Статті в журналах з теми "Privacy attacks on genomic data"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Privacy attacks on genomic data".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Ayoz, Kerem, Erman Ayday, and A. Ercument Cicek. "Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons." Proceedings on Privacy Enhancing Technologies 2021, no. 3 (April 27, 2021): 28–48. http://dx.doi.org/10.2478/popets-2021-0036.
Повний текст джерелаAlmadhoun, Nour, Erman Ayday, and Özgür Ulusoy. "Inference attacks against differentially private query results from genomic datasets including dependent tuples." Bioinformatics 36, Supplement_1 (July 1, 2020): i136—i145. http://dx.doi.org/10.1093/bioinformatics/btaa475.
Повний текст джерелаMohammed Yakubu, Abukari, and Yi-Ping Phoebe Chen. "Ensuring privacy and security of genomic data and functionalities." Briefings in Bioinformatics 21, no. 2 (February 12, 2019): 511–26. http://dx.doi.org/10.1093/bib/bbz013.
Повний текст джерелаRaisaro, Jean Louis, Florian Tramèr, Zhanglong Ji, Diyue Bu, Yongan Zhao, Knox Carey, David Lloyd, et al. "Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks." Journal of the American Medical Informatics Association 24, no. 4 (February 20, 2017): 799–805. http://dx.doi.org/10.1093/jamia/ocw167.
Повний текст джерелаAziz, Md Momin Al, Shahin Kamali, Noman Mohammed, and Xiaoqian Jiang. "Online Algorithm for Differentially Private Genome-wide Association Studies." ACM Transactions on Computing for Healthcare 2, no. 2 (March 2021): 1–27. http://dx.doi.org/10.1145/3431504.
Повний текст джерелаÖksüz, Abdullah Çağlar, Erman Ayday, and Uğur Güdükbay. "Privacy-preserving and robust watermarking on sequential genome data using belief propagation and local differential privacy." Bioinformatics 37, no. 17 (February 25, 2021): 2668–74. http://dx.doi.org/10.1093/bioinformatics/btab128.
Повний текст джерелаAyoz, Kerem, Miray Aysen, Erman Ayday, and A. Ercument Cicek. "The effect of kinship in re-identification attacks against genomic data sharing beacons." Bioinformatics 36, Supplement_2 (December 2020): i903—i910. http://dx.doi.org/10.1093/bioinformatics/btaa821.
Повний текст джерелаHumbert, Mathias, Kévin Huguenin, Joachim Hugonot, Erman Ayday, and Jean-Pierre Hubaux. "De-anonymizing Genomic Databases Using Phenotypic Traits." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (June 1, 2015): 99–114. http://dx.doi.org/10.1515/popets-2015-0020.
Повний текст джерелаAsgiani, Piping, Chriswardani Suryawati, and Farid Agushybana. "A literature review: Security Aspects in the Implementation of Electronic Medical Records in Hospitals." MEDIA ILMU KESEHATAN 10, no. 2 (January 29, 2022): 161–66. http://dx.doi.org/10.30989/mik.v10i2.561.
Повний текст джерелаNarayan, Ashwin. "Current regulations will not protect patient privacy in the age of machine learning." MIT Science Policy Review 1 (August 20, 2020): 3–9. http://dx.doi.org/10.38105/spr.ax4o7jkyr3.
Повний текст джерелаRen, Xujie, Tao Shang, Yatong Jiang, and Jianwei Liu. "Gene Sequence Clustering Based on the Profile Hidden Markov Model with Differential Identifiability." Security and Communication Networks 2021 (December 24, 2021): 1–9. http://dx.doi.org/10.1155/2021/8296417.
Повний текст джерелаHe, Muqing, Deqing Zou, Weizhong Qiang, Shouhuai Xu, Wenbo Wu, and Hai Jin. "Quantifying Privacy Risks for Continuous Trait Data." Applied Sciences 12, no. 20 (October 20, 2022): 10586. http://dx.doi.org/10.3390/app122010586.
