Author of the publication

Managing re-identification risks while providing access to the All of Us research program.

, , , , , , , , , , and . J. Am. Medical Informatics Assoc., 30 (5): 907-914 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging social networks to detect anomalous insider actions in collaborative environments., , , and . ISI, page 119-124. IEEE, (2011)Preserving Privacy by De-Identifying Face Images., , and . IEEE Trans. Knowl. Data Eng., 17 (2): 232-243 (2005)CheapSMC: A Framework to Minimize SMC Cost in Cloud., , , and . CoRR, (2016)k-Unlinkability: A privacy protection model for distributed data.. Data Knowl. Eng., 64 (1): 294-311 (2008)Leveraging Blockchain for Immutable Logging and Querying Across Multiple Sites., , and . CoRR, (2020)GenoPri'16: International Workshop on Genome Privacy and Security., , and . IEEE ACM Trans. Comput. Biol. Bioinform., 15 (5): 1403-1404 (2018)Resilience of clinical text de-identified with "hiding in plain sight" to hostile reidentification attacks by human readers., , , , , , , , and . J. Am. Medical Informatics Assoc., 27 (9): 1374-1382 (2020)R-U policy frontiers for health data de-identification., , , , and . J. Am. Medical Informatics Assoc., 22 (5): 1029-1041 (2015)Managing re-identification risks while providing access to the All of Us research program., , , , , , , , , and 1 other author(s). J. Am. Medical Informatics Assoc., 30 (5): 907-914 (April 2023)Keeping synthetic patients on track: feedback mechanisms to mitigate performance drift in longitudinal health data simulation., , and . J. Am. Medical Informatics Assoc., 29 (11): 1890-1898 (2022)