From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluating the risk of patient re-identification from adverse drug event reports., , , и . BMC Medical Informatics Decis. Mak., (2013)De-identifying a public use microdata file from the Canadian national discharge abstract database., , , и . BMC Medical Informatics Decis. Mak., (2011)A risk-based framework for biomedical data sharing., и . J. Biomed. Informatics, (2017)Research Paper: A Globally Optimal k-Anonymity Method for the De-Identification of Health Data., , , , , , , , , и 2 other автор(ы). J. Am. Medical Informatics Assoc., 16 (5): 670-682 (2009)A theoretical model for obfuscating web navigation trails., и . EDBT/ICDT Workshops, стр. 137-144. ACM, (2013)Research Paper: Protecting Privacy Using k-Anonymity., и . J. Am. Medical Informatics Assoc., 15 (5): 627-637 (2008)A method for evaluating marketer re-identification risk., и . EDBT/ICDT Workshops, ACM, (2010)Privacy-Preserving ID3 Algorithms: A Comparison., и . UEMCON, стр. 16-22. IEEE, (2021)A Theoretical Multi-level Privacy Protection Framework for Biomedical Data Warehouses., и . EUSPN/ICTH, том 63 из Procedia Computer Science, стр. 569-574. Elsevier, (2015)Using Robust Estimation Theory to Design Efficient Secure Multiparty Linear Regression., , и . EDBT/ICDT Workshops, том 1558 из CEUR Workshop Proceedings, CEUR-WS.org, (2016)