volume>
          <issue>1-2</issue>
          <fpage>137</fpage>
          <lpage>168</lpage>
          <pub-id pub-id-type="doi">10.1016/0166-0462(77)90021-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>von Elm</surname>
              <given-names>Erik</given-names>
            </name>
            <name name-style="western">
              <surname>Altman</surname>
              <given-names>DG</given-names>
            </name>
            <name name-style="western">
              <surname>Egger</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pocock</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Gøtzsche</surname>
              <given-names>PC</given-names>
            </name>
            <name name-style="western">
              <surname>Vandenbroucke</surname>
              <given-names>JP</given-names>
            </name>
            <collab>STROBE Initiative</collab>
          </person-group>
          <article-title>The strengthening the reporting of observational studies in epidemiology (STROBE) statement: guidelines for reporting observational studies</article-title>
          <source>Lancet</source>
          <year>2007</year>
          <volume>370</volume>
          <issue>9596</issue>
          <fpage>1453</fpage>
          <lpage>1457</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://core.ac.uk/reader/33050540?utm_source=linkout"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/S0140-6736(07)61602-X</pub-id>
          <pub-id pub-id-type="medline">18064739</pub-id>
          <pub-id pub-id-type="pii">S0140-6736(07)61602-X</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cohen</surname>
              <given-names>JF</given-names>
            </name>
            <name name-style="western">
              <surname>Korevaar</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>Altman</surname>
              <given-names>DG</given-names>
            </name>
            <name name-style="western">
              <surname>Bruns</surname>
              <given-names>DE</given-names>
            </name>
            <name name-style="western">
              <surname>Gatsonis</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Hooft</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Irwig</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Levine</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Reitsma</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>de Vet</surname>
              <given-names>HCW</given-names>
            </name>
            <name name-style="western">
              <surname>Bossuyt</surname>
              <given-names>PMM</given-names>
            </name>
          </person-group>
          <article-title>STARD 2015 guidelines for reporting diagnostic accuracy studies: explanation and elaboration</article-title>
          <source>BMJ Open</source>
          <year>2016</year>
          <volume>6</volume>
          <issue>11</issue>
          <fpage>e012799</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmjopen.bmj.com/lookup/pmidlookup?view=long&#38;pmid=28137831"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmjopen-2016-012799</pub-id>
          <pub-id pub-id-type="medline">28137831</pub-id>
          <pub-id pub-id-type="pii">bmjopen-2016-012799</pub-id>
          <pub-id pub-id-type="pmcid">PMC5128957</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Cruz Rivera</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Calvert</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Denniston</surname>
              <given-names>AK</given-names>
            </name>
            <collab>SPIRIT-AICONSORT-AI Working Group</collab>
          </person-group>
          <article-title>Reporting guidelines for clinical trial reports for interventions involving artificial intelligence: the CONSORT-AI extension</article-title>
          <source>Nat Med</source>
          <year>2020</year>
          <volume>26</volume>
          <issue>9</issue>
          <fpage>1364</fpage>
          <lpage>1374</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32908283"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41591-020-1034-x</pub-id>
          <pub-id pub-id-type="medline">32908283</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41591-020-1034-x</pub-id>
          <pub-id pub-id-type="pmcid">PMC7598943</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
