The “All of Us” research program All of Us Research Program Investigators New England Journal of Medicine 381 (7), 668-676, 2019 | 1037 | 2019 |
Generating multi-label discrete patient records using generative adversarial networks E Choi, S Biswal, B Malin, J Duke, WF Stewart, J Sun Machine learning for healthcare conference, 286-305, 2017 | 747 | 2017 |
Preserving privacy by de-identifying face images EM Newton, L Sweeney, B Malin Knowledge and Data Engineering, IEEE Transactions on 17 (2), 232-243, 2005 | 732 | 2005 |
A systematic review of re-identification attacks on health data K El Emam, E Jonker, L Arbuckle, B Malin PloS one 6 (12), e28071, 2011 | 481 | 2011 |
Evaluating re-identification risks with respect to the HIPAA privacy rule K Benitez, B Malin Journal of the American Medical Informatics Association 17 (2), 169-177, 2010 | 358 | 2010 |
Privacy in the genomic era M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ... ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015 | 345 | 2015 |
How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems B Malin, L Sweeney Journal of Biomedical Informatics 37 (3), 179-192, 2004 | 340 | 2004 |
Anonymising and sharing individual patient data K El Emam, S Rodgers, B Malin bmj 350, 2015 | 241 | 2015 |
Rubik: Knowledge guided tensor factorization and completion for health data analytics Y Wang, R Chen, J Ghosh, JC Denny, A Kho, Y Chen, BA Malin, J Sun Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015 | 209 | 2015 |
Integrating utility into face de-identification R Gross, E Airoldi, B Malin, L Sweeney Privacy Enhancing Technologies: 5th International Workshop, PET 2005, Cavtat …, 2006 | 206 | 2006 |
A cryptographic approach to securely share and query genomic sequences M Kantarcioglu, W Jiang, Y Liu, B Malin IEEE Transactions on information technology in biomedicine 12 (5), 606-617, 2008 | 199 | 2008 |
Limestone: High-throughput candidate phenotype generation via tensor factorization JC Ho, J Ghosh, SR Steinhubl, WF Stewart, JC Denny, BA Malin, J Sun Journal of biomedical informatics 52, 199-211, 2014 | 191 | 2014 |
Unsupervised name disambiguation via social network similarity B Malin Workshop on Link Analysis, Counterterrorism, and Security 1401, 93-102, 2005 | 184 | 2005 |
An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future BA Malin Journal of the American Medical Informatics Association 12 (1), 28-34, 2005 | 178 | 2005 |
The MITRE Identification Scrubber Toolkit: design, training, and assessment J Aberdeen, S Bayer, R Yeniterzi, B Wellner, C Clark, D Hanauer, B Malin, ... International Journal of Medical Informatics 79 (12), 849-859, 2010 | 177 | 2010 |
Biomedical data privacy: problems, perspectives, and recent advances BA Malin, KE Emam, CM O'Keefe Journal of the American medical informatics association 20 (1), 2-6, 2013 | 161 | 2013 |
The disclosure of diagnosis codes can breach research participants' privacy G Loukides, JC Denny, B Malin Journal of the American Medical Informatics Association 17 (3), 322-327, 2010 | 159 | 2010 |
Anonymization of electronic medical records for validating genome-wide association studies G Loukides, A Gkoulalas-Divanis, B Malin Proceedings of the National Academy of Sciences 107 (17), 7898-7903, 2010 | 159 | 2010 |
A constraint satisfaction cryptanalysis of Bloom filters in private record linkage M Kuzu, M Kantarcioglu, E Durham, B Malin Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011 | 143 | 2011 |
Design and implementation of a privacy preserving electronic health record linkage tool in Chicago AN Kho, JP Cashy, KL Jackson, AR Pah, S Goel, J Boehnke, ... Journal of the American Medical Informatics Association 22 (5), 1072-1080, 2015 | 139 | 2015 |