Khaled El Emam

Orcid: 0000-0003-3325-4149

According to our database1, Khaled El Emam authored at least 105 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An evaluation of synthetic data augmentation for mitigating covariate bias in health data.
Patterns, 2024

2022
The Practices and Challenges of Generating Nonidentifiable Data.
IEEE Secur. Priv., 2022

Algorithms to anonymize structured medical and healthcare data: A systematic review.
Frontiers Bioinform., 2022

2021
Optimizing the synthesis of clinical trial data using sequential trees.
J. Am. Medical Informatics Assoc., 2021

A Review of the Privacy-Enhancing Technologies Software Market.
IEEE Secur. Priv., 2021

2020
Seven Ways to Evaluate the Utility of Synthetic Data.
IEEE Secur. Priv., 2020

2018
Brain-CODE: A Secure Neuroinformatics Platform for Management, Federation, Sharing and Analysis of Multi-Dimensional Neuroscience Data.
Frontiers Neuroinformatics, 2018

2017
Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention.
J. Geogr. Syst., 2017

2016
A unified framework for evaluating the risk of re-identification of text de-identification tools.
J. Biomed. Informatics, 2016

Medical Data Privacy Handbook, A. Gkoulalas-Divanis, G. Loukides. Springer International Publishing, Switzerland (2015) 832 pp., ISBN: 978-3-319-23633-9.
J. Biomed. Informatics, 2016

2015
A privacy preserving protocol for tracking participants in phase I clinical trials.
J. Biomed. Informatics, 2015

Efficient Privacy-Preserving Identity Scheme for Electronic Validation of Phase 1 Clinical Trials.
Proceedings of the E-Technologies - 6th International Conference, 2015

Common Length Name Representation: An Efficient Privacy-Preserving Scheme.
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015

2014
Efficient Private Information Retrieval for Geographical Aggregation.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

A Tool for Simple and Efficient Clinical Protocol Evaluation.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

Real-World Data Set Parameters and Synthesization for Matching Identity in Clinical Protocols.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

2013
Practicing Differential Privacy in Health Care: A Review.
Trans. Data Priv., 2013

Evaluating the risk of patient re-identification from adverse drug event reports.
BMC Medical Informatics Decis. Mak., 2013

<i>"Not all my friends need to</i> <i>know"</i>: a qualitative study of teenage patients, privacy, and social media.
J. Am. Medical Informatics Assoc., 2013

Biomedical data privacy: problems, perspectives, and recent advances.
J. Am. Medical Informatics Assoc., 2013

A secure distributed logistic regression protocol for the detection of rare adverse drug events.
J. Am. Medical Informatics Assoc., 2013

Authorship Attribution in Health Forums.
Proceedings of the Recent Advances in Natural Language Processing, 2013

A theoretical model for obfuscating web navigation trails.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2012
Estimating the re-identification risk of clinical data sets.
BMC Medical Informatics Decis. Mak., 2012

The application of differential privacy to health data.
Proceedings of the 2012 Joint EDBT/ICDT Workshops, Berlin, Germany, March 30, 2012, 2012

2011
De-identifying a public use microdata file from the Canadian national discharge abstract database.
BMC Medical Informatics Decis. Mak., 2011

The re-identification risk of Canadians from longitudinal demographics.
BMC Medical Informatics Decis. Mak., 2011

A secure protocol for protecting the identity of providers when disclosing data for disease surveillance.
J. Am. Medical Informatics Assoc., 2011

2010
The Theory of Relative Dependency: Higher Coupling Concentration in Smaller Modules.
IEEE Softw., 2010

A method for managing re-identification risk from small geographic areas in Canada.
BMC Medical Informatics Decis. Mak., 2010

The inadvertent disclosure of personal health information through peer-to-peer file sharing programs.
J. Am. Medical Informatics Assoc., 2010

Risk-Based De-Identification of Health Data.
IEEE Secur. Priv., 2010

Testing the theory of relative defect proneness for closed-source software.
Empir. Softw. Eng., 2010

A method for evaluating marketer re-identification risk.
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010

