暂无分享,去创建一个
Yoshua Bengio | Tristan Deleu | Tegan Maharaj | Jian Tang | Daphne Ippolito | Irina Rish | Abhinav Sharma | Robert Obryk | Richard Janda | Yun William Yu | Meng Qu | Brooke Struck | Max Jarvie | Dan Pilat | Sekoul Krastev | Nasim Rahaman | Hannah Alsdurf | Prateek Gupta | Tyler Kolody | Valerie Pisano | Benjamin Prud'homme | Jean-Franois Rousseau | Martin Weiss | Yoshua Bengio | Tegan Maharaj | I. Rish | T. Deleu | Nasim Rahaman | Jian Tang | Y. Yu | Prateek Gupta | H. Alsdurf | Abhinav Sharma | Meng Qu | Daphne Ippolito | R. Janda | Max Jarvie | D. Pilat | B. Struck | S. Krastev | Robert Obryk | Tyler Kolody | Valérie Pisano | Benjamin Prud'homme | J. Rousseau | Martin Weiß
[1] J. Burgess,et al. A Contact-Tracing Procedure* , 1963, The British journal of venereal diseases.
[2] A. Bandura. Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.
[3] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[4] A. Bandura. Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychology Review.
[5] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[6] R. Heiner. The Origin of Predictable Behavior , 1983 .
[7] Matthew L Levine. Contact tracing for HIV infection: a plea for privacy. , 1988, Columbia human rights law review.
[8] William F Flanagan,et al. Equality rights for people with AIDS: mandatory reporting of HIV infection and contact tracing. , 1989, McGill law journal. Revue de droit de McGill.
[9] J. Rubenfeld. The Right of Privacy , 1989 .
[10] Geoffrey E. Hinton,et al. The "wake-sleep" algorithm for unsupervised neural networks. , 1995, Science.
[11] Michael Y. Li,et al. Global stability for the SEIR model in epidemiology. , 1995, Mathematical biosciences.
[12] Jakob Nielsen,et al. Usability Metrics: Tracking Interface Improvements , 1996, IEEE Softw..
[13] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[14] R. MacCallum,et al. Chronic Stress Modulates the Immune Response to a Pneumococcal Pneumonia Vaccine , 2000, Psychosomatic medicine.
[15] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[16] Jin H. Im,et al. Privacy , 2002, Encyclopedia of Information Systems.
[17] James Q. Whitman. The Two Western Cultures of Privacy: Dignity versus Liberty , 2004 .
[18] M Krajden,et al. Assessment of in-flight transmission of SARS--results of contact tracing, Canada. , 2003, Canada communicable disease report = Releve des maladies transmissibles au Canada.
[19] Ronald J. Williams,et al. Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning , 2004, Machine Learning.
[20] Angela Fagerlin,et al. “Is 28% Good or Bad?” Evaluability and Preference Reversals in Health Care Decisions , 2004, Medical decision making : an international journal of the Society for Medical Decision Making.
[21] S. Segerstrom,et al. Psychological stress and the human immune system: a meta-analytic study of 30 years of inquiry. , 2004, Psychological bulletin.
[22] FOR DISEASE CONTROL AND PREVENTION , 2006 .
[23] H. Plessner,et al. Implicit consumer preferences and their influence on product choice , 2006 .
[24] M. Banaji,et al. Easier done than undone: asymmetry in the malleability of implicit preferences. , 2006, Journal of personality and social psychology.
[25] J. Krause,et al. Social network theory in the behavioural sciences: potential applications , 2007, Behavioral Ecology and Sociobiology.
[26] Herbert Gintis,et al. Richard H. Thaler – Cass R. Sunstein: Nudge: Improving Decisions about Health, Wealth, and Happiness , 2008 .
[27] Adam Kowol. The theory of cognitive dissonance By , 2008 .
[28] Angeliki Poulymenakou,et al. Developing a Usability Evaluation Method for e-Learning Applications: Beyond Functional Usability , 2009, Int. J. Hum. Comput. Interact..
[29] Christopher P. Furner,et al. Privacy Assurance and Network Effects in the Adoption of Location-Based Services: an iPhone Experiment , 2010, ICIS.
[30] P. Potter. The Unbearable Lightness of Being , 2010, Emerging infectious diseases.
[31] Simone Fischer-Hübner,et al. Surveillance and Privacy , 2010, HCC.
[32] Anil Kumar. Understanding Privacy , 2010 .
[33] Benno Torgler,et al. The relationship between stress, strain and social capital , 2011 .
[34] Alexander J. Rothman,et al. Perceived susceptibility to breast cancer moderates the effect of gain- and loss-framed messages on use of screening mammography. , 2011, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.
