Search

Your search keyword '"Malin, Bradley"' showing total 46 results

Search Constraints

Start Over You searched for: Author "Malin, Bradley" Remove constraint Author: "Malin, Bradley" Topic privacy Remove constraint Topic: privacy
46 results on '"Malin, Bradley"'

Search Results

1. PanDa Game: Optimized Privacy-Preserving Publishing of Individual-Level Pandemic Data Based on a Game Theoretic Model.

2. Enabling tradeoffs in privacy and utility in genomic data Beacons and summary statistics.

3. A game theoretic approach to balance privacy risks and familial benefits.

4. Dobbs and the future of health data privacy for patients and healthcare organizations.

5. Sociotechnical safeguards for genomic data privacy.

6. Dynamically adjusting case reporting policy to maximize privacy and public health utility in the face of a pandemic.

7. SCOR: A secure international informatics infrastructure to investigate COVID-19.

9. A systematic review of re-identification attacks on health data.

10. Anonymization of administrative billing codes with repeated diagnoses through censoring.

11. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research.

12. Dobbs and the future of health data privacy for patients and healthcare organizations.

13. Keeping synthetic patients on track: feedback mechanisms to mitigate performance drift in longitudinal health data simulation.

14. Public Attitudes Toward Direct to Consumer Genetic Testing

15. Preserving privacy by de-identifying face images

16. SynTEG: a framework for temporal structured electronic health data simulation.

17. Resilience of clinical text de-identified with "hiding in plain sight" to hostile reidentification attacks by human readers.

18. Ensuring electronic medical record simulation through better training, modeling, and evaluation.

19. Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services.

20. Scalable Iterative Classification for Sanitizing Large-Scale Datasets.

21. Optimizing annotation resources for natural language de-identification via a game theoretic framework.

22. A multi-institution evaluation of clinical profile anonymization.

23. R-U policy frontiers for health data de-identification.

24. Genomic Data Privacy and Security: Where We Stand and Where We Are Heading.

25. Size matters: how population size influences genotype-phenotype association studies in anonymized data.

26. Composite Bloom Filters for Secure Record Linkage.

27. Anonymization of Longitudinal Electronic Medical Records.

28. Secure Management of Biomedical Data With Cryptographic Hardware.

29. Secure construction of k-unlinkable patient records from distributed providers

30. Technical and Policy Approaches to Balancing Patient Privacy and Data Sharing in Clinical and Translational Research.

31. A Cryptographic Approach to Securely Share and Query Genomic Sequences.

32. A computational model to protect patient data from location-based re-identification

33. Confidentiality Preserving Audits of Electronic Medical Record Access.

34. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.

35. Detecting Anomalous Insiders in Collaborative Information Systems.

36. Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems.

37. Maximizing Privacy under Data Distortion Constraints in Noise Perturbation Methods

38. Data and Structural k-Anonymity in Social Networks

39. Preserving the Privacy of Sensitive Relationships in Graph Data

40. De-identification of clinical narratives through writing complexity measures.

41. A probabilistic approach to mitigate composition attacks on privacy in non-coordinated environments.

42. Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage

43. The MITRE Identification Scrubber Toolkit: Design, training, and assessment

44. Formal anonymity models for efficient privacy-preserving joins

45. R-U policy frontiers for health data de-identification

46. A probabilistic approach to mitigate composition attacks on privacy in non-coordinated environments

Catalog

Books, media, physical & digital resources