Steve Nyemba

According to our database1, Steve Nyemba authored at least 16 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Managing re-identification risks while providing access to the <i>All of Us</i> research program.
J. Am. Medical Informatics Assoc., April, 2023

2022
Forecasting the future clinical events of a patient through contrastive learning.
J. Am. Medical Informatics Assoc., 2022

Distillation to Enhance the Portability of Risk Models Across Institutions with Large Patient Claims Database.
CoRR, 2022

2021
Blending Knowledge in Deep Recurrent Networks for Adverse Event Prediction at Hospital Discharge.
CoRR, 2021

CCF-CL: Forecasting the Clinical Status of a Patient Through Contrastive Learning.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021

Synthetic Data to Support Engineering and Demonstrations in the All of Us Research Program.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021

2020
Resilience of clinical text de-identified with "hiding in plain sight" to hostile reidentification attacks by human readers.
J. Am. Medical Informatics Assoc., 2020

Generating Electronic Health Records with Multiple Data Types and Constraints.
Proceedings of the AMIA 2020, 2020

2019
The machine giveth and the machine taketh away: a parrot attack on clinical text deidentified with hiding in plain sight.
J. Am. Medical Informatics Assoc., 2019

2014
We work with them? Healthcare workers interpretation of organizational relations mined from electronic health records.
Int. J. Medical Informatics, 2014

2013
Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

2012
Detecting Anomalous Insiders in Collaborative Information Systems.
IEEE Trans. Dependable Secur. Comput., 2012

Specializing network analysis to detect anomalous insider actions.
Secur. Informatics, 2012

Auditing Medical Records Accesses via Healthcare Interaction Networks.
Proceedings of the AMIA 2012, 2012

2011
Learning relational policies from electronic health record access logs.
J. Biomed. Informatics, 2011

Leveraging social networks to detect anomalous insider actions in collaborative environments.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011


  Loading...