From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leveraging social networks to detect anomalous insider actions in collaborative environments., , , и . ISI, стр. 119-124. IEEE, (2011)Preserving Privacy by De-Identifying Face Images., , и . IEEE Trans. Knowl. Data Eng., 17 (2): 232-243 (2005)CheapSMC: A Framework to Minimize SMC Cost in Cloud., , , и . CoRR, (2016)k-Unlinkability: A privacy protection model for distributed data.. Data Knowl. Eng., 64 (1): 294-311 (2008)Leveraging Blockchain for Immutable Logging and Querying Across Multiple Sites., , и . CoRR, (2020)A Deep Learning Approach to Predict Neonatal Encephalopathy from Electronic Health Records., , , , и . ICHI, стр. 1-7. IEEE, (2019)Inferring Genotype from Clinical Phenotype through a Knowledge Based Algorithm., и . Pacific Symposium on Biocomputing, стр. 41-52. (2002)A Network Analysis Model for Disambiguation of Names in Lists., , и . Comput. Math. Organ. Theory, 11 (2): 119-139 (2005)Detecting Anomalous Insiders in Collaborative Information Systems., , и . IEEE Trans. Dependable Secur. Comput., 9 (3): 332-344 (2012)Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits., , , , и . ACM Trans. Manag. Inf. Syst., 4 (4): 17:1-17:20 (2013)