A package to remove private information (PHI/PII) from medical notes.
Project description
Robust DeID: De-Identification of Medical Notes using Transformer Architectures
This repository was used to train and evaluate various de-identification models and strategies on medical notes from the I2B2-DEID dataset and the MassGeneralBrigham (MGB) network. The models and strategies are extensible and can be used on other datasets as well. Trained models are published on huggingface under the OBI organization.
Main features are:
- Transformer models - Any transformer model from the huggingface library can be used for training. We make available a RoBERTa Liu et al., 2019 model and a ClinicalBERT Alsentzer et al., 2019 model fine-tuned for de-identification on huggingface: obi_roberta_deid, obi_bert_deid. Both can be used for testing (forward pass).
- Recall biased thresholding - Ability to use classification bias to aggressively remove PHI from notes. This is a safer and more robust option when working with sensitive data like medical notes.
- Custom clinical tokenizer - Includes 60 regular expressions based on the structure and information generally found in medical notes. This tokenizer resolves common typographical errors and missing spaces that occur in clinical notes.
- Context enhancement - Option to add on additional tokens to a given sequence as context on the left and right. These tokens can be used only as context, or we can also train on these tokens (which essentially mimics a sliding window approach). The reason for including context tokens was to provide additional context especially for peripheral tokens in a given sequence.
Since de-identification is a sequence labeling task, this tool can be applied to any other sequence labeling task as well.
More details on how to use this tool, the format of data and other useful information is presented below.
Comments, feedback and improvements are welcome and encouraged!
Dataset Annotations
- The guidelines for the dataset annotation and prodigy setup can be found here: Annotation guidelines
Installation
Dependencies
- You can either install the dependencies using conda or pip. Both are specified below.
- We developed this package using the conda environment specified in deid.yml. You can create the environment using this file, and it will install the required dependencies.
- Robust De-ID requires the packages specified in the requirements.txt file. You can use pip install to install these packages.
- We used the conda approach and activated the deid conda environment for building and testing this package
conda env create -f deid.yml
conda activate deid
Robust De-Id
- To install robust-deid, first install the dependencies (as mentioned above) and then do a pip install of robust de-id package.
pip install robust-deid
Data Format
- The format of the data differs slightly when training a model to running the forward pass.
- The data is in the json format, where we store the notes in a jsonl file. Each line in this file is a json object that refers to one note.
- A jsonl file will have multiple lines, where each line represents a json object that corresponds to a unique note.
- More details on what is present in each line (json object) is presented below.
{"...": "..."}
{"...": "..."}
{"...": "..."}
Training
- The notes should be in json format. The "key" values that we mention below are the ones that we used, you are free to change the keys in the json file (make sure that these changes are reflected in the subsequent steps - train/test/evaluate).
- We show an example for a single note, for multiple notes we would add multiple of the json objects shown below in a single jsonl file.
- The default values in the package assume that the text is present in the "text" field.
- There should be a "meta" field that should contain a unique "note_id" field. Every note should have a unique "note_id". Other metadata fields may be added if required for your needs.
- The "spans" field should contain the annotated spans for the training dataset. They should be in sorted order (based on start position)
- The "spans" field will contain a list of spans, where each span should contain the "start", "end" and "label" of the span
{ "text": "Physician Discharge Summary Admit date: 10/12/1982 Discharge date: 10/22/1982 Patient Information Jack Reacher, 54 y.o. male (DOB = 1/21/1928) ...",
"meta": {"note_id": "1", "patient_id": "1"},
"spans": [{"id":"0", "start": 40, "end": 50, "label": "DATE"}, {"id":"1", "start": 67, "end": 77, "label": "DATE"}, {"id":"3", "start": 98, "end": 110, "label": "PATIENT"}, {"id":"3", "start": 112, "end": 114, "label": "AGE"}, {"...": "..."}]}
Test (Forward Pass/Inference)
- The format is almost the same as above. Since, at test time we don't have annotated spans, we assign an empty list to the "spans" field
- We show an example for a single note, for multiple notes we would add multiple of the json objects shown below in a single jsonl file.
{ "text": "Physician Discharge Summary Admit date: 10/12/1982 Discharge date: 10/22/1982 Patient Information Jack Reacher, 54 y.o. male (DOB = 1/21/1928) ...",
"meta": {"note_id": "1", "patient_id": "1"},
"spans": []}
Usage
- Once you have the package installed and the data ready, follow the steps described below.
- Feel free to replace the models in the demos with any of the ones you have trained or any model from huggingface.