[35] S. Michie,et al. A refined taxonomy of behaviour change techniques to help people change their physical activity and healthy eating behaviours: The CALO-RE taxonomy , 2011, Psychology & health.
[36] Tom Jefferson,et al. Physical interventions to interrupt or reduce the spread of respiratory viruses: systematic review , 2008, BMJ : British Medical Journal.
[37] Alexander K. Koch,et al. Self-Regulation Through Goal Setting , 2011, SSRN Electronic Journal.
[38] Benjamin Greschbach,et al. The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[39] Anita M. McGahan,et al. Innovation for Inclusive Growth: Towards a Theoretical Framework and a Research Agenda , 2012 .
[40] Noel Ryan. Willpower: Rediscovering the greatest human strength, by Roy F. Baumeister and John Tierney , 2012 .
[41] Delia Grace,et al. Development and delivery of evidence-based messages to reduce the risk of zoonoses in Nairobi, Kenya , 2012, Tropical Animal Health and Production.
[42] Debra Revere,et al. Public health communications and alert fatigue , 2013, BMC Health Services Research.
[43] Yoshua Bengio,et al. Estimating or Propagating Gradients Through Stochastic Neurons for Conditional Computation , 2013, ArXiv.
[44] Matthias Hunger,et al. Official statistics and claims data records indicate non-response and recall bias within survey-based estimates of health care utilization in the older population , 2013, BMC Health Services Research.
[45] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[46] Harsh Kupwade Patil,et al. Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.
[47] Dan Boneh,et al. Riposte: An Anonymous Messaging System Handling Millions of Users , 2015, 2015 IEEE Symposium on Security and Privacy.
[48] V. Liu,et al. Data breaches of protected health information in the United States. , 2015, JAMA.
[49] Peter A Hancock,et al. State of science: mental workload in ergonomics , 2015, Ergonomics.
[50] S. Segerstrom,et al. Current Directions in Stress and Human Immune Function. , 2015, Current opinion in psychology.
[51] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[52] Nickolai Zeldovich,et al. Vuvuzela: scalable private messaging resistant to traffic analysis , 2015, SOSP.
[53] Nickolai Zeldovich,et al. Stadium: A Distributed Metadata-Private Messaging System , 2017, IACR Cryptol. ePrint Arch..
[54] Pavani K. Ram,et al. Behavior Change without Behavior Change Communication: Nudging Handwashing among Primary School Students in Bangladesh , 2016, International journal of environmental research and public health.
[55] R. Kelly Garrett,et al. The “Echo Chamber” Distraction: Disinformation Campaigns are the Problem, Not Audience Fragmentation , 2017 .
[56] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[57] Ben Poole,et al. Categorical Reparameterization with Gumbel-Softmax , 2016, ICLR.
[58] C. Rossmann,et al. Content Effects: Health Campaign Communication , 2017 .
[59] A. Bauman,et al. The use of smartphone health apps and other mobile health (mHealth) technologies in dietetic practice: a three country study , 2017, Journal of human nutrition and dietetics : the official journal of the British Dietetic Association.
[60] Giuseppe A. Veltri,et al. The impact of different forms of cognitive scarcity on online privacy disclosure , 2017, Comput. Hum. Behav..
[61] Salah Chafik,et al. Community trust reduces myopic decisions of low-income individuals , 2017, Proceedings of the National Academy of Sciences.
[62] Steven Chan,et al. Human Behavior with Mobile Health: Smartphone/ Devices, Apps and Cognition , 2018, Psychology and Cognitive Sciences - Open Journal.
[63] Priscilla M. Regan. Legislating Privacy: , 2018, The Handbook of Privacy Studies.
[64] M. Turakhia,et al. Using Digital Health Technology to Better Generate Evidence and Deliver Evidence-Based Care. , 2018, Journal of the American College of Cardiology.
[65] Ronald J. Deibert,et al. Advancing Human Rights-by-Design in the Dual-Use Technology Industry , 2018 .
[66] William R. Frey,et al. Artificial Intelligence and Inclusion: Formerly Gang-Involved Youth as Domain Experts for Analyzing Unstructured Twitter Data , 2018, Social science computer review.
[67] Christopher Joseph Pal,et al. Sparse Attentive Backtracking: Temporal CreditAssignment Through Reminding , 2018, NeurIPS.
[68] Arieh Waldman. Cognitive Biases, Dark Patterns, and the 'Privacy Paradox' , 2019, Current opinion in psychology.
[69] Kim D Raine,et al. Assessing general public and policy influencer support for healthy public policies to promote healthy eating at the population level in two Canadian provinces , 2019, Public Health Nutrition.
[70] Chingching Chang,et al. Self-Control-Centered Empowerment Model: Health Consciousness and Health Knowledge as Drivers of Empowerment-Seeking through Health Communication , 2019, Health communication.
