Shuang Wang
Shuang Wang
Cofounder of Nuowei Tech (NVXClouds)
Verified email at - Homepage
Cited by
Cited by
Deep learning for healthcare: review, opportunities and challenges
R Miotto, F Wang, S Wang, X Jiang, JT Dudley
Briefings in bioinformatics 19 (6), 1236-1246, 2018
The real-world effectiveness and safety of vedolizumab for moderate–severe Crohn’s disease: results from the US VICTORY Consortium
PS Dulai, S Singh, X Jiang, F Peerani, N Narula, K Chaudrey, ...
Official journal of the American College of Gastroenterology| ACG 111 (8 …, 2016
Secure logistic regression based on homomorphic encryption: Design and evaluation
M Kim, Y Song, S Wang, Y Xia, X Jiang
JMIR medical informatics 6 (2), e8805, 2018
Privacy-preserving patient similarity learning in a federated environment: development and analysis
J Lee, J Sun, F Wang, S Wang, CH Jun, X Jiang
JMIR medical informatics 6 (2), e7744, 2018
HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS
S Wang, Y Zhang, W Dai, K Lauter, M Kim, Y Tang, H Xiong, X Jiang
Bioinformatics 32 (2), 211-218, 2016
WebDISCO: a web service for distributed cox model learning without patient-level data sharing
CL Lu, S Wang, Z Ji, Y Wu, L Xiong, X Jiang, L Ohno-Machado
Journal of the American Medical Informatics Association 22 (6), 1212-1219, 2015
Princess: Privacy-protecting rare disease international network collaboration via encryption through software guard extensions
F Chen, S Wang, X Jiang, S Ding, Y Lu, J Kim, SC Sahinalp, C Shimizu, ...
Bioinformatics 33 (6), 871-878, 2017
Genome privacy: challenges, technical approaches to mitigate risk, and ethical considerations in the United States
S Wang, X Jiang, S Singh, R Marmor, L Bonomi, D Fox, M Dow, ...
Annals of the New York Academy of Sciences 1387 (1), 73-83, 2017
Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks
JL Raisaro, F Tramer, Z Ji, D Bu, Y Zhao, K Carey, D Lloyd, H Sofia, ...
Journal of the American Medical Informatics Association 24 (4), 799-805, 2017
Expectation propagation logistic regression (explorer): distributed privacy-preserving online model learning
S Wang, X Jiang, Y Wu, L Cui, S Cheng, L Ohno-Machado
Journal of biomedical informatics 46 (3), 480-496, 2013
Cloud-based system for effective surveillance and control of COVID-19: useful experiences from Hubei, China
M Gong, L Liu, X Sun, Y Yang, S Wang, H Zhu
Journal of medical Internet research 22 (4), e18948, 2020
pSCANNER: Patient-centered scalable national network for effectiveness research
L Ohno-Machado, Z Agha, DS Bell, L Dahm, ME Day, JN Doctor, ...
Journal of the American Medical Informatics Association 21 (4), 621-626, 2014
A randomized response model for privacy preserving smart metering
S Wang, L Cui, J Que, DH Choi, X Jiang, S Cheng, L Xie
IEEE transactions on smart grid 3 (3), 1317-1324, 2012
Privacy-preserving GWAS analysis on federated genomic datasets
SD Constable, Y Tang, S Wang, X Jiang, S Chapin
BMC medical informatics and decision making 15, 1-9, 2015
Foresee: Fully outsourced secure genome study based on homomorphic encryption
Y Zhang, W Dai, X Jiang, H Xiong, S Wang
BMC medical informatics and decision making 15, 1-11, 2015
Privacy-preserving techniques of genomic data—a survey
MMA Aziz, MN Sadat, D Alhadidi, S Wang, X Jiang, CL Brown, ...
Briefings in bioinformatics 20 (3), 887-895, 2019
A predictive model for medical events based on contextual embedding of temporal sequences
W Farhan, Z Wang, Y Huang, S Wang, F Wang, X Jiang
JMIR medical informatics 4 (4), e5977, 2016
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre guard extension
F Chen, C Wang, W Dai, X Jiang, N Mohammed, MM Al Aziz, MN Sadat, ...
BMC medical genomics 10, 77-85, 2017
Protecting genomic data analytics in the cloud: state of the art and opportunities
H Tang, X Jiang, X Wang, S Wang, H Sofia, D Fox, K Lauter, B Malin, ...
BMC medical genomics 9, 1-9, 2016
A parallel decoding algorithm of LDPC codes using CUDA
S Wang, S Cheng, Q Wu
2008 42nd Asilomar Conference on Signals, Systems and Computers, 171-175, 2008
The system can't perform the operation now. Try again later.
Articles 1–20