Re-identification of Individuals in Genomic Datasets Using Public Face Images
暂无分享,去创建一个
[1] Robert M. Goor,et al. Assessing and managing risk when sharing aggregate genetic variant data , 2011, Nature Reviews Genetics.
[2] P. Bayer,et al. openSNP–A Crowdsourced Web Resource for Personal Genomics , 2014, PloS one.
[3] Murat Kantarcioglu,et al. Expanding Access to Large-Scale Genomic Data While Promoting Privacy: A Game Theoretic Approach. , 2017, American journal of human genetics.
[4] Eun Yong Kang,et al. Identification of individuals by trait prediction using whole-genome sequencing data , 2017, Proceedings of the National Academy of Sciences.
[5] Stefan Winkler,et al. Deep Learning for Emotion Recognition on Small Datasets using Transfer Learning , 2015, ICMI.
[6] Lorien Y. Pratt,et al. Discriminability-Based Transfer between Neural Networks , 1992, NIPS.
[7] Michael Backes,et al. Membership Inference Against DNA Methylation Databases , 2020, 2020 IEEE European Symposium on Security and Privacy (EuroS&P).
[8] Jean-Pierre Hubaux,et al. De-anonymizing Genomic Databases Using Phenotypic Traits , 2015, Proc. Priv. Enhancing Technol..
[9] Mislav Grgic,et al. SCface – surveillance cameras face database , 2011, Multimedia Tools and Applications.
[10] Natalia Gimelshein,et al. PyTorch: An Imperative Style, High-Performance Deep Learning Library , 2019, NeurIPS.
[11] Xin Yuan,et al. A Comprehensive Database for Benchmarking Imaging Systems , 2020, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[12] Fadi Dornaika,et al. Age estimation in facial images through transfer learning , 2018, Machine Vision and Applications.
[13] Subramanian Ramanathan,et al. Exploring Transfer Learning Approaches for Head Pose Classification from Multi-view Surveillance Images , 2013, International Journal of Computer Vision.
[14] Qijun Zhao,et al. A transfer learning approach to cross-database facial expression recognition , 2015, 2015 International Conference on Biometrics (ICB).
[15] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[16] Edoardo M. Airoldi,et al. Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.
[17] Jian Sun,et al. A Practical Transfer Learning Algorithm for Face Verification , 2013, 2013 IEEE International Conference on Computer Vision.
[18] Blaz Meden,et al. k-Same-Net: k-Anonymity with Generative Deep Neural Networks for Face Deidentification † , 2018, Entropy.
[19] Xiaoqian Jiang,et al. Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks , 2017, J. Am. Medical Informatics Assoc..
[20] Volker Blanz,et al. Component-Based Face Recognition with 3D Morphable Models , 2003, 2004 Conference on Computer Vision and Pattern Recognition Workshop.
[21] E. Zerhouni,et al. Protecting Aggregate Genomic Data , 2008, Science.
[22] Li Ma,et al. Facial expression recognition based on transfer learning from deep convolutional networks , 2015, 2015 11th International Conference on Natural Computation (ICNC).
[23] M. Krawczak,et al. The more the merrier? How a few SNPs predict pigmentation phenotypes in the Northern German population , 2015, European Journal of Human Genetics.
[24] Murat Kantarcioglu,et al. Detecting the Presence of an Individual in Phenotypic Summary Data , 2018, AMIA.
[25] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[26] Murat Kantarcioglu,et al. Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services , 2017, BMC Medical Genomics.
[27] C. Bustamante,et al. Privacy Risks from Genomic Data-Sharing Beacons , 2015, American journal of human genetics.
[28] Xiaomo Liu,et al. Real-time Rumor Debunking on Twitter , 2015, CIKM.
[29] Josephine Sullivan,et al. One millisecond face alignment with an ensemble of regression trees , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[30] Yu Qiao,et al. Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks , 2016, IEEE Signal Processing Letters.
[31] Madeleine P. Ball,et al. Harvard Personal Genome Project: lessons from participatory public research , 2014, Genome Medicine.
[32] David J. Kriegman,et al. From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[33] Q. Lu,et al. Detecting Genome-wide Variants of Eurasian Facial Shape Differentiation: DNA based Face Prediction Tested in Forensic Scenario , 2016 .
[34] William J. Christmas,et al. Genetics of the human face: Identification of large-effect single gene variants , 2018, Proceedings of the National Academy of Sciences.
[35] Junjie Chen,et al. Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data , 2020, bioRxiv.
[36] Raymond Heatherly,et al. Process-Driven Data Privacy , 2015, CIKM.
[37] Ming Shao,et al. Kinship Verification through Transfer Learning , 2011, IJCAI.
[38] Andreas Rössler,et al. FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[39] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[40] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[41] Adam Schmidt,et al. The put face database , 2008 .