Weiyi Xia

Orcid: 0000-0003-0406-4944

According to our database1, Weiyi Xia authored at least 14 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Managing re-identification risks while providing access to the <i>All of Us</i> research program.
J. Am. Medical Informatics Assoc., April, 2023

Monitoring IGBT Module Bond Wire Fatigue Use Turn-Off Time.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

2022
Dynamically adjusting case reporting policy to maximize privacy and public health utility in the face of a pandemic.
J. Am. Medical Informatics Assoc., 2022

How Adversarial Assumptions Influence Re-identification Risk Measures: A COVID-19 Case Study.
Proceedings of the Privacy in Statistical Databases - International Conference, 2022

A Scalable Tool for Realistic Health Data Re-identification Risk Assessment.
Proceedings of the AMIA 2022, 2022

2021
Dynamically Adjusting Case-Reporting Policy to Maximize Privacy and Utility in the Face of a Pandemic.
CoRR, 2021

2019
Biomedical Research Cohort Membership Disclosure on Social Media.
Proceedings of the AMIA 2019, 2019

2018
It's all in the timing: calibrating temporal penalties for biomedical data sharing.
J. Am. Medical Informatics Assoc., 2018

Detecting the Presence of an Individual in Phenotypic Summary Data.
Proceedings of the AMIA 2018, 2018

2017
mTCTScan: a comprehensive platform for annotation and prioritization of mutations affecting drug sensitivity in cancers.
Nucleic Acids Res., 2017

An Open Source Tool for Game Theoretic Health Data De-Identification.
Proceedings of the AMIA 2017, 2017

2015
R-U policy frontiers for health data de-identification.
J. Am. Medical Informatics Assoc., 2015

Process-Driven Data Privacy.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2013
Efficient discovery of de-identification policy options through a risk-utility frontier.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013


  Loading...