Evaluation of Rare Event Detection.
Proceedings of the Advances in Artificial Intelligence, 2010

2009
An Investigation into the Functional Form of the Size-Defect Relationship for Software Modules.
IEEE Trans. Software Eng., 2009

Research Paper: A Globally Optimal k-Anonymity Method for the De-Identification of Health Data.
J. Am. Medical Informatics Assoc., 2009

Model Formulation: Evaluating Predictors of Geographic Area Population Size Cut-offs to Manage Re-identification Risk.
J. Am. Medical Informatics Assoc., 2009

Privacy Interests in Prescription Data, Part I: Prescriber Privacy.
IEEE Secur. Priv., 2009

Privacy Interests in Prescription Data, Part 2: Patient Privacy.
IEEE Secur. Priv., 2009

A tree-based approach to preserve the privacy of software engineering data and predictive models.
Proceedings of the 5th International Workshop on Predictive Models in Software Engineering, 2009

2008
A Replicated Survey of IT Software Project Failures.
IEEE Softw., 2008

Research Paper: Protecting Privacy Using k-Anonymity.
J. Am. Medical Informatics Assoc., 2008

Heuristics for De-identifying Health Data.
IEEE Secur. Priv., 2008

Theory of relative defect proneness.
Empir. Softw. Eng., 2008

2007
SPICE in retrospect: Developing a standard for process assessment.
J. Syst. Softw., 2007

2006
An Overview of Process Improvement in Small Settings.
Proceedings of the Web Engineering, 2006

2004
Applications of statistics in software engineering.
J. Syst. Softw., 2004

Third International Workshop on Empirical Evaluation of Agile Methods ("The Data Workshop").
Proceedings of the Extreme Programming and Agile Methods, 2004

2002
Preliminary Guidelines for Empirical Research in Software Engineering.
IEEE Trans. Software Eng., 2002

The Optimal Class Size for Object-Oriented Software.
IEEE Trans. Software Eng., 2002

2001
Software Cost Estimation with Incomplete Data.
IEEE Trans. Software Eng., 2001

An Internally Replicated Quasi-Experimental Comparison of Checklist and Perspective-Based Reading of Code Documents.
IEEE Trans. Software Eng., 2001

Evaluating Capture-Recapture Models with Two Inspectors.
IEEE Trans. Software Eng., 2001

The Confounding Effect of Class Size on the Validity of Object-Oriented Metrics.
IEEE Trans. Software Eng., 2001

Findings from Phase 2 of the SPICE trials.
Softw. Process. Improv. Pract., 2001

The prediction of faulty classes using object-oriented design metrics.
J. Syst. Softw., 2001

An empirical evaluation of the ISO/IEC 15504 assessment model.
J. Syst. Softw., 2001

Comparing case-based reasoning classifiers for predicting high risk software components.
J. Syst. Softw., 2001

Modelling the Likelihood of Software Process Improvement: An Exploratory Study.
Empir. Softw. Eng., 2001

Ethics and Open Source.
Empir. Softw. Eng., 2001

A Primer on Object-Oriented Measurement.
Proceedings of the 7th IEEE International Software Metrics Symposium (METRICS 2001), 2001

2000
Validating the ISO/IEC 15504 Measure of Software Requirements Analysis Process Capability.
IEEE Trans. Software Eng., 2000

A Comprehensive Evaluation of Capture-Recapture Models for Estimating Software Defect Content.
IEEE Trans. Software Eng., 2000

Critical Factors Affecting Personal Software Processes.
IEEE Softw., 2000

An experimental comparison of reading techniques for defect detection in UML design documents.
J. Syst. Softw., 2000

The application of subjective estimates of effectiveness to controlling software inspections.
J. Syst. Softw., 2000

Estimating the extent of standards use: the case of ISO/IEC 15504.
J. Syst. Softw., 2000

Validating the ISO/IEC 15504 measures of software development process capability.
J. Syst. Softw., 2000

An empirical review of software process assessments.
Adv. Comput., 2000

Thresholds for Object-Oriented Measures.
Proceedings of the 11th International Symposium on Software Reliability Engineering (ISSRE 2000), 2000

