Остановите войну!
for scientists:
default search action
Khaled El Emam
- > Home > Persons > Khaled El Emam
Publications
- 2017
- [j62]Geoffrey M. Jacquez, Aleksander Essex, Andrew Curtis, Betsy Kohler, Recinda Sherman, Khaled El Emam, Chen Shi, Andy Kaufmann, Linda Beale, Thomas W. Cusick, Daniel W. Goldberg, Pierre Goovaerts:
Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention. J. Geogr. Syst. 19(3): 197-220 (2017) - 2016
- [j60]Martin Scaiano, Grant Middleton, Luk Arbuckle, Varada Kolhatkar, Liam Peyton, Moira Dowling, Debbie S. Gipson, Khaled El Emam:
A unified framework for evaluating the risk of re-identification of text de-identification tools. J. Biomed. Informatics 63: 174-183 (2016) - 2015
- [j59]Khaled El Emam, Hanna Farah, Saeed Samet, Aleksander Essex, Elizabeth Jonker, Murat Kantarcioglu, Craig Earle:
A privacy preserving protocol for tracking participants in phase I clinical trials. J. Biomed. Informatics 57: 145-162 (2015) - [c35]Hanna Farah, Daniel Amyot, Khaled El Emam:
Common Length Name Representation: An Efficient Privacy-Preserving Scheme. TELERISE@ICSE 2015: 44-49 - [c34]Hanna Farah, Daniel Amyot, Khaled El Emam:
Efficient Privacy-Preserving Identity Scheme for Electronic Validation of Phase 1 Clinical Trials. MCETECH 2015: 183-196 - 2014
- [c33]Hanna Farah, Daniel Amyot, Khaled El Emam:
Real-World Data Set Parameters and Synthesization for Matching Identity in Clinical Protocols. CBMS 2014: 263-266 - [c32]Hanna Farah, Daniel Amyot, Khaled El Emam:
A Tool for Simple and Efficient Clinical Protocol Evaluation. CBMS 2014: 499-500 - [c31]Fida Kamal Dankar, Khaled El Emam, Stan Matwin:
Efficient Private Information Retrieval for Geographical Aggregation. EUSPN/ICTH 2014: 497-502 - 2013
- [j58]Bradley A. Malin, Khaled El Emam, Christine M. O'Keefe:
Biomedical data privacy: problems, perspectives, and recent advances. J. Am. Medical Informatics Assoc. 20(1): 2-6 (2013) - [j56]Khaled El Emam, Saeed Samet, Luk Arbuckle, Robyn Tamblyn, Craig Earle, Murat Kantarcioglu:
A secure distributed logistic regression protocol for the detection of rare adverse drug events. J. Am. Medical Informatics Assoc. 20(3): 453-461 (2013) - [j55]Khaled El Emam, Fida Kamal Dankar, Angelica Neisa, Elizabeth Jonker:
Evaluating the risk of patient re-identification from adverse drug event reports. BMC Medical Informatics Decis. Mak. 13: 114 (2013) - [j54]Fida Kamal Dankar, Khaled El Emam:
Practicing Differential Privacy in Health Care: A Review. Trans. Data Priv. 6(1): 35-67 (2013) - [c30]Fida Kamal Dankar, Khaled El Emam:
A theoretical model for obfuscating web navigation trails. EDBT/ICDT Workshops 2013: 137-144 - [c29]Victoria Bobicev, Marina Sokolova, Khaled El Emam, Stan Matwin:
Authorship Attribution in Health Forums. RANLP 2013: 74-82 - 2012
- [j53]Fida Kamal Dankar, Khaled El Emam, Angelica Neisa, Tyson Roffey:
Estimating the re-identification risk of clinical data sets. BMC Medical Informatics Decis. Mak. 12: 66 (2012) - [c28]Fida Kamal Dankar, Khaled El Emam:
The application of differential privacy to health data. EDBT/ICDT Workshops 2012: 158-166 - 2011
- [j52]Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, Murat Kantarcioglu, Bradley A. Malin, David L. Buckeridge, Saeed Samet, Craig Earle:
