Bradley Malin

According to our database1, Bradley Malin authored at least 136 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective.
PoPETs, 2019

Determining the Impact of Missing Values on Blocking in Record Linkage.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

2018
GenoPri'16: International Workshop on Genome Privacy and Security.
IEEE/ACM Trans. Comput. Biology Bioinform., 2018

Development of an automated phenotyping algorithm for hepatorenal syndrome.
Journal of Biomedical Informatics, 2018

Learning bundled care opportunities from electronic medical records.
Journal of Biomedical Informatics, 2018

The therapy is making me sick: how online portal communications between breast cancer patients and physicians indicate medication discontinuation.
JAMIA, 2018

It's all in the timing: calibrating temporal penalties for biomedical data sharing.
JAMIA, 2018

Interaction patterns of trauma providers are associated with length of stay.
JAMIA, 2018

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Mining the Best Observational Window to Model Social Phenomena.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Learning When Communications Between Healthcare Providers Indicate Hormonal Therapy Medication Discontinuation.
Proceedings of the AMIA 2018, 2018

Detecting the Presence of an Individual in Phenotypic Summary Data.
Proceedings of the AMIA 2018, 2018

Phenotyping through Semi-Supervised Tensor Factorization (PSST).
Proceedings of the AMIA 2018, 2018

Crowdsourcing Clinical Chart Reviews.
Proceedings of the AMIA 2018, 2018

2017
Scalable Iterative Classification for Sanitizing Large-Scale Datasets.
IEEE Trans. Knowl. Data Eng., 2017

Towards a privacy preserving cohort discovery framework for clinical research networks.
Journal of Biomedical Informatics, 2017

Identifying collaborative care teams through electronic medical record utilization patterns.
JAMIA, 2017

Genomic Data Privacy and Security: Where We Stand and Where We Are Heading.
IEEE Security & Privacy, 2017

Generating Multi-label Discrete Patient Records using Generative Adversarial Networks.
Proceedings of the Machine Learning for Health Care Conference, 2017

Predicting Length of Stay for Obstetric Patients via Electronic Medical Records.
Proceedings of the MEDINFO 2017: Precision Healthcare through Informatics, 2017

The Power of the Patient Voice: Learning Indicators of Treatment Adherence From An Online Breast Cancer Forum.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Granite: Diversified, Sparse Tensor Factorization for Electronic Health Record-Based Phenotyping.
Proceedings of the 2017 IEEE International Conference on Healthcare Informatics, 2017

Building a Dossier on the Cheap: Integrating Distributed Personal Data Resources Under Cost Constraints.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Reciprocity and its Association with Treatment Adherence in an Online Breast Cancer Forum.
Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems, 2017

Talking About My Care: Detecting Mentions of Hormonal Therapy Adherence Behavior in an Online Breast Cancer Community.
Proceedings of the AMIA 2017, 2017

Computational Phenotyping on Diverse Data Sources.
Proceedings of the AMIA 2017, 2017

An Open Source Tool for Game Theoretic Health Data De-Identification.
Proceedings of the AMIA 2017, 2017

Evaluating the Effectiveness of Auditing Rules for Electronic Health Record Systems.
Proceedings of the AMIA 2017, 2017

A Game-Theoretic Approach for Alert Prioritization.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Optimizing annotation resources for natural language de-identification via a game theoretic framework.
Journal of Biomedical Informatics, 2016

Preserving temporal relations in clinical data while maintaining privacy.
JAMIA, 2016

A multi-institution evaluation of clinical profile anonymization.
JAMIA, 2016

#PrayForDad: Learning the Semantics Behind Why Social Media Users Disclose Health Information.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Optimizing secure classification performance with privacy-aware feature selection.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Learning Clinical Workflows to Identify Subgroups of Heart Failure Patients.
Proceedings of the AMIA 2016, 2016

Predicting Negative Events: Using Post-discharge Data to Detect High-Risk Patients.
Proceedings of the AMIA 2016, 2016

Big Data for Healthcare and Life Sciences: Learning Useful Insights from Imperfect Data.
Proceedings of the AMIA 2016, 2016

2015
Building bridges across electronic health record systems through inferred phenotypic topics.
Journal of Biomedical Informatics, 2015

R-U policy frontiers for health data de-identification.
JAMIA, 2015

Design and implementation of a privacy preserving electronic health record linkage tool in Chicago.
JAMIA, 2015

