De facto diagnosis specialties: Recognition and discovery

De Facto Diagnosis Specialties: Recognition and Discovery,
Aston Zhang, Xun Lu, Carl A. Gunter, Shuochao Yao, Fangbo Tao, Rongda Zhu, Huan Gui, Daniel Fabbri, David Liebovitz, and Bradley Malin.
Learning Health Systems, 2018:e10057, 2018.

Last updated on Saturday, June 9, 2018, 3:05 pm

Analyzing & Designing the Security of Shared Resources on Smartphone Operating Systems

Analyzing & Designing the Security of Shared Resources on Smartphone Operating Systems.
Soteris Demetriou,
Doctoral Dissertation, University of Illinois at Urbana-Champaign, May 2018.

Last updated on Friday, February 21, 2020, 10:32 am

ANALYZING INTENTIONS FROM BIG DATA TRACES OF HUMAN ACTIVITIES

Analyzing Intentions from Big Data Traces of Human Activities,
Aston Zhang.
Doctoral Thesis, University of Illinois at Urbana-Champaign, May 2017.

Last updated on Sunday, August 6, 2017, 2:38 pm

Secure and Practical Computation on Encrypted Data

Secure and Practical Computation on Encrypted Data.
Muhammad Naveed,
Doctoral Thesis, University of Illinois at Urbana-Champaign, April 2016.

Last updated on Saturday, July 9, 2016, 10:13 pm

Free for All! Assessing User Data Exposure to Advertising Libraries on Android

Free for All! Assessing User Data Exposure to Advertising Libraries on Android,
Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang and Carl A. Gunter.
ISOC Network and Distributed System Security (NDSS ’16), San Diego, February 2016.

Last updated on Thursday, April 7, 2016, 8:29 pm

Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization

Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization,
You Chen, Wei Xie, Carl A Gunter, David Liebovitz, Sanjay Mehrotra, He Zhang, and Bradley Malin.
AMIA Symposium, San Francisco, CA, November 2015.

Last updated on Tuesday, December 15, 2015, 5:49 pm

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware,
Michael LeMay and Carl A. Gunter.
Logic, Rewriting, and Concurrency, Essays Dedicated to José Meseguer on the Occasion of his 65th Birthday, Urbana, IL, September 2015.

Last updated on Friday, September 18, 2015, 1:22 pm

Discovering De Facto Diagnosis Specialities

Discovering De Facto Diagnosis Specialities,
Xun Lu, Aston Zhang, Carl A. Gunter, Daniel Fabbri, David Liebovitz, and Bradley Malin.
ACM Conference on Bioinformatics, Computational Biology, and Health Informatics (BCB), Atlanta, GA, September 2015. [PPT]

Last updated on Friday, September 18, 2015, 1:26 pm

Building Bridges Across Electronic Health Record Systems through Inferred Phenotypic Topics

Building Bridges Across Electronic Health Record Systems through Inferred Phenotypic Topics,
You Chen, Joydeep Ghosh, Cosmin Adrian Bejan, Carl A. Gunter, Siddharth Gupta, Abel Kho, David Liebovitz, Jimeng Sun, Joshua Denny, and Bradley Malin.
Journal of Biomedical Informatics, Volume 55 (2015), pages 82-93. Appendix.

Last updated on Sunday, May 31, 2015, 3:01 pm

What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources

What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources,
Soteris Demetriou , Xiaoyong Zhouz, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, and Carl A Gunter.
ISOC Network and Distributed System Security (NDSS ’15), San Diego, February 2015.

Last updated on Friday, June 10, 2016, 5:33 pm