Search

Your search keyword '"Malin, Bradley"' showing total 40 results

Search Constraints

Start Over You searched for: Author "Malin, Bradley" Remove constraint Author: "Malin, Bradley"
40 results on '"Malin, Bradley"'

Search Results

1. Leveraging medical context to recommend semantically similar terms for chart reviews.

2. Re-identification of individuals in genomic datasets using public face images.

3. Identifiability in biobanks: models, measures, and mitigation strategies.

4. Secure construction of k-unlinkable patient records from distributed providers

6. k-Unlinkability: A privacy protection model for distributed data

7. A computational model to protect patient data from location-based re-identification

8. Leveraging blockchain for immutable logging and querying across multiple sites.

9. A game theoretic approach to balance privacy risks and familial benefits.

10. Ensuring Patient Privacy in Data Sharing for Postapproval Research.

11. Antibodies to Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) in All of Us Research Program Participants, 2 January to 18 March 2020.

12. Direct-to-consumer genetic testing: Prospective users' attitudes toward information about ancestry and biological relationships.

13. Preserving Privacy by De-Identifying Face Images.

14. Health and kinship matter: Learning about direct-to-consumer genetic testing user experiences via online discussions.

15. A systematic literature review of individuals’ perspectives on privacy and genetic information in the United States.

16. Digital Health Applications in Oncology: An Opportunity to Seize.

18. De facto diagnosis specialties: Recognition and discovery.

19. Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services.

20. Scalable Iterative Classification for Sanitizing Large-Scale Datasets.

21. Expanding Access to Large-Scale Genomic Data While Promoting Privacy: A Game Theoretic Approach.

22. Protecting genomic data analytics in the cloud: state of the art and opportunities.

23. Privacy in the Genomic Era.

24. A Game Theoretic Framework for Analyzing Re-Identification Risk.

25. SecureMA: protecting participant privacy in genetic association meta-analysis.

26. Composite Bloom Filters for Secure Record Linkage.

27. A community assessment of privacy preserving techniques for human genomes.

28. De-identification of clinical narratives through writing complexity measures.

29. A probabilistic approach to mitigate composition attacks on privacy in non-coordinated environments.

30. We work with them? Healthcare workers interpretation of organizational relations mined from electronic health records.

31. Learning the impact of acute and chronic diseases on forecasting neonatal encephalopathy.

32. Enabling Genomic-Phenomic Association Discovery without Sacrificing Anonymity.

33. Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage

34. A Systematic Review of Re-Identification Attacks on Health Data.

35. The MITRE Identification Scrubber Toolkit: Design, training, and assessment

36. Formal anonymity models for efficient privacy-preserving joins

37. Ethical and Practical Issues Associated with Aggregating Databases.

38. Assessing data intrusion threats.

39. Data Re-Identification: Societal Safeguards.

Catalog

Books, media, physical & digital resources