Privacy in the Genomic Era.
IACR Cryptology ePrint Archive, 2015

Genomic Privacy (Dagstuhl Seminar 15431).
Dagstuhl Reports, 2015

Privacy in the Genomic Era.
ACM Comput. Surv., 2015

Rubik: Knowledge Guided Tensor Factorization and Completion for Health Data Analytics.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

Iterative Classification for Sanitizing Large-Scale Datasets.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Privacy-aware dynamic feature selection.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Process-Driven Data Privacy.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Discovering de facto diagnosis specialties.
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

Patient privacy and "de-identified" health records in the genomic era.
Proceedings of the AMIA 2015, 2015

Mining Twitter as a First Step toward Assessing the Adequacy of Gender Identification Terms on Intake Forms.
Proceedings of the AMIA 2015, 2015

Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization.
Proceedings of the AMIA 2015, 2015

Methods to Mitigate Risk of Composition Attack in Independent Data Publications.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
Composite Bloom Filters for Secure Record Linkage.
IEEE Trans. Knowl. Data Eng., 2014

A community assessment of privacy preserving techniques for human genomes.
BMC Med. Inf. & Decision Making, 2014

A probabilistic approach to mitigate composition attacks on privacy in non-coordinated environments.
Knowl.-Based Syst., 2014

PARAMO: A PARAllel predictive MOdeling platform for healthcare analytic research using electronic health records.
Journal of Biomedical Informatics, 2014

Limestone: High-throughput candidate phenotype generation via tensor factorization.
Journal of Biomedical Informatics, 2014

Size matters: How population size influences genotype-phenotype association studies in anonymized data.
Journal of Biomedical Informatics, 2014

Predicting changes in hypertension control using electronic health records from a chronic disease management program.
JAMIA, 2014

De-identification of clinical narratives through writing complexity measures.
I. J. Medical Informatics, 2014

We work with them? Healthcare workers interpretation of organizational relations mined from electronic health records.
I. J. Medical Informatics, 2014

SecureMA: protecting participant privacy in genetic association meta-analysis.
Bioinformatics, 2014

Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage.
Proceedings of the AMIA 2014, 2014

2013
Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits.
ACM Trans. Management Inf. Syst., 2013

Biomedical data privacy: problems, perspectives, and recent advances.
JAMIA, 2013

A practical approach to achieve private medical record linkage in light of public resources.
JAMIA, 2013

Hiding in plain sight: use of realistic surrogates to reduce exposure of protected health information in clinical text.
JAMIA, 2013

Reducing patient re-identification risk for laboratory results within research datasets.
JAMIA, 2013

Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

Evolving role definitions through permission invocation patterns.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Automatic Clinical Text De-Identification: Is It Worth It, and Could It Work for Me?
Proceedings of the MEDINFO 2013, 2013

Modeling and detecting anomalous topic access.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Scalable load balancing for mapreduce-based record linkage.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Efficient privacy-aware record integration.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Efficient discovery of de-identification policy options through a risk-utility frontier.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Scalable and robust key group size estimation for reducer load balancing in MapReduce.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

Location Bias of Identifiers in Clinical Narratives.
Proceedings of the AMIA 2013, 2013

2012
Anonymization of Longitudinal Electronic Medical Records.
IEEE Trans. Information Technology in Biomedicine, 2012

Secure Management of Biomedical Data With Cryptographic Hardware.
IEEE Trans. Information Technology in Biomedicine, 2012

Detecting Anomalous Insiders in Collaborative Information Systems.
IEEE Trans. Dependable Sec. Comput., 2012

Specializing network analysis to detect anomalous insider actions.
Security Informatics, 2012

Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage.
Information Fusion, 2012

Detecting Anomalous User Behaviors in Workflow-Driven Web Applications.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Rethinking the "Honest Broker" in the Changing Face of Security and Privacy.
Proceedings of the AMIA 2012, 2012

The Chicago Health Atlas: A Public Resource to Visualize Health Conditions and Resources in Chicago.
Proceedings of the AMIA 2012, 2012

Auditing Medical Records Accesses via Healthcare Interaction Networks.
Proceedings of the AMIA 2012, 2012

2011
COAT: COnstraint-based anonymization of transactions.
Knowl. Inf. Syst., 2011

Learning relational policies from electronic health record access logs.
Journal of Biomedical Informatics, 2011

Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule.
JAMIA, 2011

A secure protocol for protecting the identity of providers when disclosing data for disease surveillance.
JAMIA, 2011

Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems.
IEEE Security & Privacy, 2011

An entropy approach to disclosure risk assessment: Lessons from real applications and simulated domains.
Decision Support Systems, 2011

Towards understanding the usage pattern of web-based electronic medical record systems.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Context-Aware Anomaly Detection for Electronic Medical Record Systems.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record Linkage.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Leveraging social networks to detect anomalous insider actions in collaborative environments.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Detection of anomalous insiders in collaborative environments via relational analysis of access logs.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Effects of personal identifier resynthesis on clinical text de-identification.
JAMIA, 2010

The disclosure of diagnosis codes can breach research participants' privacy.
JAMIA, 2010

Evaluating re-identification risks with respect to the HIPAA privacy rule.
JAMIA, 2010

The MITRE Identification Scrubber Toolkit: Design, training, and assessment.
I. J. Medical Informatics, 2010

Secure construction of k-unlinkable patient records from distributed providers.
Artificial Intelligence in Medicine, 2010

EBAM: Experience-Based Access Management for Healthcare.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Beyond safe harbor: automatic discovery of health information de-identification policy alternatives.
Proceedings of the ACM International Health Informatics Symposium, 2010

2009
Formal anonymity models for efficient privacy-preserving joins.
Data Knowl. Eng., 2009

2008
Privacy Protection: Regulations and Technologies, Opportunities and Threats.
Proceedings of the Mobility, Data Mining and Privacy - Geographic Knowledge Discovery, 2008

A Cryptographic Approach to Securely Share and Query Genomic Sequences.
IEEE Trans. Information Technology in Biomedicine, 2008

PinKDD'08: privacy, security, and trust in KDD post workshop report.
SIGKDD Explorations, 2008

k-Unlinkability: A privacy protection model for distributed data.
Data Knowl. Eng., 2008

Recent advances in preserving privacy when mining data.
Data Knowl. Eng., 2008

A Privacy-Preserving Framework for Integrating Person-Specific Databases.
Proceedings of the Privacy in Statistical Databases, 2008

2007
PinKDD'07: privacy, security, and trust in KDD post-workshop report.
SIGKDD Explorations, 2007

Towards the security and privacy analysis of patient portals.
SIGBED Review, 2007

Research Paper: A Longitudinal Social Network Analysis of the Editorial Boards of Medical Informatics and Bioinformatics Journals.
JAMIA, 2007

A computational model to protect patient data from location-based re-identification.
Artificial Intelligence in Medicine, 2007

First International Workshop on the Model-Based Design of Trustworthy Health Information Systems.
Proceedings of the Models in Software Engineering, Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30, 2007

Confidentiality Preserving Audits of Electronic Medical Record Access.
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007

A Modeling Environment for Patient Portals.
Proceedings of the AMIA 2007, 2007

2006
The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Composition and Disclosure of Unlinkable Distributed Databases.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Re-identification of Familial Database Records.
Proceedings of the AMIA 2006, 2006

2005
Preserving Privacy by De-Identifying Face Images.
IEEE Trans. Knowl. Data Eng., 2005

Technical Evaluation: An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future.
JAMIA, 2005

A Network Analysis Model for Disambiguation of Names in Lists.
Computational & Mathematical Organization Theory, 2005

Integrating Utility into Face De-identification.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Email alias detection using social network analysis.
Proceedings of the 3rd international workshop on Link discovery, 2005

Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants.
Proceedings of the 21st International Conference on Data Engineering, 2005

A Secure Protocol to Distribute Unlinkable Health Data.
Proceedings of the AMIA 2005, 2005

Technologies to Defeat Fraudulent Schemes Related to Email Requests.
Proceedings of the AI Technologies for Homeland Security, 2005

2004
How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.
Journal of Biomedical Informatics, 2004

2002
Inferring Genotype from Clinical Phenotype through a Knowledge Based Algorithm.
Proceedings of the 7th Pacific Symposium on Biocomputing, 2002

Correlating web usage of health information with patient medical data.
Proceedings of the AMIA 2002, 2002

2001
Re-identification of DNA through an automated linkage process.
Proceedings of the AMIA 2001, 2001

2000
Determining the identifiability of DNA database entries.
Proceedings of the AMIA 2000, 2000


  Loading...