An Optimized Integrated Framework of Big Data Analytics Managing Security and Privacy in Healthcare Data
暂无分享,去创建一个
[1] Allan Hanbury,et al. VISCERAL: Towards Large Data in Medical Imaging - Challenges and Directions , 2012, MCBR-CDS.
[2] Adem Karahoca,et al. Predicting existence of Mycobacterium tuberculosis on patients using data mining approaches , 2011, WCIT.
[3] Harleen Kaur,et al. A Spectrum of Big Data Applications for Data Analytics , 2015 .
[4] Chunxiao Jiang,et al. Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.
[5] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[6] Cheng-Chi Lee,et al. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments , 2013, Int. J. Netw. Secur..
[7] P. Hopewell,et al. Tuberculosis and HIV Co-infection, California, USA, 1993–2008 , 2012, Emerging infectious diseases.
[8] Pierre Jannin,et al. A Framework for the Recognition of High-Level Surgical Tasks From Video Images for Cataract Surgeries , 2012, IEEE Transactions on Biomedical Engineering.
[9] Hans-Peter Kriegel,et al. Clustering high-dimensional data: A survey on subspace clustering, pattern-based clustering, and correlation clustering , 2009, TKDD.
[10] E. Balas,et al. Improving clinical practice using clinical decision support systems: a systematic review of trials to identify features critical to success , 2005, BMJ : British Medical Journal.
[11] Yi Mu,et al. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption , 2012, IEEE Trans. Parallel Distributed Syst..
[12] Andreas Holzinger,et al. On Visual Analytics and Evaluation in Cell Physiology: A Case Study , 2013, CD-ARES.
[13] Ritu Chauhan,et al. A Bayesian Network Model for Probability Estimation , 2015 .
[14] Vassilis S. Kodogiannis,et al. Data mining techniques for HIV/AIDS data management in Thailand , 2008, J. Enterp. Inf. Manag..
[15] Deepika Koundal,et al. Big data application in medical domain , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).
[16] Daniel A. Keim,et al. Information Visualization and Visual Data Mining , 2002, IEEE Trans. Vis. Comput. Graph..
[17] Jiguo Li,et al. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.
[18] Victor Chang,et al. Advancement and applicability of classifiers for variant exponential model to optimize the accuracy for deep learning , 2017 .
[19] Vipin Kumar,et al. Trends in big data analytics , 2014, J. Parallel Distributed Comput..
[20] nbspShakshi Garg,et al. A Review on Tuberculosis Using Data mining Approaches , 2015 .
[21] Alexandros Labrinidis,et al. Challenges and Opportunities with Big Data , 2012, Proc. VLDB Endow..
[22] Ewa Lechman,et al. Big Data Analytics for ICT Monitoring and Development , 2017 .
[23] R. Haynes,et al. Effects of Computer-based Clinical Decision Support Systems on Clinician Performance and Patient Outcome: A Critical Appraisal of Research , 1994, Annals of Internal Medicine.
[24] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[25] Marisa Analía Sánchez,et al. Mining Tuberculosis Data , 2009 .
[26] Yike Guo,et al. tranSMART: An Open Source and Community-Driven Informatics and Data Sharing Platform for Clinical and Translational Research , 2013, AMIA Joint Summits on Translational Science proceedings. AMIA Joint Summits on Translational Science.
[27] Dimitris N. Metaxas,et al. Computer-Aided Diagnosis of Mammographic Masses Using Scalable Image Retrieval , 2015, IEEE Transactions on Biomedical Engineering.
[28] E. Graviss,et al. Spatial-temporal distribution of genotyped tuberculosis cases in a county with active transmission , 2017, BMC Infectious Diseases.
[29] Bethany Percha,et al. Functional evaluation of out-of-the-box text-mining tools for data-mining tasks , 2014, J. Am. Medical Informatics Assoc..
[30] Peng Hu,et al. A Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear Maps , 2017, Int. J. Netw. Secur..