Повний текст джерелаMott, Richard, Christian Fischer, Pjotr Prins, and Robert William Davies. "Private Genomes and Public SNPs: Homomorphic Encryption of Genotypes and Phenotypes for Shared Quantitative Genetics." Genetics 215, no. 2 (April 23, 2020): 359–72. http://dx.doi.org/10.1534/genetics.120.303153.
Повний текст джерелаAyday, Erman, and Mathias Humbert. "Inference Attacks against Kin Genomic Privacy." IEEE Security & Privacy 15, no. 5 (2017): 29–37. http://dx.doi.org/10.1109/msp.2017.3681052.
Повний текст джерелаSchwab, Abraham P., Hung S. Luu, Jason Wang, and Jason Y. Park. "Genomic Privacy." Clinical Chemistry 64, no. 12 (December 1, 2018): 1696–703. http://dx.doi.org/10.1373/clinchem.2018.289512.
Повний текст джерелаPascoal, Túlio, Jérémie Decouchant, Antoine Boutet, and Marcus Völp. "I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 437–54. http://dx.doi.org/10.56553/popets-2023-0026.
Повний текст джерелаMadsen, Wayne. "New US bill attacks data privacy." Computer Fraud & Security Bulletin 1991, no. 5 (May 1991): 4. http://dx.doi.org/10.1016/0142-0496(91)90234-v.
Повний текст джерелаShaukat, Ayesha, Adeel Anjum, Saif U. R. Malik, Munam Ali Shah, and Carsten Maple. "A Novel Privacy Paradigm for Improving Serial Data Privacy." Sensors 22, no. 7 (April 6, 2022): 2811. http://dx.doi.org/10.3390/s22072811.
Повний текст джерелаVijayalakshmi, R., and N. Duraipandian. "Service oriented architecture and privacy preserving mashup of healthcare data." International Journal of Engineering & Technology 3, no. 3 (July 9, 2014): 337. http://dx.doi.org/10.14419/ijet.v3i3.2139.
Повний текст джерелаShringarpure, Suyash S., and Carlos D. Bustamante. "Privacy Risks from Genomic Data-Sharing Beacons." American Journal of Human Genetics 97, no. 5 (November 2015): 631–46. http://dx.doi.org/10.1016/j.ajhg.2015.09.010.
Повний текст джерелаClaerhout, B., and G. J. E. DeMoor. "Privacy protection for clinical and genomic data." International Journal of Medical Informatics 74, no. 2-4 (March 2005): 257–65. http://dx.doi.org/10.1016/j.ijmedinf.2004.03.008.
Повний текст джерелаWong, Raymond Chi-Wing, Ada Wai-Chee Fu, Ke Wang, and Jian Pei. "Anonymization-based attacks in privacy-preserving data publishing." ACM Transactions on Database Systems 34, no. 2 (June 2009): 1–46. http://dx.doi.org/10.1145/1538909.1538910.
Повний текст джерелаPark, Young-Hoon, Yejin Kim, and Junho Shim. "Blockchain-Based Privacy-Preserving System for Genomic Data Management Using Local Differential Privacy." Electronics 10, no. 23 (December 3, 2021): 3019. http://dx.doi.org/10.3390/electronics10233019.
Повний текст джерелаLi, Bing, Hong Zhu, and Meiyi Xie. "Releasing Differentially Private Trajectories with Optimized Data Utility." Applied Sciences 12, no. 5 (February 25, 2022): 2406. http://dx.doi.org/10.3390/app12052406.
Повний текст джерелаVillanueva, Angela G., Robert Cook-Deegan, Jill O. Robinson, Amy L. McGuire, and Mary A. Majumder. "Genomic Data-Sharing Practices." Journal of Law, Medicine & Ethics 47, no. 1 (2019): 31–40. http://dx.doi.org/10.1177/1073110519840482.
