Bradley A. Malin

Affiliations:
  • Vanderbilt University, School of Medicine, Nashville, TN, USA


According to our database1, Bradley A. Malin authored at least 187 papers between 2000 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Membership inference attacks against synthetic health data.
J. Biomed. Informatics, 2022

Dynamically adjusting case reporting policy to maximize privacy and public health utility in the face of a pandemic.
J. Am. Medical Informatics Assoc., 2022

GINN: Fast GPU-TEE Based Integrity for Neural Network Training.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Lucene-P$^2$2: A Distributed Platform for Privacy-Preserving Text-Based Search.
IEEE Trans. Dependable Secur. Comput., 2021

Building a best-in-class automated de-identification tool for electronic health records through ensemble learning.
Patterns, 2021

Leveraging medical context to recommend semantically similar terms for chart reviews.
BMC Medical Informatics Decis. Mak., 2021

Predicting next-day discharge via electronic health record access logs.
J. Am. Medical Informatics Assoc., 2021

SynTEG: a framework for temporal structured electronic health data simulation.
J. Am. Medical Informatics Assoc., 2021

Predicting brain function status changes in critically ill patients via Machine learning.
J. Am. Medical Informatics Assoc., 2021

Mining tasks and task characteristics from electronic health record audit logs with unsupervised machine learning.
J. Am. Medical Informatics Assoc., 2021

Defending Against Membership Inference Attacks on Beacon Services.
CoRR, 2021

Dynamically Adjusting Case-Reporting Policy to Maximize Privacy and Utility in the Face of a Pandemic.
CoRR, 2021

Blending Knowledge in Deep Recurrent Networks for Adverse Event Prediction at Hospital Discharge.
CoRR, 2021

Re-identification of Individuals in Genomic Datasets Using Public Face Images.
CoRR, 2021

Learning the impact of acute and chronic diseases on forecasting neonatal encephalopathy.
Comput. Methods Programs Biomed., 2021

EVA: Generating Longitudinal Electronic Health Records Using Conditional Variational Autoencoders.
Proceedings of the Machine Learning for Healthcare Conference, 2021

2020
Predicting Missing Values in Medical Data Via XGBoost Regression.
J. Heal. Informatics Res., 2020

Ensuring electronic medical record simulation through better training, modeling, and evaluation.
J. Am. Medical Informatics Assoc., 2020

SCOR: A secure international informatics infrastructure to investigate COVID-19.
J. Am. Medical Informatics Assoc., 2020

Resilience of clinical text de-identified with "hiding in plain sight" to hostile reidentification attacks by human readers.
J. Am. Medical Informatics Assoc., 2020

EVA: Generating Longitudinal Electronic Health Records Using Conditional Variational Autoencoders.
CoRR, 2020

GOAT: GPU Outsourcing of Deep Learning Training With Asynchronous Probabilistic Integrity Verification Inside Trusted Execution Environment.
CoRR, 2020

Leveraging Blockchain for Immutable Logging and Querying Across Multiple Sites.
CoRR, 2020

A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments.
Proceedings of the Second IEEE International Conference on Trust, 2020

To Warn or Not to Warn: Online Signaling in Audit Games.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

De-Identification of Clinical Text: Stakeholders' Perspectives and Acceptance of Automatic De-Identification.
Proceedings of the AMIA 2020, 2020

Learning Tasks of Pediatric Providers from Electronic Health Record Audit Logs.
Proceedings of the AMIA 2020, 2020

Generating Electronic Health Records with Multiple Data Types and Constraints.
Proceedings of the AMIA 2020, 2020

2019
Database Audit Workload Prioritization via Game Theory.
ACM Trans. Priv. Secur., 2019

Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective.
Proc. Priv. Enhancing Technol., 2019

Deep learning predicts extreme preterm birth from electronic health records.
J. Biomed. Informatics, 2019

A systematic literature review of machine learning in online personal health data.
J. Am. Medical Informatics Assoc., 2019

