Computer and Data Sciences Publications
Thursday, January 1, 2015
Hu, D., & Koyutürk, M.
(2015).
Comprehensive Evaluation of Composite Gene Features in Cancer Outcome Prediction.
Cancer Informatics,
(),
93-104.
Thursday, January 1, 2015
Tram\`er, Florian, Huang, Z., Hubaux, J., & Ayday, E.
(2015).
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies.
,
(),
1286--1297.
Thursday, January 1, 2015
Humbert, M., Ayday, E. , Hubaux, J., & Telenti, A.
(2015).
On non-cooperative genomic privacy.
,
(),
407--426.
Thursday, January 1, 2015
Koyutürk, M. , & Nibbe, R.
(2015).
Omics and Biomarkers Development for Intestinal Tumorigenesis.
Springer, Cham,
(),
365--389.
Thursday, January 1, 2015
Xiao, X. , Tillmann, N., Fahndrich, M., De Halleux, J., & Moskal, M.
(2015).
User-aware privacy control via extended static-information-flow analysis.
Automated Software Engineering Journal (ASEJ),
22
(3),
333–366.
Thursday, January 1, 2015
Huang, Z., Ayday, E. , Fellay, J., Hubaux, J., & Juels, A.
(2015).
GenoGuard: Protecting genomic data against brute-force attacks.
,
(),
447--462.
Thursday, January 1, 2015
Naveed, M., Ayday, E. , Clayton, E., Fellay, J., Gunter, C., Hubaux, J., ... Wang, X.
(2015).
Privacy in the genomic era.
ACM Computing Surveys (CSUR),
48
(1),
1--44.
Thursday, January 1, 2015
Hayes, M., & Li, J.
(2015).
An integrative framework for the identification of double minute chromosomes using next generation sequencing data.
BMC GENETICS,
16
(),
-.
Thursday, January 1, 2015
Humbert, M., Ayday, E. , Hubaux, J., & Telenti, A.
(2015).
On non-cooperative genomic privacy.
,
(),
407--426.
Thursday, January 1, 2015
Barman, L., Elgraini, M., RAISARO, J., Hubaux, J., & Ayday, E.
(2015).
Privacy threats and practical solutions for genetic risk tests.
,
(),
27--31.
Wednesday, October 15, 2014
Wang, Z., Yang, S., Zhang, X. , & Li, J.
(2014).
Drug repositioning by integrating target information through a heterogeneous network model..
Bioinformatics (Oxford, England),
30
(20),
2923-30.
Wednesday, October 1, 2014
Schomp, K., Allman, M., & Rabinovich, M.
(2014).
DNS Resolvers Considered Harmful.
13th ACM Workshop on Hot Topics in Networks (HotNets),
(),
7 pages.
Monday, September 1, 2014
Cicek, A., Qi, X., Cakmak, A., Johnson, S., Zhan, X., Alshalwi, S., ... Ozsoyoglu, T.
(2014).
An Online System for Metabolic Network Analysis.
DATABASE journal, Oxford Press,
().
Monday, September 1, 2014
Alzoubi, H., Rabinovich, M. , Lee, S., Van Der Merwe, J., & Spatscheck, O.
(2014).
Anycast Request Routing for Content Delivery Networks.
Wiley Publishers,
().
Monday, September 1, 2014
Qiao, S., & Ozsoyoglu, Z. M.
(2014).
RDF Benchmarks to Real RDF Datasets: How different are they really?.
VLDB 2014 Workshop: BeRSys 2014,
().
Thursday, August 14, 2014
Doi, E., & Lewicki, M. S.
(2014).
A simple model of optimal population coding for sensory systems.
PLoS Computational Biology,
10
(8),
14.
Monday, March 31, 2014
Liberatore, V.
(2014).
Networked Control over Non-Deterministic Channels.
,
().
Wednesday, March 5, 2014
Yavas, G., Koyutürk, M. , Gould, M., McMahon, S., & LaFramboise, T.
(2014).
DB2: a probabilistic approach for accurate detection of tandem duplication breakpoints using paired-end reads..
BMC genomics,
15
(1),
175.
Wednesday, January 1, 2014
Naveed, M., Agrawal, S., Prabhakaran, M., Wang, X., Ayday, E. , Hubaux, J., ... Gunter, C.
(2014).
Controlled functional encryption.
,
(),
1280--1291.
Wednesday, January 1, 2014
Telenti, A., Ayday, E. , & Hubaux, J.
(2014).
On genomics, kin, and privacy.
F1000Research,
3
().
Wednesday, January 1, 2014
Naveed, M., Agrawal, S., Prabhakaran, M., Wang, X., Ayday, E. , Hubaux, J., ... Gunter, C.
(2014).
Controlled functional encryption.
,
(),
1280--1291.
Wednesday, January 1, 2014
RAISARO, J., Ayday, E. , & Hubaux, J.
(2014).
Patient privacy in the genomic era.
Praxis,
103
(10),
579--86.
Wednesday, January 1, 2014
Telenti, A., Ayday, E. , & Hubaux, J.
(2014).
On genomics, kin, and privacy.
F1000Research,
3
().
Pages