Author of the publication

Building a best-in-class automated de-identification tool for electronic health records through ensemble learning.

, , , , , , , , , , and . Patterns, 2 (6): 100255 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging social networks to detect anomalous insider actions in collaborative environments., , , and . ISI, page 119-124. IEEE, (2011)Preserving Privacy by De-Identifying Face Images., , and . IEEE Trans. Knowl. Data Eng., 17 (2): 232-243 (2005)CheapSMC: A Framework to Minimize SMC Cost in Cloud., , , and . CoRR, (2016)k-Unlinkability: A privacy protection model for distributed data.. Data Knowl. Eng., 64 (1): 294-311 (2008)Leveraging Blockchain for Immutable Logging and Querying Across Multiple Sites., , and . CoRR, (2020)A Deep Learning Approach to Predict Neonatal Encephalopathy from Electronic Health Records., , , , and . ICHI, page 1-7. IEEE, (2019)Inferring Genotype from Clinical Phenotype through a Knowledge Based Algorithm., and . Pacific Symposium on Biocomputing, page 41-52. (2002)A Network Analysis Model for Disambiguation of Names in Lists., , and . Comput. Math. Organ. Theory, 11 (2): 119-139 (2005)Detecting Anomalous Insiders in Collaborative Information Systems., , and . IEEE Trans. Dependable Secur. Comput., 9 (3): 332-344 (2012)Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits., , , , and . ACM Trans. Manag. Inf. Syst., 4 (4): 17:1-17:20 (2013)