The machine giveth and the machine taketh away: a parrot attack on clinical text deidentified with hiding in plain sight.
J. Am. Medical Informatics Assoc., 2019

Health and Kinship Matter: Learning About Direct-To-Consumer Genetic Testing User Experiences via Online Discussions.
CoRR, 2019

A Semantic Cover Approach for Topic Modeling.
Proceedings of the Eighth Joint Conference on Lexical and Computational Semantics, 2019

CP Tensor Decomposition with Cannot-Link Intermode Constraints.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019

Determining the Impact of Missing Values on Blocking in Record Linkage.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

Leveraging Electronic Health Records to Learn Progression Path for Severe Maternal Morbidity.
Proceedings of the MEDINFO 2019: Health and Wellbeing e-Networks for All, 2019

Learning to Identify Severe Maternal Morbidity from Electronic Health Records.
Proceedings of the MEDINFO 2019: Health and Wellbeing e-Networks for All, 2019

XGBoost Imputation for Time Series Data.
Proceedings of the 2019 IEEE International Conference on Healthcare Informatics, 2019

Deep Imputation of Temporal Data.
Proceedings of the 2019 IEEE International Conference on Healthcare Informatics, 2019

A Deep Learning Approach to Predict Neonatal Encephalopathy from Electronic Health Records.
Proceedings of the 2019 IEEE International Conference on Healthcare Informatics, 2019

Obstetric Patients with Repetitious Hospital Location Transfers Have Prolonged Stays.
Proceedings of the 2019 IEEE International Conference on Healthcare Informatics, 2019

Patient Messaging Content Associated with Initiating Hormonal Therapy after a Breast Cancer Diagnosis.
Proceedings of the AMIA 2019, 2019

Why Patient Portal Messages Indicate Risk of Readmission for Patients with Ischemic Heart Disease.
Proceedings of the AMIA 2019, 2019

Public Attitudes Toward Direct to Consumer Genetic Testing.
Proceedings of the AMIA 2019, 2019

Biomedical Research Cohort Membership Disclosure on Social Media.
Proceedings of the AMIA 2019, 2019

Corpus Size Influences Clinical Concept Embeddings.
Proceedings of the AMIA 2019, 2019

2018
GenoPri'16: International Workshop on Genome Privacy and Security.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018

Development of an automated phenotyping algorithm for hepatorenal syndrome.
J. Biomed. Informatics, 2018

Learning bundled care opportunities from electronic medical records.
J. Biomed. Informatics, 2018

The therapy is making me sick: how online portal communications between breast cancer patients and physicians indicate medication discontinuation.
J. Am. Medical Informatics Assoc., 2018

It's all in the timing: calibrating temporal penalties for biomedical data sharing.
J. Am. Medical Informatics Assoc., 2018

Interaction patterns of trauma providers are associated with length of stay.
J. Am. Medical Informatics Assoc., 2018

PIVETed-Granite: Computational Phenotypes through Constrained Tensor Factorization.
CoRR, 2018

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Mining the Best Observational Window to Model Social Phenomena.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Learning When Communications Between Healthcare Providers Indicate Hormonal Therapy Medication Discontinuation.
Proceedings of the AMIA 2018, 2018

Detecting the Presence of an Individual in Phenotypic Summary Data.
Proceedings of the AMIA 2018, 2018

Phenotyping through Semi-Supervised Tensor Factorization (PSST).
Proceedings of the AMIA 2018, 2018

Crowdsourcing Clinical Chart Reviews.
Proceedings of the AMIA 2018, 2018

2017
Scalable Iterative Classification for Sanitizing Large-Scale Datasets.
IEEE Trans. Knowl. Data Eng., 2017

Towards a privacy preserving cohort discovery framework for clinical research networks.
J. Biomed. Informatics, 2017

Identifying collaborative care teams through electronic medical record utilization patterns.
J. Am. Medical Informatics Assoc., 2017

Genomic Data Privacy and Security: Where We Stand and Where We Are Heading.
IEEE Secur. Priv., 2017

