Author of the publication

Managing re-identification risks while providing access to the All of Us research program.

, , , , , , , , , , and . J. Am. Medical Informatics Assoc., 30 (5): 907-914 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault oblivious high performance computing with dynamic task replication and substitution., , , , and . Comput. Sci. Res. Dev., 26 (3-4): 297-305 (2011)Attacking Shortest Paths by Cutting Edges., , , , , and . ACM Trans. Knowl. Discov. Data, 18 (2): 35:1-35:42 (February 2024)Learning payoff functions in infinite games., , and . Mach. Learn., 67 (1-2): 145-168 (2007)Characterizing short-term stability for Boolean networks over any distribution of transfer functions., , , , and . CoRR, (2014)Attacking Shortest Paths by Cutting Edges., , , , , and . CoRR, (2022)Preference Poisoning Attacks on Reward Model Learning., , , , , and . CoRR, (2024)Conformal Temporal Logic Planning using Large Language Models: Knowing When to Do What and When to Ask for Help., , , , and . CoRR, (2023)Defense Against Shortest Path Attacks., , , , , and . CoRR, (2023)Homophily-Driven Sanitation View for Robust Graph Contrastive Learning., , , and . CoRR, (2023)Incentivizing Truthfulness Through Audits in Strategic Classification., , and . CoRR, (2020)