ShareTrace: an iterative message passing algorithm for efficient and effective disease risk assessment on an interaction graph
暂无分享,去创建一个
[1] BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond , 2020, ArXiv.
[2] Fang Liu,et al. Privacy Risk and Preservation in Contact Tracing of COVID‐19 , 2020 .
[3] X. Jin. Factor graphs and the Sum-Product Algorithm , 2002 .
[4] Carmela Troncoso,et al. Decentralized Privacy-Preserving Proximity Tracing , 2020, IEEE Data Eng. Bull..
[5] Eric Horvitz,et al. PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing , 2020, IEEE Data Eng. Bull..
[6] Jean-Pierre Hubaux,et al. Addressing the concerns of the lacks family: quantification of kin genomic privacy , 2013, CCS.
[7] D. Patrick,et al. High SARS-CoV-2 Attack Rate Following Exposure at a Choir Practice - Skagit County, Washington, March 2020. , 2020, MMWR. Morbidity and mortality weekly report.
[8] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[9] Faramarz Fekri,et al. Results on the Improved Decoding Algorithm for Low-Density Parity-Check Codes Over the Binary Erasure Channel , 2007, IEEE Transactions on Information Theory.
[10] Dawn Song,et al. Epione: Lightweight Contact Tracing with Strong Privacy , 2020, IEEE Data Eng. Bull..
[11] Erman Ayday,et al. Tracking and Controlling the Spread of a Virus in a Privacy-Preserving Way , 2020, ArXiv.
[12] Björn Scheuermann,et al. Privacy-Preserving Contact Tracing of COVID-19 Patients , 2020, IACR Cryptol. ePrint Arch..
[13] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[14] M. Jorge Cardoso,et al. Real-time tracking of self-reported symptoms to predict potential COVID-19 , 2020, Nature Medicine.
[15] Ramesh Raskar,et al. Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic , 2020, ArXiv.
[16] Erman Ayday,et al. Iterative Trust and Reputation Management Using Belief Propagation , 2012, IEEE Transactions on Dependable and Secure Computing.
[17] Erman Ayday,et al. An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.
[18] Faramarz Fekri,et al. Results on Punctured Low-Density Parity-Check Codes and Improved Iterative Decoding Techniques , 2007, IEEE Transactions on Information Theory.