-
1
-
-
85029496317
-
-
Healthcare needs moonshots. This is what a digital one looks like,, [Online]. Available:.
-
Healthcare needs moonshots. This is what a digital one looks like, 2016. [Online]. Available: http://newsroom.gehealthcare.com/healthcare-needs-moonshots-this-is-what-a-digital-one-looks-like/.
-
(2016)
-
-
-
2
-
-
84872006849
-
Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings
-
M. Li, S. Yu, K. Ren, W. Lou, Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings, in: International Conference on Security and Privacy in Communication Systems, 2010, pp. 89–106.
-
(2010)
International Conference on Security and Privacy in Communication Systems
, pp. 89-106
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
3
-
-
84963815241
-
Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification
-
Liu, X., Lu, R., Ma, J., Chen, L., Qin, B., Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification. IEEE J. Biomed. Health Inform. 20:2 (2016), 655–668.
-
(2016)
IEEE J. Biomed. Health Inform.
, vol.20
, Issue.2
, pp. 655-668
-
-
Liu, X.1
Lu, R.2
Ma, J.3
Chen, L.4
Qin, B.5
-
4
-
-
84905174579
-
Private predictive analysis on encrypted medical data
-
Bos, J.W., Lauter, K., Naehrig, M., Private predictive analysis on encrypted medical data. J. Biomed. Inform. 50 (2014), 234–243.
-
(2014)
J. Biomed. Inform.
, vol.50
, pp. 234-243
-
-
Bos, J.W.1
Lauter, K.2
Naehrig, M.3
-
5
-
-
84892565489
-
Privacy-preserving clinical decision support system using gaussian kernel-based classification
-
Rahulamathavan, Y., Veluru, S., Phan, R.C.W., Chambers, J., Raiarajan, M., Privacy-preserving clinical decision support system using gaussian kernel-based classification. IEEE J. Biomed. Health Inform. 18:1 (2014), 56–66.
-
(2014)
IEEE J. Biomed. Health Inform.
, vol.18
, Issue.1
, pp. 56-66
-
-
Rahulamathavan, Y.1
Veluru, S.2
Phan, R.C.W.3
Chambers, J.4
Raiarajan, M.5
-
6
-
-
84959864390
-
HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS
-
Wang, S., Zhang, Y., Dai, W., Lauter, K., Kim, M., Tang, Y., Xiong, H., Jiang, X., HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinformatics 32:2 (2016), 211–218.
-
(2016)
Bioinformatics
, vol.32
, Issue.2
, pp. 211-218
-
-
Wang, S.1
Zhang, Y.2
Dai, W.3
Lauter, K.4
Kim, M.5
Tang, Y.6
Xiong, H.7
Jiang, X.8
-
7
-
-
34047114775
-
Multiclass support vector machines for EEG-signals classification
-
Fuler, I., Uberli, E.D., Multiclass support vector machines for EEG-signals classification. IEEE Trans. Inform. Technol. Biomed. 11:2 (2007), 117–126.
-
(2007)
IEEE Trans. Inform. Technol. Biomed.
, vol.11
, Issue.2
, pp. 117-126
-
-
Fuler, I.1
Uberli, E.D.2
-
8
-
-
21444454271
-
A support vectors classifier approach to predicting the risk of progression of adolescent idiopathic scoliosis
-
Ajemba, P., Ramirez, L., Durdle, N., Hill, D., Raso, V., A support vectors classifier approach to predicting the risk of progression of adolescent idiopathic scoliosis. IEEE Trans. Inform. Technol. Biomed. 9:2 (2005), 276–282.
-
(2005)
IEEE Trans. Inform. Technol. Biomed.
, vol.9
, Issue.2
, pp. 276-282
-
-
Ajemba, P.1
Ramirez, L.2
Durdle, N.3
Hill, D.4
Raso, V.5
-
9
-
-
34248210562
-
PancPRO: risk assessment for individuals with a family history of pancreatic cancer
-
Wang, W., Chen, S., Brune, K.A., Hruban, R.H., Parmigiani, G., Klein, A.P., PancPRO: risk assessment for individuals with a family history of pancreatic cancer. J. Clin. Oncol. 25:11 (2007), 1417–1422.
-
(2007)
J. Clin. Oncol.
, vol.25
, Issue.11
, pp. 1417-1422
-
-
Wang, W.1
Chen, S.2
Brune, K.A.3
Hruban, R.H.4
Parmigiani, G.5
Klein, A.P.6
-
10
-
-
77954597013
-
Intelligible support vector machines for diagnosis of diabetes mellitus
-
Barakat, M.N.H., Bradley, A.P., Intelligible support vector machines for diagnosis of diabetes mellitus. IEEE Trans. Inform. Technol. Biomed. 14:4 (2010), 1114–1120.
-
(2010)
IEEE Trans. Inform. Technol. Biomed.
, vol.14
, Issue.4
, pp. 1114-1120
-
-
Barakat, M.N.H.1
Bradley, A.P.2
-
11
-
-
34248585875
-
Prediction model building and feature selection with support vector machines in breast cancer diagnosis
-
Huang, C.L., Chen, H.C., Chen, M.C., Prediction model building and feature selection with support vector machines in breast cancer diagnosis. Expert Syst. Appl. 34:1 (2008), 578–587.
