Author of the publication

Preserving Privacy by De-Identifying Face Images.

, , and . IEEE Trans. Knowl. Data Eng., 17 (2): 232-243 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GenoPri'16: International Workshop on Genome Privacy and Security., , and . IEEE ACM Trans. Comput. Biol. Bioinform., 15 (5): 1403-1404 (2018)Resilience of clinical text de-identified with "hiding in plain sight" to hostile reidentification attacks by human readers., , , , , , , , and . J. Am. Medical Informatics Assoc., 27 (9): 1374-1382 (2020)R-U policy frontiers for health data de-identification., , , , and . J. Am. Medical Informatics Assoc., 22 (5): 1029-1041 (2015)Managing re-identification risks while providing access to the All of Us research program., , , , , , , , , and 1 other author(s). J. Am. Medical Informatics Assoc., 30 (5): 907-914 (April 2023)Keeping synthetic patients on track: feedback mechanisms to mitigate performance drift in longitudinal health data simulation., , and . J. Am. Medical Informatics Assoc., 29 (11): 1890-1898 (2022)Predicting brain function status changes in critically ill patients via Machine learning., , , , , , , and . J. Am. Medical Informatics Assoc., 28 (11): 2412-2422 (2021)EVA: Generating Longitudinal Electronic Health Records Using Conditional Variational Autoencoders., , , , , and . CoRR, (2020)Re-identification of Individuals in Genomic Datasets Using Public Face Images., , and . CoRR, (2021)Inferring Genotype from Clinical Phenotype through a Knowledge Based Algorithm., and . Pacific Symposium on Biocomputing, page 41-52. (2002)Detecting Anomalous Insiders in Collaborative Information Systems., , and . IEEE Trans. Dependable Secur. Comput., 9 (3): 332-344 (2012)