Test (Forward Pass/Inference)
- We have demos for running the forward pass in the following folder: steps/forward_pass. You can add or modify any of the values mentioned in the notebook or shell scripts based on your needs (e.g. sentencizers, tokenizers, model parameters in the config file etc.).
- The forward pass can be run via JupyterNotebook (can also be used via a python script) or a shell script.
- To use a trained model to run the forward pass on the desired dataset, using a JupyterNotebook, follow the steps shown in the ForwardPass.ipynb notebook.
- To use a trained model to run the forward pass on the desired dataset, using a shell script, follow the steps shown in the forward_pass.sh script.
- We also include the step of using the model predictions to de-identify the medical notes in the notebook/script (i.e. producing the de-identified version of the original dataset/text).
Training
- We have demos for running the forward pass in the following folder: steps/train. You can add or modify any of the values mentioned in the notebook or shell scripts based on your needs (e.g. sentencizers, tokenizers, model parameters in the config file etc.).
- Training a model can be done via JupyterNotebook (can also be used via a python script) or a shell script.
- To use a trained model to run the forward pass on the desired dataset, using a JupyterNotebook, follow the steps shown in the Train.ipynb notebook.
- To use a trained model to run the forward pass on the desired dataset, using a shell script, follow the steps shown in the train.sh script.
- We used the i2b2 2014 dataset while creating the demo (you can use any dataset of your choice). To download the i2b2 2014 dataset please visit: https://portal.dbmi.hms.harvard.edu/projects/n2c2-nlp/
Evaluation
- To evaluate a trained model on a dataset, refer to the demos present in the following folder: steps/evaluation
- Evaluating a model can be done via JupyterNotebook (can also be used via a python script) or a shell script.
- To use a trained model and evaluate its performance on the desired dataset, using a JupyterNotebook, follow the steps shown in the Evaluation.ipynb notebook.
- To use a trained model and evaluate its performance on the desired dataset, using a shell script, follow the steps shown in the evaluation.sh script.
- We do both token (suffixed with "_token") and span level evaluation for each entity and overall.
- There's also an option to do binary evaluation - which can be specified via the ner_type_maps argument in the config file. These map existing PHI labels to a new set of PHI labels on which we do the evaluation
Recall biased thresholding
- The objective is to modify the classification thresholds, i.e. instead of choosing the class with the highest probability as the prediction for a token (optimize F1), we modify the classification thresholds to optimize recall.
- While this may decrease precision, having high levels of recall is essential for sensitive datasets.
- The demos in the following folder: steps/recall_threshold demonstrate how we can take our trained models and estimate classification thresholds to optimize recall
- To use a trained model, optimize it for a desired level of recall (based on validation data) and evaluate its performance on the test dataset, using a JupyterNotebook, follow the steps shown in the RecallThreshold.ipynb notebook.
Trained Models
- Our models for de-identification of medical notes can be found in: OBI organization.
- Models:
- Demo:
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file robust_deid-0.3.1.tar.gz
.
File metadata
- Download URL: robust_deid-0.3.1.tar.gz
- Upload date:
- Size: 81.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.8.0 pkginfo/1.8.2 readme-renderer/32.0 requests/2.27.1 requests-toolbelt/0.9.1 urllib3/1.26.8 tqdm/4.50.2 importlib-metadata/4.11.0 keyring/21.4.0 rfc3986/2.0.0 colorama/0.4.4 CPython/3.8.5
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1a2802cab86d192006d3d6cd5daa1faef591fd9f1da7ddd0f2e378c7638a1ad0 |
|
MD5 | 7488453b58c82188aae817c748704bcf |
|
BLAKE2b-256 | 4a93055fbe5bf477c58134ba49f17b1fc4b35c64a6e09f126e21921040ce03ca |
File details
Details for the file robust_deid-0.3.1-py2.py3-none-any.whl
.
File metadata
- Download URL: robust_deid-0.3.1-py2.py3-none-any.whl
- Upload date:
- Size: 107.0 kB
- Tags: Python 2, Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.8.0 pkginfo/1.8.2 readme-renderer/32.0 requests/2.27.1 requests-toolbelt/0.9.1 urllib3/1.26.8 tqdm/4.50.2 importlib-metadata/4.11.0 keyring/21.4.0 rfc3986/2.0.0 colorama/0.4.4 CPython/3.8.5
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | b0934c764dc386057c9e0c0d9e876f292060179cf6c01792f4d840e4831a168d |
|
MD5 | b3c8ff88940d57f14075bcd50d1be7a5 |
|
BLAKE2b-256 | d8241447907542176842e5d3fa643e255e6539965bb50730c533c9bfd97fb63d |