Systematizing Genomic Privacy Research - A Critical Analysis.
CoRR, 2017

Generating Multi-label Discrete Electronic Health Records using Generative Adversarial Networks.
CoRR, 2017

A Data-Driven Analysis of the Influence of Care Coordination on Trauma Outcome.
CoRR, 2017

Generating Multi-label Discrete Patient Records using Generative Adversarial Networks.
Proceedings of the Machine Learning for Health Care Conference, 2017

Predicting Length of Stay for Obstetric Patients via Electronic Medical Records.
Proceedings of the MEDINFO 2017: Precision Healthcare through Informatics, 2017

The Power of the Patient Voice: Learning Indicators of Treatment Adherence From An Online Breast Cancer Forum.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Granite: Diversified, Sparse Tensor Factorization for Electronic Health Record-Based Phenotyping.
Proceedings of the 2017 IEEE International Conference on Healthcare Informatics, 2017

Building a Dossier on the Cheap: Integrating Distributed Personal Data Resources Under Cost Constraints.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Reciprocity and its Association with Treatment Adherence in an Online Breast Cancer Forum.
Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems, 2017

Talking About My Care: Detecting Mentions of Hormonal Therapy Adherence Behavior in an Online Breast Cancer Community.
Proceedings of the AMIA 2017, 2017

Computational Phenotyping on Diverse Data Sources.
Proceedings of the AMIA 2017, 2017

An Open Source Tool for Game Theoretic Health Data De-Identification.
Proceedings of the AMIA 2017, 2017

Evaluating the Effectiveness of Auditing Rules for Electronic Health Record Systems.
Proceedings of the AMIA 2017, 2017

A Game-Theoretic Approach for Alert Prioritization.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Optimizing annotation resources for natural language de-identification via a game theoretic framework.
J. Biomed. Informatics, 2016

Preserving temporal relations in clinical data while maintaining privacy.
J. Am. Medical Informatics Assoc., 2016

A multi-institution evaluation of clinical profile anonymization.
J. Am. Medical Informatics Assoc., 2016

CheapSMC: A Framework to Minimize SMC Cost in Cloud.
CoRR, 2016

#PrayForDad: Learning the Semantics Behind Why Social Media Users Disclose Health Information.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Optimizing secure classification performance with privacy-aware feature selection.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Learning Clinical Workflows to Identify Subgroups of Heart Failure Patients.
Proceedings of the AMIA 2016, 2016

Predicting Negative Events: Using Post-discharge Data to Detect High-Risk Patients.
Proceedings of the AMIA 2016, 2016

Big Data for Healthcare and Life Sciences: Learning Useful Insights from Imperfect Data.
Proceedings of the AMIA 2016, 2016

2015
Building bridges across electronic health record systems through inferred phenotypic topics.
J. Biomed. Informatics, 2015

R-U policy frontiers for health data de-identification.
J. Am. Medical Informatics Assoc., 2015

Design and implementation of a privacy preserving electronic health record linkage tool in Chicago.
J. Am. Medical Informatics Assoc., 2015

Genomic Privacy (Dagstuhl Seminar 15431).
Dagstuhl Reports, 2015

Privacy in the Genomic Era.
ACM Comput. Surv., 2015

Rubik: Knowledge Guided Tensor Factorization and Completion for Health Data Analytics.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

Iterative Classification for Sanitizing Large-Scale Datasets.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Privacy-aware dynamic feature selection.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Process-Driven Data Privacy.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Discovering de facto diagnosis specialties.
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

Patient privacy and "de-identified" health records in the genomic era.
Proceedings of the AMIA 2015, 2015

Mining Twitter as a First Step toward Assessing the Adequacy of Gender Identification Terms on Intake Forms.
Proceedings of the AMIA 2015, 2015

Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization.
Proceedings of the AMIA 2015, 2015

Methods to Mitigate Risk of Composition Attack in Independent Data Publications.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
Composite Bloom Filters for Secure Record Linkage.
IEEE Trans. Knowl. Data Eng., 2014