[71] Marshall D. Rice,et al. Privacy in Doubt: An Empirical Investigation of Canadians' Knowledge of Corporate Data Collection and Usage Practices , 2019 .
[72] Steve Whittaker,et al. Progressive disclosure: empirically motivated approaches to designing effective transparency , 2019, IUI.
[73] Suhail A R Doi,et al. A unified framework for bias assessment in clinical research. , 2019, International journal of evidence-based healthcare.
[74] R. Morgan,et al. COVID-19: the gendered impacts of the outbreak , 2020, The Lancet.
[75] Hannah R. Meredith,et al. The Incubation Period of Coronavirus Disease 2019 (COVID-19) From Publicly Reported Confirmed Cases: Estimation and Application , 2020, Annals of Internal Medicine.
[76] Alex 'Sandy' Pentland,et al. Assessing Disease Exposure Risk with Location Data: A Proposal for Cryptographic Preservation of Privacy , 2020, 2003.14412.
[77] Ramesh Raskar,et al. Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic , 2020, ArXiv.
[78] Yi-Feng Xu,et al. Patients with mental health disorders in the COVID-19 epidemic , 2020, The Lancet Psychiatry.
[79] Lucie Abeler-Dörner,et al. Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing , 2020, Science.
[80] Marc Lipsitch,et al. Quantifying bias of COVID-19 prevalence and severity estimates in Wuhan, China that depend on reported cases in international travelers , 2020, medRxiv.
[81] Dawn Song,et al. Epione: Lightweight Contact Tracing with Strong Privacy , 2020, IEEE Data Eng. Bull..
[82] T. Hollingsworth,et al. How will country-based mitigation measures influence the course of the COVID-19 epidemic? , 2020, The Lancet.
[83] Mikhail Prokopenko,et al. Modelling transmission and control of the COVID-19 pandemic in Australia , 2020, Nature Communications.
[84] Delan Devakumar,et al. Racism and discrimination in COVID-19 responses , 2020, The Lancet.
[85] Yiu Chung Lau,et al. Temporal dynamics in viral shedding and transmissibility of COVID-19 , 2020, Nature Medicine.
[86] Hyunghoon Cho,et al. Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs , 2020, ArXiv.
[87] Shane G. Henderson,et al. Safe blues: a method for estimation and control in the fight against COVID-19 , 2020 .
[88] L. Barajas-Nava,et al. Physical interventions to interrupt or reduce the spread of respiratory viruses. , 2020, Boletin medico del Hospital Infantil de Mexico.
[89] Dean P. Foster,et al. PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing , 2020, IEEE Data Eng. Bull..
[90] Hayley McGuffie,et al. NHS Covid 19 app , 2020 .
[91] Nuno Fernandes,et al. Economic Effects of Coronavirus Outbreak (COVID-19) on the World Economy , 2020, SSRN Electronic Journal.
[92] R. C. Silver,et al. The novel coronavirus (COVID-2019) outbreak: Amplification of public health consequences by media exposure. , 2020, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.
[93] G. Leung,et al. First-wave COVID-19 transmissibility and severity in China outside Hubei after control measures, and second-wave scenario planning: a modelling impact assessment , 2020, The Lancet.
[94] Kenan Degirmenci,et al. Mobile users' information privacy concerns and the role of app permission requests , 2020, Int. J. Inf. Manag..
[95] Jason Bay,et al. BlueTrace: A privacy-preserving protocol for community-driven contact tracing across borders , 2020 .
[96] Bill Gates,et al. Responding to Covid-19 - A Once-in-a-Century Pandemic? , 2020, The New England journal of medicine.
[97] Ramesh Raskar,et al. Assessing Disease Exposure Risk With Location Histories And Protecting Privacy: A Cryptographic Approach In Response To A Global Pandemic , 2020, ArXiv.
[98] Daniel Blank,et al. Slowing the Spread of Infectious Diseases Using Crowdsourced Data , 2020, IEEE Data Eng. Bull..
[99] N. Kraguljac,et al. COVID-19: Facts, Cultural Considerations, and Risk of Stigmatization , 2020, Journal of transcultural nursing : official journal of the Transcultural Nursing Society.
[100] Lawrence O Gostin,et al. Responding to Covid‐19: How to Navigate a Public Health Emergency Legally and Ethically , 2020, The Hastings Center report.
[101] R. Brook,et al. Response to COVID-19 in Taiwan: Big Data Analytics, New Technology, and Proactive Testing. , 2020, JAMA.
[102] Carmela Troncoso,et al. Decentralized Privacy-Preserving Proximity Tracing , 2020, IEEE Data Eng. Bull..