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance. J. Am. Medical Informatics Assoc. 18(3): 212-217 (2011) - [j51]Khaled El Emam, David L. Buckeridge, Robyn Tamblyn, Angelica Neisa, Elizabeth Jonker, Aman Verma:
The re-identification risk of Canadians from longitudinal demographics. BMC Medical Informatics Decis. Mak. 11: 46 (2011) - [j50]Khaled El Emam, David Paton, Fida Kamal Dankar, Günes Koru:
De-identifying a public use microdata file from the Canadian national discharge abstract database. BMC Medical Informatics Decis. Mak. 11: 53 (2011) - 2010
- [j49]Günes Koru, Hongfang Liu, Dongsong Zhang, Khaled El Emam:
Testing the theory of relative defect proneness for closed-source software. Empir. Softw. Eng. 15(6): 577-598 (2010) - [j47]Khaled El Emam, Emilio Neri, Elizabeth Jonker, Marina Sokolova, Liam Peyton, Angelica Neisa, Teresa Scassa:
The inadvertent disclosure of personal health information through peer-to-peer file sharing programs. J. Am. Medical Informatics Assoc. 17(2): 148-158 (2010) - [j46]Khaled El Emam, Ann Brown, Philip AbdelMalik, Angelica Neisa, Mark Walker, Jim Bottomley, Tyson Roffey:
A method for managing re-identification risk from small geographic areas in Canada. BMC Medical Informatics Decis. Mak. 10: 18 (2010) - [j45]Akif Günes Koru, Khaled El Emam:
The Theory of Relative Dependency: Higher Coupling Concentration in Smaller Modules. IEEE Softw. 27(2): 81-89 (2010) - [c27]Marina Sokolova, Khaled El Emam, Sadrul Chowdhury, Emilio Neri, Sean Rose, Elizabeth Jonker:
Evaluation of Rare Event Detection. Canadian AI 2010: 379-383 - [c26]Fida Kamal Dankar, Khaled El Emam:
A method for evaluating marketer re-identification risk. EDBT/ICDT Workshops 2010 - 2009
- [j42]Khaled El Emam, Ann Brown, Philip AbdelMalik:
Model Formulation: Evaluating Predictors of Geographic Area Population Size Cut-offs to Manage Re-identification Risk. J. Am. Medical Informatics Assoc. 16(2): 256-266 (2009) - [j41]Khaled El Emam, Fida Kamal Dankar, Romeo Issa, Elizabeth Jonker, Daniel Amyot, Elise Cogo, Jean-Pierre Corriveau, Mark Walker, Sadrul Chowdhury, Regis Vaillancourt, Tyson Roffey, Jim Bottomley:
Research Paper: A Globally Optimal k-Anonymity Method for the De-Identification of Health Data. J. Am. Medical Informatics Assoc. 16(5): 670-682 (2009) - [j40]Akif Günes Koru, Dongsong Zhang, Khaled El Emam, Hongfang Liu:
An Investigation into the Functional Form of the Size-Defect Relationship for Software Modules. IEEE Trans. Software Eng. 35(2): 293-304 (2009) - [c25]Yu Fu, Akif Günes Koru, Zhiyuan Chen, Khaled El Emam:
A tree-based approach to preserve the privacy of software engineering data and predictive models. PROMISE 2009: 3 - 2008
- [j39]Akif Günes Koru, Khaled El Emam, Dongsong Zhang, Hongfang Liu, Divya Mathew:
Theory of relative defect proneness. Empir. Softw. Eng. 13(5): 473-498 (2008) - [j37]Khaled El Emam, Fida Kamal Dankar:
Research Paper: Protecting Privacy Using k-Anonymity. J. Am. Medical Informatics Assoc. 15(5): 627-637 (2008) - [j36]Khaled El Emam, Akif Günes Koru:
A Replicated Survey of IT Software Project Failures. IEEE Softw. 25(5): 84-90 (2008)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-11-14 01:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint