Computer and Data Sciences Publications
Thursday, January 1, 2015
Huang, J., Li, Z., Xiao, X. , Wu, Z., Lu, K., Zhang, X., ... Jiang, G.
(2015).
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps.
USENIX Security Symposium,
(),
977–992.
Thursday, January 1, 2015
Balci, F., Kulan, H., Alkan, C., & Ayday, E.
(2015).
A New Inference Attack against Kin Genomic Privacy.
Proc. Privacy-Aware Computational Genomics,
().
Thursday, January 1, 2015
Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E.
(2015).
Can you really anonymize the donors of genomic data in today’s digital world?.
Springer, Cham,
(),
237--244.
Thursday, January 1, 2015
Balci, F., Kulan, H., Alkan, C., & Ayday, E.
(2015).
A New Inference Attack against Kin Genomic Privacy.
Proc. Privacy-Aware Computational Genomics,
().
Thursday, January 1, 2015
Humbert, M., Huguenin, K\'evin, Hugonot, J., Ayday, E. , & Hubaux, J.
(2015).
De-anonymizing genomic databases using phenotypic traits.
Proceedings on Privacy Enhancing Technologies,
2015
(2),
99--114.
Thursday, January 1, 2015
Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E.
(2015).
Can you Really Anonymize the Donors of Genomic Data in Today’s Digital World?.
Springer,
(),
237--244.
Thursday, January 1, 2015
Tram\`er, Florian, Huang, Z., Hubaux, J., & Ayday, E.
(2015).
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies.
,
(),
1286--1297.
Thursday, January 1, 2015
Hu, D., & Koyutürk, M.
(2015).
Comprehensive Evaluation of Composite Gene Features in Cancer Outcome Prediction.
Cancer Informatics,
(),
93-104.
Thursday, January 1, 2015
Humbert, M., Huguenin, K\'evin, Hugonot, J., Ayday, E. , & Hubaux, J.
(2015).
De-anonymizing genomic databases using phenotypic traits.
Proceedings on Privacy Enhancing Technologies,
2015
(2),
99--114.
Thursday, January 1, 2015
Huang, Z., Ayday, E. , Fellay, J., Hubaux, J., & Juels, A.
(2015).
GenoGuard: Protecting genomic data against brute-force attacks.
,
(),
447--462.
Thursday, January 1, 2015
Koyutürk, M. , & Nibbe, R.
(2015).
Omics and Biomarkers Development for Intestinal Tumorigenesis.
Springer, Cham,
(),
365--389.
Thursday, January 1, 2015
Tram\`er, Florian, Huang, Z., Hubaux, J., & Ayday, E.
(2015).
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies.
,
(),
1286--1297.
Thursday, January 1, 2015
Humbert, M., Ayday, E. , Hubaux, J., & Telenti, A.
(2015).
On non-cooperative genomic privacy.
,
(),
407--426.
Thursday, January 1, 2015
Hayes, M., & Li, J.
(2015).
An integrative framework for the identification of double minute chromosomes using next generation sequencing data.
BMC GENETICS,
16
(),
-.
Thursday, January 1, 2015
Xiao, X. , Tillmann, N., Fahndrich, M., De Halleux, J., & Moskal, M.
(2015).
User-aware privacy control via extended static-information-flow analysis.
Automated Software Engineering Journal (ASEJ),
22
(3),
333–366.
Thursday, January 1, 2015
Huang, Z., Ayday, E. , Fellay, J., Hubaux, J., & Juels, A.
(2015).
GenoGuard: Protecting genomic data against brute-force attacks.
,
(),
447--462.
Thursday, January 1, 2015
Naveed, M., Ayday, E. , Clayton, E., Fellay, J., Gunter, C., Hubaux, J., ... Wang, X.
(2015).
Privacy in the genomic era.
ACM Computing Surveys (CSUR),
48
(1),
1--44.
Thursday, January 1, 2015
Humbert, M., Ayday, E. , Hubaux, J., & Telenti, A.
(2015).
On non-cooperative genomic privacy.
,
(),
407--426.
Thursday, January 1, 2015
Barman, L., Elgraini, M., RAISARO, J., Hubaux, J., & Ayday, E.
(2015).
Privacy threats and practical solutions for genetic risk tests.
,
(),
27--31.
Thursday, January 1, 2015
Naveed, M., Ayday, E. , Clayton, E., Fellay, J., Gunter, C., Hubaux, J., ... Wang, X.
(2015).
Privacy in the genomic era.
ACM Computing Surveys (CSUR),
48
(1),
6.
Thursday, January 1, 2015
Samani, S., Huang, Z., Ayday, E. , Elliot, M., Fellay, J., Hubaux, J., ... Kutalik, Zolt\'an
(2015).
Quantifying genomic privacy via inference attack with high-order SNV correlations.
,
(),
32--40.
Thursday, January 1, 2015
Hou, S., Chen, L., Tas, E., Demihovskiy, I., & Ye, F.
(2015).
Cluster-Oriented Ensemble Classifiers for Intelligent Malware Detection.
IEEE,
(),
189-196.
Pages