De-anonymizing Genomic Databases Using Phenotypic Traits
暂无分享,去创建一个
Jean-Pierre Hubaux | Erman Ayday | Kévin Huguenin | Mathias Humbert | Joachim Hugonot | J. Hubaux | Erman Ayday | Mathias Humbert | Kévin Huguenin | Joachim Hugonot
[1] Vitaly Shmatikov,et al. Privacy-preserving data exploration in genome-wide association studies , 2013, KDD.
[2] Manfred Kayser,et al. Improving human forensics through advances in genetics, genomics and molecular biology , 2011, Nature Reviews Genetics.
[3] Ayellet V. Segrè,et al. Hundreds of variants clustered in genomic loci and biological pathways affect human height , 2010, Nature.
[4] M. Kayser,et al. Estimating human age from T-cell DNA rearrangements , 2010, Current Biology.
[5] Stephen E. Fienberg,et al. Privacy-Preserving Data Sharing for Genome-Wide Association Studies , 2012, J. Priv. Confidentiality.
[6] Jean-Pierre Hubaux,et al. Protecting and evaluating genomic privacy in medical tests and personalized medicine , 2013, WPES.
[7] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[8] Jean-Pierre Hubaux,et al. Addressing the concerns of the lacks family: quantification of kin genomic privacy , 2013, CCS.
[9] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[10] P. Bayer,et al. openSNP–A Crowdsourced Web Resource for Personal Genomics , 2014, PloS one.
[11] S. Nelson,et al. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.
[12] N. Cox,et al. On sharing quantitative trait GWAS results in an era of multiple-omics data and the limits of genomic privacy. , 2012, American journal of human genetics.
[13] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[14] Michael Hicks,et al. Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.
[15] Bradley Malin,et al. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems , 2004, J. Biomed. Informatics.
[16] ZVI GALIL,et al. Efficient algorithms for finding maximum matching in graphs , 1986, CSUR.
[17] Claude Bouchard,et al. A genome-wide approach accounting for body mass index identifies genetic variants influencing fasting glycemic traits and insulin resistance , 2012, Nature Genetics.
[18] Haixu Tang,et al. Learning your identity and disease from research papers: information leaks in genome wide association study , 2009, CCS.
[19] J. Gitschier,et al. Inferential genotyping of Y chromosomes in Latter-Day Saints founders and comparison to Utah samples in the HapMap project. , 2009, American journal of human genetics.
[20] Latanya Sweeney,et al. Identifying Participants in the Personal Genome Project by Name , 2013, ArXiv.
[21] Manfred Kayser,et al. IrisPlex: a sensitive DNA tool for accurate prediction of blue and brown eye colour in the absence of ancestry information. , 2011, Forensic science international. Genetics.
[22] Bo Peng,et al. To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data , 2011, ESORICS.
[23] Emiliano De Cristofaro,et al. The Chills and Thrills of Whole Genome Sequencing , 2013, Computer.
[24] Paul Suetens,et al. Modeling 3D Facial Shape from DNA , 2014, PLoS genetics.
[25] Murat Kantarcioglu,et al. A Cryptographic Approach to Securely Share and Query Genomic Sequences , 2008, IEEE Transactions on Information Technology in Biomedicine.
[26] Yaniv Erlich,et al. Routes for breaching and protecting genetic privacy , 2013, Nature Reviews Genetics.
[27] Adam Molyneaux,et al. Privacy-Preserving Processing of Raw Genomic Data , 2013, DPM/SETOP.
[28] Marleen de Bruijne,et al. A Genome-Wide Association Study Identifies Five Loci Influencing Facial Morphology in Europeans , 2012, PLoS genetics.
[29] Carmela Troncoso,et al. Perfect Matching Disclosure Attacks , 2008, Privacy Enhancing Technologies.
[30] Erika Check Hayden,et al. Privacy protections: The genome hacker , 2013, Nature.
[31] D. Clayton. On inferring presence of an individual in a mixture: a Bayesian approach , 2010, Biostatistics.
[32] Eran Halperin,et al. Identifying Personal Genomes by Surname Inference , 2013, Science.
[33] Emiliano De Cristofaro,et al. Countering GATTACA: efficient and secure testing of fully-sequenced human genomes , 2011, CCS '11.
[34] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[35] Peter Claes,et al. Toward DNA-based facial composites: preliminary results and validation. , 2014, Forensic science international. Genetics.
[36] Zhen Lin,et al. Genomic Research and Human Subject Privacy , 2004, Science.
[37] Huan Wang,et al. Predicting Human Age with Bloodstains by sjTREC Quantification , 2012, PloS one.