A community assessment of privacy preserving techniques for human genomes.
BMC Medical Informatics Decis. Mak., 2014

A probabilistic approach to mitigate composition attacks on privacy in non-coordinated environments.
Knowl. Based Syst., 2014

PARAMO: A PARAllel predictive MOdeling platform for healthcare analytic research using electronic health records.
J. Biomed. Informatics, 2014

Limestone: High-throughput candidate phenotype generation via tensor factorization.
J. Biomed. Informatics, 2014

Size matters: How population size influences genotype-phenotype association studies in anonymized data.
J. Biomed. Informatics, 2014

Predicting changes in hypertension control using electronic health records from a chronic disease management program.
J. Am. Medical Informatics Assoc., 2014

De-identification of clinical narratives through writing complexity measures.
Int. J. Medical Informatics, 2014

We work with them? Healthcare workers interpretation of organizational relations mined from electronic health records.
Int. J. Medical Informatics, 2014

Privacy and Security in the Genomic Era.
CoRR, 2014

SecureMA: protecting participant privacy in genetic association meta-analysis.
Bioinform., 2014

Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage.
Proceedings of the AMIA 2014, 2014

2013
Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits.
ACM Trans. Manag. Inf. Syst., 2013

Biomedical data privacy: problems, perspectives, and recent advances.
J. Am. Medical Informatics Assoc., 2013

A practical approach to achieve private medical record linkage in light of public resources.
J. Am. Medical Informatics Assoc., 2013

Hiding in plain sight: use of realistic surrogates to reduce exposure of protected health information in clinical text.
J. Am. Medical Informatics Assoc., 2013

Reducing patient re-identification risk for laboratory results within research datasets.
J. Am. Medical Informatics Assoc., 2013

Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

Evolving role definitions through permission invocation patterns.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Automatic Clinical Text De-Identification: Is It Worth It, and Could It Work for Me?
Proceedings of the MEDINFO 2013, 2013

Modeling and detecting anomalous topic access.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Scalable load balancing for mapreduce-based record linkage.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Efficient privacy-aware record integration.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Efficient discovery of de-identification policy options through a risk-utility frontier.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Scalable and robust key group size estimation for reducer load balancing in MapReduce.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

Location Bias of Identifiers in Clinical Narratives.
Proceedings of the AMIA 2013, 2013

2012
Anonymization of Longitudinal Electronic Medical Records.
IEEE Trans. Inf. Technol. Biomed., 2012

Secure Management of Biomedical Data With Cryptographic Hardware.
IEEE Trans. Inf. Technol. Biomed., 2012

Detecting Anomalous Insiders in Collaborative Information Systems.
IEEE Trans. Dependable Secur. Comput., 2012

Specializing network analysis to detect anomalous insider actions.
Secur. Informatics, 2012

Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage.
Inf. Fusion, 2012

Detecting Anomalous User Behaviors in Workflow-Driven Web Applications.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Rethinking the "Honest Broker" in the Changing Face of Security and Privacy.
Proceedings of the AMIA 2012, 2012

The Chicago Health Atlas: A Public Resource to Visualize Health Conditions and Resources in Chicago.
Proceedings of the AMIA 2012, 2012

Auditing Medical Records Accesses via Healthcare Interaction Networks.
Proceedings of the AMIA 2012, 2012

2011
COAT: COnstraint-based anonymization of transactions.
Knowl. Inf. Syst., 2011

Learning relational policies from electronic health record access logs.
J. Biomed. Informatics, 2011

Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule.
J. Am. Medical Informatics Assoc., 2011

A secure protocol for protecting the identity of providers when disclosing data for disease surveillance.
J. Am. Medical Informatics Assoc., 2011

Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems.
IEEE Secur. Priv., 2011

An entropy approach to disclosure risk assessment: Lessons from real applications and simulated domains.
Decis. Support Syst., 2011

