-
1
-
-
84901005679
-
Routes for breaching and protecting genetic privacy
-
Erlich, Y., Narayanan, A.: Routes for breaching and protecting genetic privacy. Nat. Rev. Genet. 15(6), 409-421 (2014)
-
(2014)
Nat. Rev. Genet
, vol.15
, Issue.6
, pp. 409-421
-
-
Erlich, Y.1
Narayanan, A.2
-
2
-
-
56049112782
-
Genomic anonymity: Have we already lost it
-
Greenbaum, D., Gerstein, M.: Genomic anonymity: have we already lost it? Am. J. Bioeth. 8(10), 71-74 (2008)
-
(2008)
Am. J. Bioeth
, vol.8
, Issue.10
, pp. 71-74
-
-
Greenbaum, D.1
Gerstein, M.2
-
3
-
-
70449726791
-
Social networking and personal genomics: Suggestions for optimizing the interaction
-
Greenbaum, D., Gerstein, M.: Social networking and personal genomics: suggestions for optimizing the interaction. Am. J. Bioeth. 9(6-7), 15-19 (2009)
-
(2009)
Am. J. Bioeth
, vol.9
, Issue.6-7
, pp. 15-19
-
-
Greenbaum, D.1
Gerstein, M.2
-
4
-
-
84855281324
-
Genomics and privacy: Implications of the new reality of closed data for the field
-
Greenbaum, D., Sboner, A., Mu, X.J., Gerstein, M.: Genomics and privacy: implications of the new reality of closed data for the field. PLoS Comput. Biol. 7(12), e1002278 (2011)
-
(2011)
Plos Comput. Biol.
, vol.7
, Issue.12
-
-
Greenbaum, D.1
Sboner, A.2
Mu, X.J.3
Gerstein, M.4
-
5
-
-
84978957291
-
-
The Health Insurance Portability and Accountability Act of 1996 (HIPAA). http://www.hhs.gov/hipaa/
-
-
-
-
6
-
-
84979048393
-
Genetic privacy: Risks, ethics, and protection techniques
-
New York, NY
-
Shi, X., Wu, X.: Genetic privacy: risks, ethics, and protection techniques. In: The Workshop on Data Science Learning and Applications to Biomedical and Health Sciences, pp. 57-62, New York, NY (2016)
-
(2016)
The Workshop on Data Science Learning and Applications to Biomedical and Health Sciences
, pp. 57-62
-
-
Shi, X.1
Wu, X.2
-
7
-
-
50849101381
-
Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays
-
Homer, N., Szelinger, S., Redman, M., Duggan, D., Tembe, W., Muehling, J., Pearson, J.V., Stephan, D.A., Nelson, S.F., Craig, D.W.: Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet. 4(8), e1000167 (2008)
-
(2008)
Plos Genet.
, vol.4
, Issue.8
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Duggan, D.4
Tembe, W.5
Muehling, J.6
Pearson, J.V.7
Stephan, D.A.8
Nelson, S.F.9
Craig, D.W.10
-
8
-
-
83455205957
-
Participant identification in genetic association studies: Improved methods and practical implications
-
Masca, N., Burton, P.R., Sheehan, N.A.: Participant identification in genetic association studies: improved methods and practical implications. Int. J. Epidemiol. 40(6), 1629-1642 (2011)
-
(2011)
Int. J. Epidemiol
, vol.40
, Issue.6
, pp. 1629-1642
-
-
Masca, N.1
Burton, P.R.2
Sheehan, N.A.3
-
9
-
-
74049130896
-
Learning your identity and disease from research papers: Information leaks in genome wide association study
-
ACM
-
Wang, R., Li, Y.F., Wang, X., Tang, H., Zhou, X.: Learning your identity and disease from research papers: information leaks in genome wide association study. In: 16th ACM Conference on Computer and Communications Security, pp. 534-544. ACM (2009)
-
(2009)
16Th ACM Conference on Computer and Communications Security
, pp. 534-544
-
-
Wang, R.1
Li, Y.F.2
Wang, X.3
Tang, H.4
Zhou, X.5
-
10
-
-
80052975332
-
To release or not to release: Evaluating information leaks in aggregate human-genome data
-
Atluri, V., Diaz, C. (eds.), Springer, Heidelberg
-
Zhou, X., Peng, B., Li, Y.F., Chen, Y., Tang, H., Wang, X.F.: To release or not to release: evaluating information leaks in aggregate human-genome data. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 607-627. Springer, Heidelberg (2011)
-
(2011)
ESORICS 2011. LNCS
, vol.6879
, pp. 607-627
-
-
Zhou, X.1
Peng, B.2
Li, Y.F.3
Chen, Y.4
Tang, H.5
Wang, X.F.6
-
11
-
-
84872459720
-
Identifying personal genomes by surname inference
-
