Nguyen, B., Whitmore, L.S., George, A., Hudson, C.M., & Hudson, C.M. (2021). Evaluating causal-based feature selection for fuel property prediction models [Conference Poster]. Statistical Analysis and Data Mining. https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85105425736&origin=inward
Publications
Search results
Jump to search filtersKuo, T.T., Bath, T., Ma, S., Pattengale, N.D., Yang, M., Cao, Y., Chen, F., Ding, Y., Hudson, C.M., Kim, J., Pan, G., Post, K., Xiong, L., Sofia, H.J., Ohno-MacHado, L., & Ohno-MacHado, L. (2021). Benchmarking blockchain-based gene-drug interaction data sharing methods: A case study from the iDASH 2019 secure genome analysis competition blockchain track. International Journal of Medical Informatics, 154. https://doi.org/10.1016/j.ijmedinf.2021.104559
Hudson, C.M. (2021). Emulytics in Genome Security: Use Cases [Presentation]. https://www.osti.gov/biblio/1855564
Nguyen, B., Davis, R., George, A., Hudson, C.M., & Hudson, C.M. (2020). RetSynth aids in the identification of model platform organisms for the biochemical synthesis of MCCI and SI fuels [Conference Poster]. https://www.osti.gov/biblio/1770046
Nguyen, B., Whitmore, L., George, A., Hudson, C.M., & Hudson, C.M. (2020). Causal inference modeling for feature selection of QSAR machine learning models [Conference Poster]. https://www.osti.gov/biblio/1765639
Hudson, C.M. (2020). Digital Biosecurity Pilot Project. https://doi.org/10.2172/1596230
Hudson, C.M. (2020). From Buffer-Overflowing Genomic Tools to Securing Biomedical File Formats [Presentation]. https://www.osti.gov/biblio/1761039
Hudson, C.M. (2019). Biodefense at Sandia National Laboratories [Presentation]. https://www.osti.gov/biblio/1646265
Pattengale, N.D., Hudson, C.M., & Hudson, C.M. (2019). iDASH 2019 ? Track 1 Methods [Conference Poster]. https://www.osti.gov/biblio/1643037
Whitmore, L.S., Nguyen, B., Pinar, A., George, A., Hudson, C.M., & Hudson, C.M. (2019). RetSynth: Determining all optimal and sub-optimal synthetic pathways that facilitate synthesis of target compounds in chassis organisms. BMC Bioinformatics, 20(1). https://doi.org/10.1186/s12859-019-3025-9
Hudson, C.M., Fracchia, C., & Fracchia, C. (2019). From Buffer-Overflowing Genomic Tools to Securing Biomedical File Formats [Conference Poster]. https://www.osti.gov/biblio/1642128
Hudson, C.M. (2019). Cybersecurity in DNA Design and Verification Tools: Risks and Solutions [Presentation]. https://www.osti.gov/biblio/1645972
Hudson, C.M., Oehman, C., & Oehman, C. (2019). Blue Ribbon Panel Remarks [Conference Poster]. https://www.osti.gov/biblio/1642569
Goodman, E., Zimmerman, C., Hudson, C.M., & Hudson, C.M. (2019). Packet2Vec: Utilizing Word2Vec for Feature Extraction in Packet Data [Conference Poster]. https://www.osti.gov/biblio/1641260
Whitmore, L.S., Hudson, C.M., George, A., & George, A. (2019). Optimizing genetic manipulation of microbial organisms for production of multiple target chemical compounds [Conference Poster]. https://www.osti.gov/biblio/1640934
Whitmore, L.S., Hudson, C.M., George, A., & George, A. (2019). Retrosynthesis of All Available Pathways to Microbial Production of Precursors to Target Chemicals Based on Chemical Separation Characteristics [Conference Poster]. https://www.osti.gov/biblio/1640932
Whitmore, L.S., George, A., Hudson, C.M., & Hudson, C.M. (2019). BioRetroSynthesis: A tool for identifying optimal metabolic pathways for production of a target compound [Conference Poster]. https://www.osti.gov/biblio/1640935
Landera, A., Whitmore, L.S., George, A., Hudson, C.M., & Hudson, C.M. (2019). Computational tools for advancing discovery of bio-fuels [Conference Poster]. https://www.osti.gov/biblio/1640933
Hudson, C.M. (2019). Genomic and Synthetic Biology Cybersecurity [Presentation]. https://www.osti.gov/biblio/1645206
Goodman, E., Zimmerman, C., Hudson, C.M., & Hudson, C.M. (2019). Packet2Vec: Utilizing Word2Vec for Feature Extraction in Packet Data [Conference Poster]. https://www.osti.gov/biblio/1640143
Hudson, C.M. (2019). Exploiting BWA to Manipulate Raw Genomic Data In-Place [PowerPoint]. https://doi.org/10.2172/1762309
Hudson, C.M., Podlevsky, J., Williams, K.P., & Williams, K.P. (2019). Targeted Assembly of cas Gene Clusters from High Throughput Sequencing Data [Conference Poster]. https://www.osti.gov/biblio/1639517
Hudson, C.M. (2019). Modeling realistic genomic and synthetic biology facilities at scale [Conference Poster]. https://www.osti.gov/biblio/1596404
Pattengale, N.D., Ting, C., Hudson, C.M., & Hudson, C.M. (2019). Genomic Privacy and Security [Conference Poster]. https://www.osti.gov/biblio/1596403
Goodman, E., Zimmerman, C., Hudson, C.M., & Hudson, C.M. (2019). Packet2Vec: Utlizing Word2Vec for Feature Extraction in Packet Data [Conference Poster]. https://www.osti.gov/biblio/1596405