-
1
-
-
84889030507
-
-
Visited on 9-Aug-2013
-
http://opensnp.org/. Visited on 9-Aug-2013.
-
-
-
-
2
-
-
84889050426
-
-
Visited on 9-Aug-2013
-
https://www.23andme.com/welcome/. Visited on 9-Aug-2013.
-
-
-
-
3
-
-
84889014549
-
-
Visited on 9-Aug-2013
-
http://www.nytimes.com/2013/03/24/opinion/sunday/the-immortal-life-of- henrietta-lacks-the-sequel.html?pagewanted=all. Visited on 9-Aug-2013.
-
-
-
-
4
-
-
84889035887
-
-
Visited on 9-Aug-2013
-
http://www.ncbi.nlm.nih.gov/projects/SNP/. Visited on 9-Aug-2013.
-
-
-
-
5
-
-
84888991649
-
-
Visited on 9-Aug-2013
-
http://www.eupedia.com/genetics/medical-dna-test.shtml. Visited on 9-Aug-2013.
-
-
-
-
6
-
-
84888988875
-
-
Visited on 9-Aug-2013
-
http://www.patientslikeme.com/. Visited on 9-Aug-2013.
-
-
-
-
7
-
-
84888995264
-
-
http://lca.epfl.ch/projects/genomic-privacy/.
-
-
-
-
10
-
-
84889074771
-
BPRS: Belief propagation based iterative recommender system
-
E. Ayday, A. Einolghozati, and F. Fekri. BPRS: Belief propagation based iterative recommender system. IEEE ISIT, 2012.
-
(2012)
IEEE ISIT
-
-
Ayday, E.1
Einolghozati, A.2
Fekri, F.3
-
12
-
-
84867947052
-
BP-P2P: A belief propagation-based trust and reputation management for P2P networks
-
E. Ayday and F. Fekri. BP-P2P: A belief propagation-based trust and reputation management for P2P networks. SECON, 2012.
-
(2012)
SECON
-
-
Ayday, E.1
Fekri, F.2
-
13
-
-
84888988337
-
Privacy-preserving processing of raw genomic data
-
E. Ayday, J. L. Raisaro, U. Hengartner, A. Molyneaux, and J. P. Hubaux. Privacy-preserving processing of raw genomic data. DPM 2013, 2013.
-
(2013)
DPM 2013
-
-
Ayday, E.1
Raisaro, J.L.2
Hengartner, U.3
Molyneaux, A.4
Hubaux, J.P.5
-
14
-
-
85025126688
-
Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data
-
E. Ayday, J. L. Raisaro, P. J. McLaren, J. Fellay, and J. P. Hubaux. Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data. HealthTech, 2013.
-
(2013)
HealthTech
-
-
Ayday, E.1
Raisaro, J.L.2
McLaren, P.J.3
Fellay, J.4
Hubaux, J.P.5
-
15
-
-
80755143980
-
Countering GATTACA: Efficient and secure testing of fully-sequenced human genomes
-
P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti, and G. Tsudik. Countering GATTACA: Efficient and secure testing of fully-sequenced human genomes. CCS, 2011.
-
(2011)
CCS
-
-
Baldi, P.1
Baronio, R.2
De Cristofaro, E.3
Gasti, P.4
Tsudik, G.5
-
16
-
-
80755173767
-
Secure outsourcing of DNA searching via finite automata
-
M. Blanton and M. Aliasgari. Secure outsourcing of DNA searching via finite automata. DBSec, 2010.
-
(2010)
DBSec
-
-
Blanton, M.1
Aliasgari, M.2
-
18
-
-
33748317890
-
In silico method for inferring genotypes in pedigrees
-
J. T. Burdick, W.-M. Chen, G. R. Abecasis, and V. G. Cheung. In silico method for inferring genotypes in pedigrees. Nature genetics, 38(9):1002-1004, 2006.
-
(2006)
Nature Genetics
, vol.38
, Issue.9
, pp. 1002-1004
-
-
Burdick, J.T.1
Chen, W.-M.2
Abecasis, G.R.3
Cheung, V.G.4
-
19
-
-
66749192419
-
My sister's keeper?: Genomic research and the identifiability of siblings
-
C. A. Cassa, B. Schmidt, I. S. Kohane, and K. D. Mandl. My sister's keeper?: genomic research and the identifiability of siblings. BMC Medical Genomics, 1(1):32, 2008.
-
(2008)
BMC Medical Genomics
, vol.1
, Issue.1
, pp. 32
-
-
Cassa, C.A.1
Schmidt, B.2
Kohane, I.S.3
Mandl, K.D.4
-
20
-
-
84888996329
-
Near optimum reduced-complexity decoding algorithm for LDPC codes
-
J. Chen, A. Dholakia, E.Eleflhetiou, M. Fossotier, and X.-Y. Hu. Near optimum reduced-complexity decoding algorithm for LDPC codes. IEEE ISIT, 2002.
