Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Logistic Regression based on Homomorphic Encryption., , , , and . IACR Cryptology ePrint Archive, (2018)Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery., , , , and . JAMIA, 22 (1): 100-108 (2015)Protecting patient privacy in survival analyses., , and . J. Am. Medical Informatics Assoc., 27 (3): 366-375 (2020)PhenDisco: phenotype discovery system for the database of genotypes and phenotypes., , , , , , , , , and 5 other author(s). JAMIA, 21 (1): 31-36 (2014)Trends in biomedical informatics: most cited topics from recent years., , , and . JAMIA, 18 (Supplement): 166-170 (2011)SVAT: Secure outsourcing of variant annotation and genotype aggregation., , , and . BMC Bioinform., 23 (1): 409 (2022)SAFETY: Secure gwAs in Federated Environment through a hYbrid Solution., , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 16 (1): 93-102 (2019)SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol., , , , , , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 16 (1): 113-123 (2019)Modeling and Simulation Studies of Complex Biological Systems for Precision Medicine and Healthcare., , and . IEEE ACM Trans. Comput. Biol. Bioinform., 16 (1): 91-92 (2019)A system to build distributed multivariate models and manage disparate data sharing policies: implementation in the scalable national network for effectiveness research., , , , , , , , , and 6 other author(s). J. Am. Medical Informatics Assoc., 22 (6): 1187-1195 (2015)