Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks. Journal of the American Medical Informatics Association. 2018 .
Annual Burden and Costs of Hospitalization for High-Need, High-Cost Patients with Chronic Gastrointestinal and Liver Diseases. Clinical Gastroenterology and Hepatology. 2018 ..
Population Health Management for Inflammatory Bowel Disease. Gastroenterology. 2018 ..
Addressing the Beacon Re-Identification Attacks: Quantification and Mitigation of Privacy. Journal of the American Medical Informatics Association. 2017 .
Blockchain distributed ledger technologies for biomedical and health care applications. Journal of the American Medical Informatics Association. 2017 ..
Mechanisms to Protect the Privacy of Families When Using the Transmission Disequilibrium Test in Genome-Wide Association Studies. Bioinformatics. 2017 ..
Biospecimen Sharing Among Hispanic Women in a Safety-Net Clinic: Implications for the Precision Medicine Initiative. Journal of the National Cancer Institute. 2016 ..
Extracellular vesicles released by hepatocytes from gastric infusion model of ALD contain a miRNA barcode that can be detected in blood. 2016 .
Genome privacy: challenges, technical approaches to mitigate risk, and ethical considerations in the United States. 2016 ..
PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryp-tion through Software guard extensionS. 2016 ;33(16).
Protecting genomic data analytics in the cloud: state of the art and opportunities. BMC Medical Genomics. 2016 ;9(63).
Creating a Common Data Model for Comparative Effectiveness with the Observational Medical Outcomes Partnership. Applied Clinical Informatics. 2015 ;6(3)..
"Big data" and the electronic health record. Yearb Med Inform. 2014 ;9(1):97-104..
An Adaptive Difference Distribution-based Cod-ing with Hierarchical Tree Structure for DNA Sequence Compression. IEEE Data Compression Conference. 2013 ..
Biomedical CyberInfrastructure Challenges. Extreme Science and Engineering Discovery Environment: Gateway to Discovery. 2013 ..
Privacy preserving data publishing through component analysis, Transaction on Data Privacy. Transaction on Data Privacy. 2013 ..
iDASH CyberInfrastructure: Mastering the Bits. In: NSF Towards a Shared Cyberinfrastructure Workshop 2012. NSF Towards a Shared Cyberinfrastructure Workshop 2012. ; 2012..
iDASH CyberInfrastructure: The Nuts and Bolts. In: NSF Towards a Shared Cyberinfrastructure Workshop 2012. NSF Towards a Shared Cyberinfrastructure Workshop 2012. ; 2012..