Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization

Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization,
You Chen, Wei Xie, Carl A Gunter, David Liebovitz, Sanjay Mehrotra, He Zhang, and Bradley Malin.
AMIA Symposium, San Francisco, CA, November 2015.

Last updated on Tuesday, December 15, 2015, 5:49 pm

Inference Attacks on Property-Preserving Encrypted Databases

Inference Attacks on Property-Preserving Encrypted Databases,
Muhammad Naveed, Seny Kamara, and Charles V. Wright.
ACM Computer and Communications Security (CCS ’15), October, 2015.

Last updated on Tuesday, December 15, 2015, 5:46 pm

Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward

Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward,
Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, and Yan Huang.
ACM Computer and Communications Security (CCS ’15), October, 2015.

Last updated on Tuesday, December 15, 2015, 5:44 pm

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware,
Michael LeMay and Carl A. Gunter.
Logic, Rewriting, and Concurrency, Essays Dedicated to José Meseguer on the Occasion of his 65th Birthday, Urbana, IL, September 2015.

Last updated on Friday, September 18, 2015, 1:22 pm

Discovering De Facto Diagnosis Specialities

Discovering De Facto Diagnosis Specialities,
Xun Lu, Aston Zhang, Carl A. Gunter, Daniel Fabbri, David Liebovitz, and Bradley Malin.
ACM Conference on Bioinformatics, Computational Biology, and Health Informatics (BCB), Atlanta, GA, September 2015. [PPT]

Last updated on Friday, September 18, 2015, 1:26 pm

Security for Mobile and Cloud Frontiers in Healthcare

Security for Mobile and Cloud Frontiers in Healthcare,
David Kotz, Kevin Fu, Carl Gunter, and Avi Rubin.
Communications of the ACM, 58(8), August 2015.

Last updated on Monday, August 3, 2015, 7:18 pm

Privacy in the Genomic Era

Privacy in the Genomic Era,
Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, and XiaoFeng Wang.
ACM Computing Surveys 48, 1, Article 6, August, 2015.
Associated online tutorial on genomics for computer scientists.

Last updated on Tuesday, September 8, 2015, 7:14 pm

adaQAC: Adaptive Query Auto-Completion via Implicit Negative Feedback

adaQAC: Adaptive Query Auto-Completion via Implicit Negative Feedback,
Aston Zhang, Amit Goyal, Weize Kong, Hongbo Deng, Anlei Dong, Yi Chang, Carl A. Gunter, and Jiawei Han.
ACM Special Interest Group on Information Retrieval Conference (SIGIR ’15), August 9-13, 2015, Santiago, Chile.

Last updated on Wednesday, June 10, 2015, 12:01 pm

Building Bridges Across Electronic Health Record Systems through Inferred Phenotypic Topics

Building Bridges Across Electronic Health Record Systems through Inferred Phenotypic Topics,
You Chen, Joydeep Ghosh, Cosmin Adrian Bejan, Carl A. Gunter, Siddharth Gupta, Abel Kho, David Liebovitz, Jimeng Sun, Joshua Denny, and Bradley Malin.
Journal of Biomedical Informatics, Volume 55 (2015), pages 82-93. Appendix.

Last updated on Sunday, May 31, 2015, 3:01 pm

What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources

What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources,
Soteris Demetriou , Xiaoyong Zhouz, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, and Carl A Gunter.
ISOC Network and Distributed System Security (NDSS ’15), San Diego, February 2015.

Last updated on Friday, June 10, 2016, 5:33 pm