Towards understanding the usage pattern of web-based electronic medical record systems.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Context-Aware Anomaly Detection for Electronic Medical Record Systems.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record Linkage.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Leveraging social networks to detect anomalous insider actions in collaborative environments.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Detection of anomalous insiders in collaborative environments via relational analysis of access logs.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Effects of personal identifier resynthesis on clinical text de-identification.
J. Am. Medical Informatics Assoc., 2010

The disclosure of diagnosis codes can breach research participants' privacy.
J. Am. Medical Informatics Assoc., 2010

Evaluating re-identification risks with respect to the HIPAA privacy rule.
J. Am. Medical Informatics Assoc., 2010

The MITRE Identification Scrubber Toolkit: Design, training, and assessment.
Int. J. Medical Informatics, 2010

Secure construction of k-unlinkable patient records from distributed providers.
Artif. Intell. Medicine, 2010

EBAM: Experience-Based Access Management for Healthcare.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Beyond safe harbor: automatic discovery of health information de-identification policy alternatives.
Proceedings of the ACM International Health Informatics Symposium, 2010

2009
Formal anonymity models for efficient privacy-preserving joins.
Data Knowl. Eng., 2009

2008
Privacy Protection: Regulations and Technologies, Opportunities and Threats.
Proceedings of the Mobility, Data Mining and Privacy - Geographic Knowledge Discovery, 2008

A Cryptographic Approach to Securely Share and Query Genomic Sequences.
IEEE Trans. Inf. Technol. Biomed., 2008

PinKDD'08: privacy, security, and trust in KDD post workshop report.
SIGKDD Explor., 2008

k-Unlinkability: A privacy protection model for distributed data.
Data Knowl. Eng., 2008

Recent advances in preserving privacy when mining data.
Data Knowl. Eng., 2008

A Privacy-Preserving Framework for Integrating Person-Specific Databases.
Proceedings of the Privacy in Statistical Databases, 2008

2007
PinKDD'07: privacy, security, and trust in KDD post-workshop report.
SIGKDD Explor., 2007

Towards the security and privacy analysis of patient portals.
SIGBED Rev., 2007

Research Paper: A Longitudinal Social Network Analysis of the Editorial Boards of Medical Informatics and Bioinformatics Journals.
J. Am. Medical Informatics Assoc., 2007

A computational model to protect patient data from location-based re-identification.
Artif. Intell. Medicine, 2007

First International Workshop on the Model-Based Design of Trustworthy Health Information Systems.
Proceedings of the Models in Software Engineering, Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30, 2007

Confidentiality Preserving Audits of Electronic Medical Record Access.
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007

A Modeling Environment for Patient Portals.
Proceedings of the AMIA 2007, 2007

2006
The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Composition and Disclosure of Unlinkable Distributed Databases.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Re-identification of Familial Database Records.
Proceedings of the AMIA 2006, 2006

2005
Preserving Privacy by De-Identifying Face Images.
IEEE Trans. Knowl. Data Eng., 2005

Technical Evaluation: An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future.
J. Am. Medical Informatics Assoc., 2005

A Network Analysis Model for Disambiguation of Names in Lists.
Comput. Math. Organ. Theory, 2005

Integrating Utility into Face De-identification.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Email alias detection using social network analysis.
Proceedings of the 3rd international workshop on Link discovery, 2005

Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants.
Proceedings of the 21st International Conference on Data Engineering, 2005

A Secure Protocol to Distribute Unlinkable Health Data.
Proceedings of the AMIA 2005, 2005

Technologies to Defeat Fraudulent Schemes Related to Email Requests.
Proceedings of the AI Technologies for Homeland Security, 2005

2004
How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.
J. Biomed. Informatics, 2004

2002
Inferring Genotype from Clinical Phenotype through a Knowledge Based Algorithm.
Proceedings of the 7th Pacific Symposium on Biocomputing, 2002

Correlating web usage of health information with patient medical data.
Proceedings of the AMIA 2002, 2002

2001
Re-identification of DNA through an automated linkage process.
Proceedings of the AMIA 2001, 2001

2000
Determining the identifiability of DNA database entries.
Proceedings of the AMIA 2000, 2000


  Loading...