1999
Benchmarking Kappa: Interrater Agreement in Software Process Assessments.
Empir. Softw. Eng., 1999

Quantitative Modeling of Software Reviews in an Industrial Setting.
Proceedings of the 6th IEEE International Software Metrics Symposium (METRICS 1999), 1999

Explaining the Cost of European Space and Military Projects.
Proceedings of the 1999 International Conference on Software Engineering, 1999

An Assessment and Comparison of Common Software Cost Estimation Modeling Techniques.
Proceedings of the 1999 International Conference on Software Engineering, 1999

1998
The Internal Consistencies of the 1987 SEI Maturity Questionnaire and the SPICE Capability Dimension.
Empir. Softw. Eng., 1998

The Predictive Validity Criterion for Evaluating Binary Classifiers.
Proceedings of the 5th IEEE International Software Metrics Symposium (METRICS 1998), 1998

Cost Implications of Interrater Agreement for Software Process Assessments.
Proceedings of the 5th IEEE International Software Metrics Symposium (METRICS 1998), 1998

The Internal Consistency of the ISO/IEC 15504 Software Process Capability Scale.
Proceedings of the 5th IEEE International Software Metrics Symposium (METRICS 1998), 1998

The repeatability of code defect classifications.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

A comparison and integration of capture-recapture models and the detection profile method.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

Using Simulation to Build Inspection Efficiency Benchmarks for Development Projects.
Proceedings of the Forging New Links, 1998

COBRA: A Hybrid Method for Software Cost Estimation, Benchmarking, and Risk Assessment.
Proceedings of the Forging New Links, 1998

1997
The reliability of ISO/IEC PDTR 15504 assessments.
Softw. Process. Improv. Pract., 1997

Fraunhofer Institute for Experimental Software Engineering.
Softw. Process. Improv. Pract., 1997

Reply to ''Comments to the Paper: Briand, El Emam, Morasca: On the Application of Measurement Theory in Software Engineering.
Empir. Softw. Eng., 1997

Evaluating the Interrater Agreement of Process Capability Ratings.
Proceedings of the 4th IEEE International Software Metrics Symposium (METRICS 1997), 1997

Quantitative evaluation of capture-recapture models to control software inspections.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

Causal Analysis of the Requirements Change Process for a Large System.
Proceedings of the 1997 International Conference on Software Maintenance (ICSM '97), 1997

Characterizing and Modeling the Cost of Rework in a Library of Reusable Software Components.
Proceedings of the Pulling Together, 1997

1996
Assessor agreement in rating SPICE processes.
Softw. Process. Improv. Pract., December, 1996

Centre de Recherche Informatique de Montreal.
Softw. Process. Improv. Pract., June, 1996

An Empirical Evaluation of the Prospective International SPICE Standard.
Softw. Process. Improv. Pract., June, 1996

Software Engineering R&D group at CRIM.
Softw. Process. Improv. Pract., March, 1996

Does Organizational Maturity Improve Quality?
IEEE Softw., 1996

User Participation in the Requirements Engineering Process: An Empirical Study.
Requir. Eng., 1996

An instrument for measuring the success of the requirements engineering process in information systems development.
Empir. Softw. Eng., 1996

On the application of measurement theory in software engineering.
Empir. Softw. Eng., 1996

1995
Measuring the success of requirements engineering processes.
Proceedings of the Second IEEE International Symposium on Requirements Engineering, March 27, 1995

A field study of requirements engineering practices in information systems development.
Proceedings of the Second IEEE International Symposium on Requirements Engineering, March 27, 1995

Customising Software Process Models.
Proceedings of the Software Process Technology, 4th European Workshop, 1995

1993
Empirically Driven Improvement of Generic Process Models.
Proceedings of the State of the Practice in Process Technology, 1993

A Comprehensive Process Model for Studying Software Process Papers.
Proceedings of the 15th International Conference on Software Engineering, 1993

An empirical evaluation of the G/Q/M method.
Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, 1993

1992
Quantitative Measurements based on Process and Context Models.
Proceedings of the Experimental Software Engineering Issues: Critical Assessment and Future Directions, 1992


  Loading...