Ning Shang

Orcid: 0000-0001-7040-5204

According to our database1, Ning Shang authored at least 49 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
LongRoPE: Extending LLM Context Window Beyond 2 Million Tokens.
CoRR, 2024

2023
Characterizing variability of electronic health record-driven phenotype definitions.
J. Am. Medical Informatics Assoc., February, 2023

Deep learning system improved detection efficacy of fetal intracranial malformations in a randomized controlled trial.
npj Digit. Medicine, 2023

WaveCoder: Widespread And Versatile Enhanced Instruction Tuning with Refined Data Generation.
CoRR, 2023

2022
Joint Landmark and Structure Learning for Automatic Evaluation of Developmental Dysplasia of the Hip.
IEEE J. Biomed. Health Informatics, 2022

Under-specification as the source of ambiguity and vagueness in narrative phenotype algorithm definitions.
BMC Medical Informatics Decis. Mak., 2022

2021
Quantitative disease risk scores from EHR with applications to clinical risk stratification and genetic studies.
npj Digit. Medicine, 2021

Medical records-based chronic kidney disease phenotype for clinical care and "big data" observational and genetic studies.
npj Digit. Medicine, 2021

Similarity-based health risk prediction using Domain Fusion and electronic health records data.
J. Biomed. Informatics, 2021

Evaluation of Criteria2Query: Towards Augmented Intelligence for Cohort Identification.
Proceedings of the MEDINFO 2021: One World, One Health - Global Partnership for Digital Innovation, 2021

2020
Adapting electronic health records-derived phenotypes to claims data: Lessons learned in using limited clinical data for phenotyping.
J. Biomed. Informatics, 2020

A graph-based method for reconstructing entities from coordination ellipsis in medical text.
J. Am. Medical Informatics Assoc., 2020

A machine learning based golden-free detection method for command-activated hardware Trojan.
Inf. Sci., 2020

Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis.
Proceedings of the Security and Privacy in Digital Economy, 2020

2019
Making work visible for electronic phenotype implementation: Lessons learned from the eMERGE network.
J. Biomed. Informatics, 2019

Ensembles of natural language processing systems for portable phenotyping solutions.
J. Biomed. Informatics, 2019

Facilitating phenotype transfer using a common data model.
J. Biomed. Informatics, 2019

Criteria2Query: a natural language interface to clinical databases for cohort definition.
J. Am. Medical Informatics Assoc., 2019

Power Analysis and Protection on SPECK and Its Application in IoT.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9.
Secur. Commun. Networks, 2018

A conceptual framework for evaluating data suitability for observational studies.
J. Am. Medical Informatics Assoc., 2018

The representativeness of eligible patients in type 2 diabetes trials: a case study using GIST 2.0.
J. Am. Medical Informatics Assoc., 2018

A case study evaluating the portability of an executable computable phenotype algorithm across multiple institutions and electronic health record environments.
J. Am. Medical Informatics Assoc., 2018

Effect of vocabulary mapping for conditions on phenotype cohorts.
J. Am. Medical Informatics Assoc., 2018

Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Low Screening Rates for Diabetes Mellitus Among Family Members of Affected Relatives.
Proceedings of the AMIA 2018, 2018

Sequencing EHR for Disease Subtyping.
Proceedings of the AMIA 2018, 2018

2016
The Applicability of an EHR Phenotype for Cohort Identification.
Proceedings of the Summit on Clinical Research Informatics, 2016

A Method for Enhancing the Portability of Electronic Phenotyping Algorithms: An eMERGE Pilot Study.
Proceedings of the AMIA 2016, 2016

Classification-by-Analogy: Using Vector Representations of Implicit Relationships to Identify Plausibly Causal Drug/Side-effect Relationships.
Proceedings of the AMIA 2016, 2016

2015
A Framework for Assessing Clinical Data Suitability for Observational Study.
Proceedings of the AMIA 2015, 2015

2014
Identifying plausible adverse drug reactions using knowledge extracted from the literature.
J. Biomed. Informatics, 2014

2013
Privacy Preserving Policy-Based Content Sharing in Public Clouds.
IEEE Trans. Knowl. Data Eng., 2013

A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model.
IEEE Trans. Inf. Forensics Secur., 2013

Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields.
Des. Codes Cryptogr., 2013

2012
Efficient privacy preserving content based publish subscribe systems.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Information Foraging Behavior in a Trauma Emergency Department.
Proceedings of the AMIA 2012, 2012

2010
Mask: a system for privacy-preserving policy-based access to published content.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

Efficient and privacy-preserving enforcement of attribute-based access control.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

A privacy-preserving approach to policy-based content dissemination.
Proceedings of the 26th International Conference on Data Engineering, 2010

Privacy-preserving matching of spatial datasets with protection against background knowledge.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

Controlling data disclosure in computational PIR protocols.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Privacy-preserving Digital Identity Management for Cloud Computing.
IEEE Data Eng. Bull., 2009

VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices.
Proceedings of the MDM 2009, 2009

Privacy-preserving management of transactions' receipts for mobile environments.
Proceedings of the IDtrust 2009, 2009

2008
An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting.
IEEE Trans. Dependable Secur. Comput., 2008

2007
Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation.
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007

2005
A Top-Down Algorithm for Mining Web Access Patterns from Web Logs.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005

2004
iOmS: An Agent-Based P2P Framework for Ubiquitous Workflow.
Proceedings of the Grid and Cooperative Computing, 2004


  Loading...