-
(2002)
IEEE ISIT
-
-
Chen, J.1
Dholakia, A.2
Eleflhetiou, E.3
Fossotier, M.4
Hu, X.-Y.5
-
21
-
-
84895115809
-
Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds
-
Y. Chen, B. Peng, X. Wang, and H. Tang. Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds. NDSS, 2012.
-
(2012)
NDSS
-
-
Chen, Y.1
Peng, B.2
Wang, X.3
Tang, H.4
-
22
-
-
84957800033
-
Towards measuring anonymity
-
Springer
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In Privacy Enhancing Technologies, pages 54-68. Springer, 2003.
-
(2003)
Privacy Enhancing Technologies
, pp. 54-68
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
23
-
-
74949138753
-
Human genome sequencing using unchained base reads on self-assembling dna nanoarrays
-
R. Drmanac, A. B. Sparks, M. J. Callow, A. L. Halpern, N. L. Burns, B. G. Kermani, P. Carnevali, I. Nazarenko, G. B. Nilsen, G. Yeung, et al. Human genome sequencing using unchained base reads on self-assembling dna nanoarrays. Science, 327(5961):78-81, 2010.
-
(2010)
Science
, vol.327
, Issue.5961
, pp. 78-81
-
-
Drmanac, R.1
Sparks, A.B.2
Callow, M.J.3
Halpern, A.L.4
Burns, N.L.5
Kermani, B.G.6
Carnevali, P.7
Nazarenko, I.8
Nilsen, G.B.9
Yeung, G.10
-
26
-
-
0038558013
-
Exact genetic linkage computations for general pedigrees
-
M. Fishelson and D. Geiger. Exact genetic linkage computations for general pedigrees. Bioinformatics, 18(suppl 1):S189-S198, 2002.
-
(2002)
Bioinformatics
, vol.18
, Issue.SUPPL. 1
-
-
Fishelson, M.1
Geiger, D.2
-
27
-
-
62649102411
-
Inferential genotyping of Y chromosomes in Latter-Day Saints founders and comparison to Utah samples in the HapMap project
-
J. Gitschier. Inferential genotyping of Y chromosomes in Latter-Day Saints founders and comparison to Utah samples in the HapMap project. Am. J. Hum. Genet., 84:251-258, 2009.
-
(2009)
Am. J. Hum. Genet.
, vol.84
, pp. 251-258
-
-
Gitschier, J.1
-
28
-
-
80052651133
-
Exploiting vulnerability to secure user privacy on a social networking site
-
ACM
-
P. Gundecha, G. Barbier, and H. Liu. Exploiting vulnerability to secure user privacy on a social networking site. In KDD. ACM, 2011.
-
(2011)
KDD
-
-
Gundecha, P.1
Barbier, G.2
Liu, H.3
-
29
-
-
84872459720
-
Identifying personal genomes by surname inference
-
Jan.
-
M. Gymrek, A. L. McGuire, D. Golan, E. Halperin, and Y. Erlich. Identifying personal genomes by surname inference. Science: 339 (6117), Jan. 2013.
-
(2013)
Science
, vol.339
, Issue.6117
-
-
Gymrek, M.1
McGuire, A.L.2
Golan, D.3
Halperin, E.4
Erlich, Y.5
-
30
-
-
50849101381
-
Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays
-
Aug.
-
N. Homer, S. Szelinger, M. Redman, D. Duggan, and W. Tembe. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genetics, 4, Aug. 2008.
-
(2008)
PLoS Genetics
, pp. 4
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Duggan, D.4
Tembe, W.5
-
31
-
-
0001022491
-
Blocking gibbs sampling in very large probabilistic expert systems
-
C. S. Jensen, A. Kong, and U. Kjærulff. Blocking gibbs sampling in very large probabilistic expert systems. International Journal of Human Computer Studies, 42(6):647-666, 1995.
-
(1995)
International Journal of Human Computer Studies
, vol.42
, Issue.6
, pp. 647-666
-
-
Jensen, C.S.1
Kong, A.2
Kjærulff, U.3
-
33
-
-
60549083544
-
An open access database of genome-wide association results
-
A. D. Johnson and C. J. O'Donnell. An open access database of genome-wide association results. BMC Medical Genetics 10:6, 2009.
-
(2009)
BMC Medical Genetics
, vol.10
, pp. 6
-
-
Johnson, A.D.1
O'Donnell, C.J.2
-
35
-
-
51749089052
-
A cryptographic approach to securely share and query genomic sequences
-
M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin. A cryptographic approach to securely share and query genomic sequences. IEEE Transactions on Information Technology in Biomedicine, 12(5):606-617, 2008.
