Journal articles on the topic 'Privacy attacks on genomic data'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Privacy attacks on genomic data.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ayoz, Kerem, Erman Ayday, and A. Ercument Cicek. "Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons." Proceedings on Privacy Enhancing Technologies 2021, no. 3 (April 27, 2021): 28–48. http://dx.doi.org/10.2478/popets-2021-0036.
Full textAlmadhoun, Nour, Erman Ayday, and Özgür Ulusoy. "Inference attacks against differentially private query results from genomic datasets including dependent tuples." Bioinformatics 36, Supplement_1 (July 1, 2020): i136—i145. http://dx.doi.org/10.1093/bioinformatics/btaa475.
Full textMohammed Yakubu, Abukari, and Yi-Ping Phoebe Chen. "Ensuring privacy and security of genomic data and functionalities." Briefings in Bioinformatics 21, no. 2 (February 12, 2019): 511–26. http://dx.doi.org/10.1093/bib/bbz013.
Full textRaisaro, Jean Louis, Florian Tramèr, Zhanglong Ji, Diyue Bu, Yongan Zhao, Knox Carey, David Lloyd, et al. "Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks." Journal of the American Medical Informatics Association 24, no. 4 (February 20, 2017): 799–805. http://dx.doi.org/10.1093/jamia/ocw167.
Full textAziz, Md Momin Al, Shahin Kamali, Noman Mohammed, and Xiaoqian Jiang. "Online Algorithm for Differentially Private Genome-wide Association Studies." ACM Transactions on Computing for Healthcare 2, no. 2 (March 2021): 1–27. http://dx.doi.org/10.1145/3431504.
Full textÖksüz, Abdullah Çağlar, Erman Ayday, and Uğur Güdükbay. "Privacy-preserving and robust watermarking on sequential genome data using belief propagation and local differential privacy." Bioinformatics 37, no. 17 (February 25, 2021): 2668–74. http://dx.doi.org/10.1093/bioinformatics/btab128.
Full textAyoz, Kerem, Miray Aysen, Erman Ayday, and A. Ercument Cicek. "The effect of kinship in re-identification attacks against genomic data sharing beacons." Bioinformatics 36, Supplement_2 (December 2020): i903—i910. http://dx.doi.org/10.1093/bioinformatics/btaa821.
Full textHumbert, Mathias, Kévin Huguenin, Joachim Hugonot, Erman Ayday, and Jean-Pierre Hubaux. "De-anonymizing Genomic Databases Using Phenotypic Traits." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (June 1, 2015): 99–114. http://dx.doi.org/10.1515/popets-2015-0020.
Full textAsgiani, Piping, Chriswardani Suryawati, and Farid Agushybana. "A literature review: Security Aspects in the Implementation of Electronic Medical Records in Hospitals." MEDIA ILMU KESEHATAN 10, no. 2 (January 29, 2022): 161–66. http://dx.doi.org/10.30989/mik.v10i2.561.
Full textNarayan, Ashwin. "Current regulations will not protect patient privacy in the age of machine learning." MIT Science Policy Review 1 (August 20, 2020): 3–9. http://dx.doi.org/10.38105/spr.ax4o7jkyr3.
Full textRen, Xujie, Tao Shang, Yatong Jiang, and Jianwei Liu. "Gene Sequence Clustering Based on the Profile Hidden Markov Model with Differential Identifiability." Security and Communication Networks 2021 (December 24, 2021): 1–9. http://dx.doi.org/10.1155/2021/8296417.
Full textHe, Muqing, Deqing Zou, Weizhong Qiang, Shouhuai Xu, Wenbo Wu, and Hai Jin. "Quantifying Privacy Risks for Continuous Trait Data." Applied Sciences 12, no. 20 (October 20, 2022): 10586. http://dx.doi.org/10.3390/app122010586.
Full textMott, Richard, Christian Fischer, Pjotr Prins, and Robert William Davies. "Private Genomes and Public SNPs: Homomorphic Encryption of Genotypes and Phenotypes for Shared Quantitative Genetics." Genetics 215, no. 2 (April 23, 2020): 359–72. http://dx.doi.org/10.1534/genetics.120.303153.
Full textAyday, Erman, and Mathias Humbert. "Inference Attacks against Kin Genomic Privacy." IEEE Security & Privacy 15, no. 5 (2017): 29–37. http://dx.doi.org/10.1109/msp.2017.3681052.
Full textSchwab, Abraham P., Hung S. Luu, Jason Wang, and Jason Y. Park. "Genomic Privacy." Clinical Chemistry 64, no. 12 (December 1, 2018): 1696–703. http://dx.doi.org/10.1373/clinchem.2018.289512.
Full textPascoal, Túlio, Jérémie Decouchant, Antoine Boutet, and Marcus Völp. "I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 437–54. http://dx.doi.org/10.56553/popets-2023-0026.