Повний текст джерелаHenrikson, Nora B., Stephanie M. Fullerton, Aaron Scrol, Lorella Palazzo, Marlaine Figueroa Gray, and Paula R. Blasi. "“Not Private at All:” Comparative Perspectives on Privacy of Genomic Data, Family History Data, Health-Related Data, and Other Personal Data." OBM Genetics 06, no. 04 (October 31, 2022): 1–17. http://dx.doi.org/10.21926/obm.genet.2204167.
Повний текст джерелаSowmyarani C. N., Veena Gadad та Dayananda P. "(p+, α, t)-Anonymity Technique Against Privacy Attacks". International Journal of Information Security and Privacy 15, № 2 (квітень 2021): 68–86. http://dx.doi.org/10.4018/ijisp.2021040104.
Повний текст джерелаAziz, Md Momin Al, Md Nazmus Sadat, Dima Alhadidi, Shuang Wang, Xiaoqian Jiang, Cheryl L. Brown, and Noman Mohammed. "Privacy-preserving techniques of genomic data—a survey." Briefings in Bioinformatics 20, no. 3 (November 7, 2017): 887–95. http://dx.doi.org/10.1093/bib/bbx139.
Повний текст джерелаAkgün, Mete, A. Osman Bayrak, Bugra Ozer, and M. Şamil Sağıroğlu. "Privacy preserving processing of genomic data: A survey." Journal of Biomedical Informatics 56 (August 2015): 103–11. http://dx.doi.org/10.1016/j.jbi.2015.05.022.
Повний текст джерелаAmin, Zenab, Adeel Anjum, Abid Khan, Awais Ahmad, and Gwanggil Jeon. "Preserving Privacy of High-Dimensional Data by l-Diverse Constrained Slicing." Electronics 11, no. 8 (April 15, 2022): 1257. http://dx.doi.org/10.3390/electronics11081257.
Повний текст джерелаLi, Hongtao, Jianfeng Ma, and Shuai Fu. "Analyzing mechanism-based attacks in privacy-preserving data publishing." Optik 124, no. 24 (December 2013): 6939–45. http://dx.doi.org/10.1016/j.ijleo.2013.05.157.
Повний текст джерелаLi, Xin. "Privacy Preserving Clustering for Distributed Homogeneous Gene Expression Data Sets." International Journal of Computational Models and Algorithms in Medicine 1, no. 3 (July 2010): 31–54. http://dx.doi.org/10.4018/jcmam.2010070102.
Повний текст джерелаHuang, Mingfu, Rushit Dave, Nyle Siddiqui, and Naeem Seliya. "Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles." International Journal of Computer Science and Information Technology 13, no. 5 (October 31, 2021): 01–19. http://dx.doi.org/10.5121/ijcsit.2021.13501.
Повний текст джерелаZhu, Ye, Yongjian Fu, and Huirong Fu. "Preserving Privacy in Time Series Data Mining." International Journal of Data Warehousing and Mining 7, no. 4 (October 2011): 64–85. http://dx.doi.org/10.4018/jdwm.2011100104.
Повний текст джерелаZheng, Zhirun, Zhetao Li, Jie Li, Hongbo Jiang, Tong Li, and Bin Guo. "Utility-aware and Privacy-preserving Trajectory Synthesis Model that Resists Social Relationship Privacy Attacks." ACM Transactions on Intelligent Systems and Technology 13, no. 3 (June 30, 2022): 1–28. http://dx.doi.org/10.1145/3495160.
Повний текст джерелаJamjoom, Mona, Hussein Abulkasim, and Safia Abbas. "Lightweight Authenticated Privacy-Preserving Secure Framework for the Internet of Vehicles." Security and Communication Networks 2022 (September 9, 2022): 1–11. http://dx.doi.org/10.1155/2022/6573060.