-
(2008)
IEEE Transactions on Information Technology in Biomedicine
, vol.12
, Issue.5
, pp. 606-617
-
-
Kantarcioglu, M.1
Jiang, W.2
Liu, Y.3
Malin, B.4
-
36
-
-
77950812353
-
Haplotype inference in complex pedigrees
-
B. Kirkpatrick, E. Halperin, and R. M. Karp. Haplotype inference in complex pedigrees. Journal of Computational Biology, 17(3):269-280, 2010.
-
(2010)
Journal of Computational Biology
, vol.17
, Issue.3
, pp. 269-280
-
-
Kirkpatrick, B.1
Halperin, E.2
Karp, R.M.3
-
39
-
-
70350231628
-
Genotype imputation
-
Y. Li, C. Willer, S. Sanna, and G. Abecasis. Genotype imputation. Annual review of genomics and human genetics, 10:387, 2009.
-
(2009)
Annual Review of Genomics and Human Genetics
, vol.10
, pp. 387
-
-
Li, Y.1
Willer, C.2
Sanna, S.3
Abecasis, G.4
-
40
-
-
58349109653
-
On Jim Watson's APOE status: Genetic information is hard to hide
-
D. Nyholt, C. Yu, and P. Visscher. On Jim Watson's APOE status: Genetic information is hard to hide. European Journal of Human Genetics, 17:147-149, 2009.
-
(2009)
European Journal of Human Genetics
, vol.17
, pp. 147-149
-
-
Nyholt, D.1
Yu, C.2
Visscher, P.3
-
42
-
-
1842429214
-
On decoding of low-density parity-check codes on the binary erasure channel
-
March
-
H. Pishro-Nik and F. Fekri. On decoding of low-density parity-check codes on the binary erasure channel. IEEE Transactions on Information Theory, 50:439-454, March 2004.
-
(2004)
IEEE Transactions on Information Theory
, vol.50
, pp. 439-454
-
-
Pishro-Nik, H.1
Fekri, F.2
-
43
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Springer
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Privacy Enhancing Technologies, pages 41-53. Springer, 2003.
-
(2003)
Privacy Enhancing Technologies
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
44
-
-
0034164172
-
On the application of markov chain monte carlo methods to genetic analyses on complex pedigrees
-
N. Sheehan. On the application of markov chain monte carlo methods to genetic analyses on complex pedigrees. International Statistical Review, 68(1):83-110, 2000.
-
(2000)
International Statistical Review
, vol.68
, Issue.1
, pp. 83-110
-
-
Sheehan, N.1
-
46
-
-
70349251207
-
Forensic genomics: Kin privacy, driftnets and other open questions
-
F. Stajano, L. Bianchi, P. Liò, and D. Korff. Forensic genomics: kin privacy, driftnets and other open questions. In Proceedings of the 7th ACM workshop on Privacy in the electronic society, 2008.
-
Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, 2008
-
-
Stajano, F.1
Bianchi, L.2
Liò, P.3
Korff, D.4
-
48
-
-
0042226484
-
Multilocus linkage analysis by blocked Gibbs sampling
-
A. Thomas, A. Gutin, V. Abkevich, and A. Bansal. Multilocus linkage analysis by blocked Gibbs sampling. Statistics and Computing, 10(3):259-269, 2000.
-
(2000)
Statistics and Computing
, vol.10
, Issue.3
, pp. 259-269
-
-
Thomas, A.1
Gutin, A.2
Abkevich, V.3
Bansal, A.4
-
50
-
-
74049130896
-
Learning your identity and disease from research papers: Information leaks in genome wide association study
-
R. Wang, Y. F. Li, X. Wang, H. Tang, and X. Zhou. Learning your identity and disease from research papers: Information leaks in genome wide association study. Proceedings of the 16th ACM CCS, pages 534-544, 2009.
-
(2009)
Proceedings of the 16th ACM CCS
, pp. 534-544
-
-
Wang, R.1
Li, Y.F.2
Wang, X.3
Tang, H.4
Zhou, X.5
-
51
-
-
74049087814
-
Privacy-preserving genomic computation through program specialization
-
R. Wang, X. Wang, Z. Li, H. Tang, M. K. Reiter, and Z. Dong. Privacy-preserving genomic computation through program specialization. Proceedings of the 16th ACM CCS, pages 338-347, 2009.
-
(2009)
Proceedings of the 16th ACM CCS
, pp. 338-347
-
-
Wang, R.1
Wang, X.2
Li, Z.3
Tang, H.4
Reiter, M.K.5
Dong, Z.6
-
52
-
-
84869166261
-
To release or not to release: Evaluating information leaks in aggregate human-genome data
-
X. Zhou, B. Peng, Y. F. Li, Y. Chen, H. Tang, and X. Wang. To release or not to release: Evaluating information leaks in aggregate human-genome data. ESORICS, 2011.
-
(2011)
ESORICS
-
-
Zhou, X.1
Peng, B.2
Li, Y.F.3
Chen, Y.4
Tang, H.5
Wang, X.6
|