Full textMadsen, Wayne. "New US bill attacks data privacy." Computer Fraud & Security Bulletin 1991, no. 5 (May 1991): 4. http://dx.doi.org/10.1016/0142-0496(91)90234-v.
Full textShaukat, Ayesha, Adeel Anjum, Saif U. R. Malik, Munam Ali Shah, and Carsten Maple. "A Novel Privacy Paradigm for Improving Serial Data Privacy." Sensors 22, no. 7 (April 6, 2022): 2811. http://dx.doi.org/10.3390/s22072811.
Full textVijayalakshmi, R., and N. Duraipandian. "Service oriented architecture and privacy preserving mashup of healthcare data." International Journal of Engineering & Technology 3, no. 3 (July 9, 2014): 337. http://dx.doi.org/10.14419/ijet.v3i3.2139.
Full textShringarpure, Suyash S., and Carlos D. Bustamante. "Privacy Risks from Genomic Data-Sharing Beacons." American Journal of Human Genetics 97, no. 5 (November 2015): 631–46. http://dx.doi.org/10.1016/j.ajhg.2015.09.010.
Full textClaerhout, B., and G. J. E. DeMoor. "Privacy protection for clinical and genomic data." International Journal of Medical Informatics 74, no. 2-4 (March 2005): 257–65. http://dx.doi.org/10.1016/j.ijmedinf.2004.03.008.
Full textWong, Raymond Chi-Wing, Ada Wai-Chee Fu, Ke Wang, and Jian Pei. "Anonymization-based attacks in privacy-preserving data publishing." ACM Transactions on Database Systems 34, no. 2 (June 2009): 1–46. http://dx.doi.org/10.1145/1538909.1538910.
Full textPark, Young-Hoon, Yejin Kim, and Junho Shim. "Blockchain-Based Privacy-Preserving System for Genomic Data Management Using Local Differential Privacy." Electronics 10, no. 23 (December 3, 2021): 3019. http://dx.doi.org/10.3390/electronics10233019.
Full textLi, Bing, Hong Zhu, and Meiyi Xie. "Releasing Differentially Private Trajectories with Optimized Data Utility." Applied Sciences 12, no. 5 (February 25, 2022): 2406. http://dx.doi.org/10.3390/app12052406.
Full textVillanueva, Angela G., Robert Cook-Deegan, Jill O. Robinson, Amy L. McGuire, and Mary A. Majumder. "Genomic Data-Sharing Practices." Journal of Law, Medicine & Ethics 47, no. 1 (2019): 31–40. http://dx.doi.org/10.1177/1073110519840482.
Full textHenrikson, Nora B., Stephanie M. Fullerton, Aaron Scrol, Lorella Palazzo, Marlaine Figueroa Gray, and Paula R. Blasi. "“Not Private at All:” Comparative Perspectives on Privacy of Genomic Data, Family History Data, Health-Related Data, and Other Personal Data." OBM Genetics 06, no. 04 (October 31, 2022): 1–17. http://dx.doi.org/10.21926/obm.genet.2204167.
Full textSowmyarani C. N., Veena Gadad, and Dayananda P. "(p+, α, t)-Anonymity Technique Against Privacy Attacks." International Journal of Information Security and Privacy 15, no. 2 (April 2021): 68–86. http://dx.doi.org/10.4018/ijisp.2021040104.
Full textAziz, Md Momin Al, Md Nazmus Sadat, Dima Alhadidi, Shuang Wang, Xiaoqian Jiang, Cheryl L. Brown, and Noman Mohammed. "Privacy-preserving techniques of genomic data—a survey." Briefings in Bioinformatics 20, no. 3 (November 7, 2017): 887–95. http://dx.doi.org/10.1093/bib/bbx139.
Full textAkgün, Mete, A. Osman Bayrak, Bugra Ozer, and M. Şamil Sağıroğlu. "Privacy preserving processing of genomic data: A survey." Journal of Biomedical Informatics 56 (August 2015): 103–11. http://dx.doi.org/10.1016/j.jbi.2015.05.022.
Full textAmin, Zenab, Adeel Anjum, Abid Khan, Awais Ahmad, and Gwanggil Jeon. "Preserving Privacy of High-Dimensional Data by l-Diverse Constrained Slicing." Electronics 11, no. 8 (April 15, 2022): 1257. http://dx.doi.org/10.3390/electronics11081257.
Full textLi, Hongtao, Jianfeng Ma, and Shuai Fu. "Analyzing mechanism-based attacks in privacy-preserving data publishing." Optik 124, no. 24 (December 2013): 6939–45. http://dx.doi.org/10.1016/j.ijleo.2013.05.157.
Full textLi, Xin. "Privacy Preserving Clustering for Distributed Homogeneous Gene Expression Data Sets." International Journal of Computational Models and Algorithms in Medicine 1, no. 3 (July 2010): 31–54. http://dx.doi.org/10.4018/jcmam.2010070102.
