Search

Your search keyword '"Ning Shang"' showing total 39 results

Search Constraints

Start Over You searched for: Author "Ning Shang" Remove constraint Author: "Ning Shang" Topic computer science Remove constraint Topic: computer science
39 results on '"Ning Shang"'

Search Results

1. Neptune: an environment for the delivery of genomic medicine

2. A machine learning based golden-free detection method for command-activated hardware Trojan

3. Under-specification as the source of ambiguity and vagueness in narrative phenotype algorithm definitions

4. Harmonizing Clinical Sequencing and Interpretation for the eMERGE III Network

5. Joint Landmark and Structure Learning for Automatic Evaluation of Developmental Dysplasia of the Hip

6. Comparative effectiveness of medical concept embedding for feature engineering in phenotyping

7. Comparative Effectiveness of Knowledge Graphs- and EHR Data-Based Medical Concept Embedding for Phenotyping

8. Homological Fault Attack on AES Block Cipher and Its Countermeasures

9. A conceptual framework for evaluating data suitability for observational studies

10. Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis

11. A graph-based method for reconstructing entities from coordination ellipsis in medical text

12. Ensembles of Natural Language Processing Systems for Portable Phenotyping Solutions

13. Adapting electronic health records-derived phenotypes to claims data: Lessons learned in using limited clinical data for phenotyping

14. Similarity-based health risk prediction using Domain Fusion and electronic health records data

15. 4429 Powering precision medicine research with the efficient construction of large diverse cohorts

16. Power Analysis and Protection on SPECK and Its Application in IoT

17. Criteria2Query: a natural language interface to clinical databases for cohort definition

18. A case study evaluating the portability of an executable computable phenotype algorithm across multiple institutions and electronic health record environments

19. Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY

20. Effect of vocabulary mapping for conditions on phenotype cohorts

21. Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9

22. Identifying plausible adverse drug reactions using knowledge extracted from the literature

23. Making work visible for electronic phenotype implementation: Lessons learned from the eMERGE network

24. Facilitating phenotype transfer using a common data model

25. Privacy Preserving Policy-Based Content Sharing in Public Clouds

26. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model

27. A Harmonized Data Quality Assessment Terminology and Framework for the Secondary Use of Electronic Health Record Data

28. 316 Development of a phenotyping algorithm to identify patients with autoimmune disease in electronic health records for future large scale studies

29. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting

31. Efficient privacy preserving content based publish subscribe systems

32. Mask

33. Efficient and privacy-preserving enforcement of attribute-based access control

34. Controlling data disclosure in computational PIR protocols

35. A privacy-preserving approach to policy-based content dissemination

36. VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices

37. iOmS: An Agent-Based P2P Framework for Ubiquitous Workflow

38. Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation.

39. A Top Down Algorithm for Mining Web Access Patterns from Web Logs.

Catalog

Books, media, physical & digital resources