Повний текст джерелаAkgün, Mete, Nico Pfeifer, and Oliver Kohlbacher. "Efficient privacy-preserving whole-genome variant queries." Bioinformatics 38, no. 8 (February 12, 2022): 2202–10. http://dx.doi.org/10.1093/bioinformatics/btac070.
Повний текст джерелаTelenti, Amalio, Erman Ayday, and Jean Pierre Hubaux. "On genomics, kin, and privacy." F1000Research 3 (March 31, 2014): 80. http://dx.doi.org/10.12688/f1000research.3817.1.
Повний текст джерелаLi, Songyuan, Hui Tian, Hong Shen, and Yingpeng Sang. "Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion." ISPRS International Journal of Geo-Information 10, no. 2 (February 16, 2021): 78. http://dx.doi.org/10.3390/ijgi10020078.
Повний текст джерелаLi, Dengke, Han Zhou, and Wen Yang. "Privacy-Preserving Consensus over a Distributed Network against Eavesdropping Attacks." Electronics 8, no. 9 (August 30, 2019): 966. http://dx.doi.org/10.3390/electronics8090966.
Повний текст джерелаSramka, Michal. "Data mining as a tool in privacy-preserving data publishing." Tatra Mountains Mathematical Publications 45, no. 1 (December 1, 2010): 151–59. http://dx.doi.org/10.2478/v10127-010-0011-z.
Повний текст джерелаShokri, Reza. "Privacy Games: Optimal User-Centric Data Obfuscation." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (June 1, 2015): 299–315. http://dx.doi.org/10.1515/popets-2015-0024.
Повний текст джерелаPrasad, Vivek Kumar, Debabrata Dansana, Brojo Kishore Mishra, and Madhuri Bhavsar. "Intensify Cloud Security and Privacy Against Phishing Attacks." ECS Transactions 107, no. 1 (April 24, 2022): 1387–98. http://dx.doi.org/10.1149/10701.1387ecst.
Повний текст джерелаMittos, Alexandros, Bradley Malin, and Emiliano De Cristofaro. "Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (January 1, 2019): 87–107. http://dx.doi.org/10.2478/popets-2019-0006.
Повний текст джерелаBaker, Dixie B., Bartha M. Knoppers, Mark Phillips, David van Enckevort, Petra Kaufmann, Hanns Lochmuller, and Domenica Taruscio. "Privacy-Preserving Linkage of Genomic and Clinical Data Sets." IEEE/ACM Transactions on Computational Biology and Bioinformatics 16, no. 4 (July 1, 2019): 1342–48. http://dx.doi.org/10.1109/tcbb.2018.2855125.
Повний текст джерелаBonomi, Luca, Yingxiang Huang, and Lucila Ohno-Machado. "Privacy challenges and research opportunities for genomic data sharing." Nature Genetics 52, no. 7 (June 29, 2020): 646–54. http://dx.doi.org/10.1038/s41588-020-0651-0.
Повний текст джерелаAsharov, Gilad, Shai Halevi, Yehuda Lindell, and Tal Rabin. "Privacy-Preserving Search of Similar Patients in Genomic Data." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 104–24. http://dx.doi.org/10.1515/popets-2018-0034.
Повний текст джерелаTao, Zhiheng. "The Protection of Data Privacy of College Students." MATEC Web of Conferences 363 (2022): 01031. http://dx.doi.org/10.1051/matecconf/202236301031.
Повний текст джерелаZhang, Yinghui, Jiangfan Zhao, Dong Zheng, Kaixin Deng, Fangyuan Ren, Xiaokun Zheng, and Jiangang Shu. "Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing." Sensors 18, no. 8 (August 13, 2018): 2659. http://dx.doi.org/10.3390/s18082659.
Повний текст джерелаGao, Ji, Sanjam Garg, Mohammad Mahmoody, and Prashant Nalini Vasudevan. "Deletion inference, reconstruction, and compliance in machine (un)learning." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (July 2022): 415–36. http://dx.doi.org/10.56553/popets-2022-0079.
Повний текст джерела