Gymrek, M., McGuire, A.L., Golan, D., Halperin, E., Erlich, Y.: Identifying personal genomes by surname inference. Science 339(6117), 321-324 (2013)
-
(2013)
Science
, vol.339
, Issue.6117
, pp. 321-324
-
-
Gymrek, M.1
McGuire, A.L.2
Golan, D.3
Halperin, E.4
Erlich, Y.5
-
12
-
-
84894533255
-
Using aggregate human genome data for individual identification
-
IEEE, Shenzhen, China
-
Wang, Y., Wu, X., Shi, X.: Using aggregate human genome data for individual identification. In,: IEEE International Conference on Bioinformatics and Biomedicine, pp. 410-415. IEEE, Shenzhen, China (2013)
-
(2013)
In,: IEEE International Conference on Bioinformatics and Biomedicine
, pp. 410-415
-
-
Wang, Y.1
Wu, X.2
Shi, X.3
-
13
-
-
84864160745
-
-
Hindorff, L.A., MacArthur, J., Morales, J., Junkins, H.A., Hall, P.N., Klemm, A.K., Manolio, T.A.: A Catalog of Published Genome-wide Association Studies. http://www.genome.gov/gwastudies
-
A Catalog of Published Genome-Wide Association Studies
-
-
Hindorff, L.A.1
Macarthur, J.2
Morales, J.3
Junkins, H.A.4
Hall, P.N.5
Klemm, A.K.6
Manolio, T.A.7
-
14
-
-
84857148217
-
Privacy preserving GWAS data sharing
-
IEEE
-
Fienberg, S.E., Slavkovic, A., Uhler, C.: Privacy preserving GWAS data sharing. In: 11th International Conference on Data Mining Workshops, pp. 628-635. IEEE (2011)
-
(2011)
11Th International Conference on Data Mining Workshops
, pp. 628-635
-
-
Fienberg, S.E.1
Slavkovic, A.2
Uhler, C.3
-
15
-
-
84995401548
-
Privacy-preserving data exploration in genome-wide association studies
-
ACM, Chicago, IL
-
Johnson, A., Shmatikov, V.: Privacy-preserving data exploration in genome-wide association studies. In: 19th ACM International Conference on Knowledge Discovery and Data Mining, pp. 1079-1087. ACM, Chicago, IL (2013)
-
(2013)
19Th ACM International Conference on Knowledge Discovery and Data Mining
, pp. 1079-1087
-
-
Johnson, A.1
Shmatikov, V.2
-
16
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Halevi, S., Rabin, T. (eds.), Springer, Heidelberg
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006)
-
(2006)
TCC 2006. LNCS
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
17
-
-
78650804208
-
A firm foundation for private data analysis
-
Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86-95 (2011)
-
(2011)
Commun. ACM
, vol.54
, Issue.1
, pp. 86-95
-
-
Dwork, C.1
-
18
-
-
77956209107
-
Discovering frequent patterns in sensitive data
-
ACM, Washington, DC
-
Bhaskar, R., Laxman, S., Smith, A., Thakurta, A.: Discovering frequent patterns in sensitive data. In: 16th ACM International Conference on Knowledge Discovery and Data Mining, pp. 503-512. ACM, Washington, DC (2010)
-
(2010)
16Th ACM International Conference on Knowledge Discovery and Data Mining
, pp. 503-512
-
-
Bhaskar, R.1
Laxman, S.2
Smith, A.3
Thakurta, A.4
-
19
-
-
84858769465
-
Privacy-preserving logistic regression
-
Citeseer, Vancouver, B.C., Canada
-
Chaudhuri, K., Monteleoni, C.: Privacy-preserving logistic regression. In: 23rd Annual Conference on Neural Information Processing Systems, pp. 289-296. Citeseer, Vancouver, B.C., Canada (2008)
-
(2008)
23Rd Annual Conference on Neural Information Processing Systems
, pp. 289-296
-
-
Chaudhuri, K.1
Monteleoni, C.2
-
20
-
-
79959983519
-
No free lunch in data privacy
-
ACM, San Diego, CA
-
Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: 17th ACM International Conference on Knowledge Discovery and Data Mining, pp. 193-204. ACM, San Diego, CA (2011)
-
(2011)
17Th ACM International Conference on Knowledge Discovery and Data Mining
, pp. 193-204
-
-
Kifer, D.1
Machanavajjhala, A.2
-
21
-
-
84866008575
-
Differential identifiability
-
ACM, Beijing, China
-
Lee, J., Clifton, C.: Differential identifiability. In: 18th ACM International Conference on Knowledge Discovery and Data Mining, pp. 1041-1049. ACM, Beijing, China (2012)
-
(2012)
18Th ACM International Conference on Knowledge Discovery and Data Mining
, pp. 1041-1049
-
-
Lee, J.1
Clifton, C.2
|