-
(2008)
Expert Syst. Appl.
, vol.34
, Issue.1
, pp. 578-587
-
-
Huang, C.L.1
Chen, H.C.2
Chen, M.C.3
-
12
-
-
84873183004
-
Clinical decision support system: Risk level prediction of heart disease using weighted fuzzy rules
-
Anooj, P.K., Clinical decision support system: Risk level prediction of heart disease using weighted fuzzy rules. J. King Saud Univ.-Comput. Inf. Sci. 24:1 (2012), 27–40.
-
(2012)
J. King Saud Univ.-Comput. Inf. Sci.
, vol.24
, Issue.1
, pp. 27-40
-
-
Anooj, P.K.1
-
13
-
-
84873734039
-
Prediction models for clustered data: comparison of a random intercept and standard regression model
-
Bouwmeester, W., Twisk, J.W.R., Kappen, T.H., et al. Prediction models for clustered data: comparison of a random intercept and standard regression model. BMC Med. Res. Methodol., 13(1), 2013, 19.
-
(2013)
BMC Med. Res. Methodol.
, vol.13
, Issue.1
, pp. 19
-
-
Bouwmeester, W.1
Twisk, J.W.R.2
Kappen, T.H.3
-
14
-
-
79953812679
-
A privacy-preserving framework for distributed clinical decision support
-
Computational Advances in Bio and Medical Sciences, ICCABS. 2011, pp. 129–134.
-
G. Mathew, Z. Obradovic, A privacy-preserving framework for distributed clinical decision support, in: Computational Advances in Bio and Medical Sciences, ICCABS. 2011, pp. 129–134.
-
-
-
Mathew, G.1
Obradovic, Z.2
-
15
-
-
84973647181
-
PSLP: Privacy-preserving single-layer perceptron learning for e-Healthcare
-
10th International Conference on Information, Communications and Signal Processing, ICICS. 2015, pp. 1–5.
-
G. Wang, R. Lu, C. Huang, PSLP: Privacy-preserving single-layer perceptron learning for e-Healthcare, in: 10th International Conference on Information, Communications and Signal Processing, ICICS. 2015, pp. 1–5.
-
-
-
Wang, G.1
Lu, R.2
Huang, C.3
-
16
-
-
85019049096
-
Efficient and privacy-preserving online medical pre-diagnosis framework using nonlinear SVM
-
Zhu, H., Liu, X., Lu, R., Li, H., Efficient and privacy-preserving online medical pre-diagnosis framework using nonlinear SVM. IEEE J. Biomed. Health Inform., 2016.
-
(2016)
IEEE J. Biomed. Health Inform.
-
-
Zhu, H.1
Liu, X.2
Lu, R.3
Li, H.4
-
17
-
-
84944685478
-
A lightweight encryption scheme combined with trust management for privacy-preserving in body sensor networks
-
Guo, P., Wang, J., Ji, S., Geng, X., Xiong, N., A lightweight encryption scheme combined with trust management for privacy-preserving in body sensor networks. J. Med. Syst. 39:12 (2015), 1–8.
-
(2015)
J. Med. Syst.
, vol.39
, Issue.12
, pp. 1-8
-
-
Guo, P.1
Wang, J.2
Ji, S.3
Geng, X.4
Xiong, N.5
-
18
-
-
84921672961
-
A fuzzy control theory and neural network based sensor network control system
-
International Conference on Intelligent Information Hiding and Multimedia Signal Processing 665, IH-MSP. 2014, pp. 831–834.
-
A. Wang, J. Liu, X. Wang, J. Wang, A fuzzy control theory and neural network based sensor network control system, in: International Conference on Intelligent Information Hiding and Multimedia Signal Processing 665, IH-MSP. 2014, pp. 831–834.
-
-
-
Wang, A.1
Liu, J.2
Wang, X.3
Wang, J.4
-
19
-
-
84921694981
-
An energy efficient data transmission mechanism for middleware of wireless sensor network
-
Z. Shi, J. Liu, Q. Song, J. Wang, An energy efficient data transmission mechanism for middleware of wireless sensor network, in: Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014, pp. 827–830.
-
(2014)
Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 827-830
-
-
Shi, Z.1
Liu, J.2
Song, Q.3
Wang, J.4
-
20
-
-
85011043313
-
Over-encryption: management of access control evolution on outsourced data
-
S. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, Over-encryption: management of access control evolution on outsourced data, in: Proceedings of the 33rd international conference on very large data bases, 2007, pp. 123–134.
-
(2007)
Proceedings of the 33rd international conference on very large data bases
, pp. 123-134
-
-
di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
21
-
-
84951735921
-
CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud
-
Q. Wang, S. Hu, K. Ren, CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud, in: European Symposium on Research in Computer Security, 2015, pp. 186–205.
