暂无分享,去创建一个
Yevgeniy Vorobeychik | Zhiyu Wan | Rajagopal Venkatesaramani | Bradley A. Malin | Zhiyu Wan | Yevgeniy Vorobeychik | Rajagopal Venkatesaramani | B. Malin
[1] Yaniv Erlich,et al. Routes for breaching and protecting genetic privacy , 2013, Nature Reviews Genetics.
[2] Murat Kantarcioglu,et al. Expanding Access to Large-Scale Genomic Data While Promoting Privacy: A Game Theoretic Approach. , 2017, American journal of human genetics.
[3] Xiaoqian Jiang,et al. Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks , 2017, J. Am. Medical Informatics Assoc..
[4] Peter Slavík. A Tight Analysis of the Greedy Algorithm for Set Cover , 1997, J. Algorithms.
[5] Hyunghoon Cho,et al. Privacy-preserving biomedical database queries with optimal privacy-utility trade-offs , 2020, bioRxiv.
[6] Erman Ayday,et al. Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons , 2020, Proc. Priv. Enhancing Technol..
[7] C. Bustamante,et al. Privacy Risks from Genomic Data-Sharing Beacons , 2015, American journal of human genetics.
[8] Murat Kantarcioglu,et al. Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services , 2017, BMC Medical Genomics.
[9] S. Nelson,et al. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.
[10] Eric D Green,et al. The Complexities of Genomic Identifiability , 2013, Science.
[11] Yang Zhang,et al. MBeacon: Privacy-Preserving Beacons for DNA Methylation Data , 2019, NDSS.
[12] L. Ohno-Machado,et al. Privacy challenges and research opportunities for genomic data sharing , 2020, Nature Genetics.
[13] Michael I. Jordan,et al. Genomic privacy and limits of individual detection in a pool , 2009, Nature Genetics.
[14] Erman Ayday,et al. Re-Identification of Individuals in Genomic Data-Sharing Beacons via Allele Inference , 2017, bioRxiv.
[15] B. Knoppers. International ethics harmonization and the global alliance for genomics and health , 2014, Genome Medicine.
[16] N. Lockhart,et al. NCI think tank concerning the identifiability of biospecimens and “omic” data , 2013, Genetics in Medicine.
[17] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[18] Seyed Yahya Anvar,et al. Variations in the Genome: The Mutation Detection 2015 Meeting on Detection, Genome Sequencing, and Interpretation , 2016, Human mutation.
[19] Md Momin Al Aziz,et al. Aftermath of bustamante attack on genomic beacon service , 2017, BMC Medical Genomics.
[20] Erman Ayday,et al. The Effect of Kinship in Re-identification Attacks Against Genomic Data Sharing Beacons , 2020, bioRxiv.