Skip to main content

Showing 1–2 of 2 results for author: Smith, J C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2205.01547  [pdf

    cs.CR

    Effective Security by Obscurity

    Authors: J. Christian Smith

    Abstract: "Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or… ▽ More

    Submitted 29 April, 2022; originally announced May 2022.

    Comments: 28 pages, 2 figures

  2. arXiv:2112.10821  [pdf

    cs.LG

    Natural language processing to identify lupus nephritis phenotype in electronic health records

    Authors: Yu Deng, Jennifer A. Pacheco, Anh Chung, Chengsheng Mao, Joshua C. Smith, Juan Zhao, Wei-Qi Wei, April Barnado, Chunhua Weng, Cong Liu, Adam Cordon, **gzhi Yu, Yacob Tedla, Abel Kho, Rosalind Ramsey-Goldman, Theresa Walunas, Yuan Luo

    Abstract: Systemic lupus erythematosus (SLE) is a rare autoimmune disorder characterized by an unpredictable course of flares and remission with diverse manifestations. Lupus nephritis, one of the major disease manifestations of SLE for organ damage and mortality, is a key component of lupus classification criteria. Accurately identifying lupus nephritis in electronic health records (EHRs) would therefore b… ▽ More

    Submitted 20 December, 2021; originally announced December 2021.