-
(2015)
European Symposium on Research in Computer Security
, pp. 186-205
-
-
Wang, Q.1
Hu, S.2
Ren, K.3
-
22
-
-
85029505252
-
-
Introduction to Cryptography Principles and Applications
-
H. Delfs, H. Knebl, Introduction to Cryptography Principles and Applications, 2002.
-
(2002)
-
-
Delfs, H.1
Knebl, H.2
-
23
-
-
33750293582
-
-
An attacker's view of distance preserving maps for privacy preserving data mining, in: European Conference on Principles of Data Mining and Knowledge Discovery, 2006, pp. 297–308.
-
K. Liu, C. Giannella, H. Kargupta, An attacker's view of distance preserving maps for privacy preserving data mining, in: European Conference on Principles of Data Mining and Knowledge Discovery, 2006, pp. 297–308.
-
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
-
24
-
-
0033281425
-
Large margin classification using the perceptron algorithm
-
Freund, Y., Schapire, R.E., Large margin classification using the perceptron algorithm. Mach. Learn. 37:3 (1999), 277–296.
-
(1999)
Mach. Learn.
, vol.37
, Issue.3
, pp. 277-296
-
-
Freund, Y.1
Schapire, R.E.2
-
25
-
-
85029484365
-
-
UCI machine learning repository, 2013 [Online]. Available:
-
M. Lichman, UCI machine learning repository, 2013 [Online]. Available: http://archive.ics.uci.edu/ml.
-
-
-
Lichman, M.1
-
26
-
-
84893357415
-
Improved security for a ring based fully homomorphic encryption scheme
-
Springer Berlin, Heidelberg
-
Bos, J.W., Lauter, K., Loftus, J., Naehrig, M., Improved security for a ring based fully homomorphic encryption scheme. Cryptography and Coding, 2013, Springer, Berlin, Heidelberg, 45–64.
-
(2013)
Cryptography and Coding
, pp. 45-64
-
-
Bos, J.W.1
Lauter, K.2
Loftus, J.3
Naehrig, M.4
-
27
-
-
84963853667
-
Privacy preserving deep computation model on cloud for big data feature learning
-
Zhang, Q., Yang, L., Chen, Z., Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput. 65:5 (2016), 1351–1362.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.5
, pp. 1351-1362
-
-
Zhang, Q.1
Yang, L.2
Chen, Z.3
-
28
-
-
85029468979
-
Review on privacy preserving deep computation model on cloud for big data feature learning
-
ISSN (Online)
-
Kulkarni, V., Wagh, K., Review on privacy preserving deep computation model on cloud for big data feature learning. Int. J. Sci. Res. 12:5 (2016), 2319–7064 ISSN (Online).
-
(2016)
Int. J. Sci. Res.
, vol.12
, Issue.5
, pp. 2319-7064
-
-
Kulkarni, V.1
Wagh, K.2
-
29
-
-
70849131456
-
Secure kNN computation on encrypted databases
-
W.K. Wong, D.W. Cheung, B. Kao, N. Mamoulis, Secure kNN computation on encrypted databases, in: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, ACM, 2009, pp. 139–152.
-
(2009)
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, ACM
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
30
-
-
84904421834
-
-
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud, INFOCOM, 2014, pp. 2112–2120.
-
B. Wang, S. Yu, W. Lou, Y. Hou, Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud, INFOCOM, 2014, pp. 2112–2120.
-
-
-
Wang, B.1
Yu, S.2
Lou, W.3
Hou, Y.4
-
31
-
-
84926628839
-
k-Nearest neighbor classification over semantically secure encrypted relational data
-
Samanthula, B.K., Elmehdwi, Y., Jiang, W., k-Nearest neighbor classification over semantically secure encrypted relational data. IEEE Trans. Knowl. Data Eng. 27:5 (2015), 1261–1273.
-
(2015)
IEEE Trans. Knowl. Data Eng.
, vol.27
, Issue.5
, pp. 1261-1273
-
-
Samanthula, B.K.1
Elmehdwi, Y.2
Jiang, W.3
-
32
-
-
84883119889
-
-
Efficient privacy-preserving biometric identification in cloud computing, INFOCOM, 2013, pp. 2652–2660.
-
J. Yuan, S. Yu, Efficient privacy-preserving biometric identification in cloud computing, INFOCOM, 2013, pp. 2652–2660.
-
-
-
Yuan, J.1
Yu, S.2
-
33
-
-
84978803191
-
Security analysis on privacy-preserving cloud aided biometric identification schemes
-
S. Pan, S. Yan, W. Zhu, Security analysis on privacy-preserving cloud aided biometric identification schemes, in: Australasian Conference on Information Security and Privacy, 2016, pp. 446–453.
-
(2016)
Australasian Conference on Information Security and Privacy
, pp. 446-453
-
-
Pan, S.1
Yan, S.2
Zhu, W.3
-
34
-
-
85009774251
-
-
Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited, Quality of Service, IWQoS, 2016 IEEE/ACM 24th International Symposium on, 2016, pp. 1–6.
-
Y. Zhu, Z. Wang, J. Wang, Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited, Quality of Service, IWQoS, 2016 IEEE/ACM 24th International Symposium on, 2016, pp. 1–6.
-
-
-
Zhu, Y.1
Wang, Z.2
Wang, J.3
|