Full textHuang, Mingfu, Rushit Dave, Nyle Siddiqui, and Naeem Seliya. "Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles." International Journal of Computer Science and Information Technology 13, no. 5 (October 31, 2021): 01–19. http://dx.doi.org/10.5121/ijcsit.2021.13501.
Full textZhu, Ye, Yongjian Fu, and Huirong Fu. "Preserving Privacy in Time Series Data Mining." International Journal of Data Warehousing and Mining 7, no. 4 (October 2011): 64–85. http://dx.doi.org/10.4018/jdwm.2011100104.
Full textZheng, Zhirun, Zhetao Li, Jie Li, Hongbo Jiang, Tong Li, and Bin Guo. "Utility-aware and Privacy-preserving Trajectory Synthesis Model that Resists Social Relationship Privacy Attacks." ACM Transactions on Intelligent Systems and Technology 13, no. 3 (June 30, 2022): 1–28. http://dx.doi.org/10.1145/3495160.
Full textJamjoom, Mona, Hussein Abulkasim, and Safia Abbas. "Lightweight Authenticated Privacy-Preserving Secure Framework for the Internet of Vehicles." Security and Communication Networks 2022 (September 9, 2022): 1–11. http://dx.doi.org/10.1155/2022/6573060.
Full textAkgün, Mete, Nico Pfeifer, and Oliver Kohlbacher. "Efficient privacy-preserving whole-genome variant queries." Bioinformatics 38, no. 8 (February 12, 2022): 2202–10. http://dx.doi.org/10.1093/bioinformatics/btac070.
Full textTelenti, Amalio, Erman Ayday, and Jean Pierre Hubaux. "On genomics, kin, and privacy." F1000Research 3 (March 31, 2014): 80. http://dx.doi.org/10.12688/f1000research.3817.1.
Full textLi, Songyuan, Hui Tian, Hong Shen, and Yingpeng Sang. "Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion." ISPRS International Journal of Geo-Information 10, no. 2 (February 16, 2021): 78. http://dx.doi.org/10.3390/ijgi10020078.
Full textLi, Dengke, Han Zhou, and Wen Yang. "Privacy-Preserving Consensus over a Distributed Network against Eavesdropping Attacks." Electronics 8, no. 9 (August 30, 2019): 966. http://dx.doi.org/10.3390/electronics8090966.
Full textSramka, Michal. "Data mining as a tool in privacy-preserving data publishing." Tatra Mountains Mathematical Publications 45, no. 1 (December 1, 2010): 151–59. http://dx.doi.org/10.2478/v10127-010-0011-z.
Full textShokri, Reza. "Privacy Games: Optimal User-Centric Data Obfuscation." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (June 1, 2015): 299–315. http://dx.doi.org/10.1515/popets-2015-0024.
Full textPrasad, Vivek Kumar, Debabrata Dansana, Brojo Kishore Mishra, and Madhuri Bhavsar. "Intensify Cloud Security and Privacy Against Phishing Attacks." ECS Transactions 107, no. 1 (April 24, 2022): 1387–98. http://dx.doi.org/10.1149/10701.1387ecst.
Full textMittos, Alexandros, Bradley Malin, and Emiliano De Cristofaro. "Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (January 1, 2019): 87–107. http://dx.doi.org/10.2478/popets-2019-0006.
Full textBaker, Dixie B., Bartha M. Knoppers, Mark Phillips, David van Enckevort, Petra Kaufmann, Hanns Lochmuller, and Domenica Taruscio. "Privacy-Preserving Linkage of Genomic and Clinical Data Sets." IEEE/ACM Transactions on Computational Biology and Bioinformatics 16, no. 4 (July 1, 2019): 1342–48. http://dx.doi.org/10.1109/tcbb.2018.2855125.
Full textBonomi, Luca, Yingxiang Huang, and Lucila Ohno-Machado. "Privacy challenges and research opportunities for genomic data sharing." Nature Genetics 52, no. 7 (June 29, 2020): 646–54. http://dx.doi.org/10.1038/s41588-020-0651-0.
Full textAsharov, Gilad, Shai Halevi, Yehuda Lindell, and Tal Rabin. "Privacy-Preserving Search of Similar Patients in Genomic Data." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 104–24. http://dx.doi.org/10.1515/popets-2018-0034.
Full textTao, Zhiheng. "The Protection of Data Privacy of College Students." MATEC Web of Conferences 363 (2022): 01031. http://dx.doi.org/10.1051/matecconf/202236301031.
Full textZhang, Yinghui, Jiangfan Zhao, Dong Zheng, Kaixin Deng, Fangyuan Ren, Xiaokun Zheng, and Jiangang Shu. "Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing." Sensors 18, no. 8 (August 13, 2018): 2659. http://dx.doi.org/10.3390/s18082659.
Full textGao, Ji, Sanjam Garg, Mohammad Mahmoody, and Prashant Nalini Vasudevan. "Deletion inference, reconstruction, and compliance in machine (un)learning." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (July 2022): 415–36. http://dx.doi.org/10.56553/popets-2022-0079.
Full text