Computer and Data Sciences Publications
Thursday, January 1, 2015
Samani, S., Huang, Z., Ayday, E. , Elliot, M., Fellay, J., Hubaux, J., ... Kutalik, Zolt\'an
(2015).
Quantifying genomic privacy via inference attack with high-order SNV correlations.
,
(),
32--40.
Thursday, January 1, 2015
Ayday, E. , De Cristofaro, E., Hubaux, J., & Tsudik, G.
(2015).
Whole genome sequencing: Revolutionary medicine or privacy nightmare?.
Computer,
48
(2),
58--66.
Thursday, January 1, 2015
Ye, F. , Liu, T., & Shen, H.
(2015).
Soter: Smart Bracelets for Children's Safety.
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY,
6
(4).
Thursday, January 1, 2015
Ding, H., & Rabinovich, M.
(2015).
TCP Stretch Acknowledgements and Timestamps: Findings and Implications for Passive RTT Measurement.
ACM SIGCOMM Computer Comm. Review,
45
(3),
20-27.
Thursday, January 1, 2015
Ayday, E. , & Hubaux, J.
(2015).
Threats and solutions for genomic data privacy.
Springer,
(),
463--492.
Thursday, January 1, 2015
Ayday, E. , De Cristofaro, E., Hubaux, J., & Tsudik, G.
(2015).
Whole genome sequencing: Revolutionary medicine or privacy nightmare?.
Computer,
48
(2),
58--66.
Thursday, January 1, 2015
Yang, W., Xiao, X. , Andow, B., Li, S., Xie, T., & Enck, W.
(2015).
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context.
International Conference on Software Engineering (ICSE 2015),
(),
303–313.
Thursday, January 1, 2015
Huang, J., Li, Z., Xiao, X. , Wu, Z., Lu, K., Zhang, X., ... Jiang, G.
(2015).
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps.
USENIX Security Symposium,
(),
977–992.
Thursday, January 1, 2015
Balci, F., Kulan, H., Alkan, C., & Ayday, E.
(2015).
A New Inference Attack against Kin Genomic Privacy.
Proc. Privacy-Aware Computational Genomics,
().
Thursday, January 1, 2015
Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E.
(2015).
Can you really anonymize the donors of genomic data in today’s digital world?.
Springer, Cham,
(),
237--244.
Thursday, January 1, 2015
Balci, F., Kulan, H., Alkan, C., & Ayday, E.
(2015).
A New Inference Attack against Kin Genomic Privacy.
Proc. Privacy-Aware Computational Genomics,
().
Thursday, January 1, 2015
Humbert, M., Huguenin, K\'evin, Hugonot, J., Ayday, E. , & Hubaux, J.
(2015).
De-anonymizing genomic databases using phenotypic traits.
Proceedings on Privacy Enhancing Technologies,
2015
(2),
99--114.
Thursday, January 1, 2015
Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E.
(2015).
Can you Really Anonymize the Donors of Genomic Data in Today’s Digital World?.
Springer,
(),
237--244.
Thursday, January 1, 2015
Tram\`er, Florian, Huang, Z., Hubaux, J., & Ayday, E.
(2015).
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies.
,
(),
1286--1297.
Thursday, January 1, 2015
Hu, D., & Koyutürk, M.
(2015).
Comprehensive Evaluation of Composite Gene Features in Cancer Outcome Prediction.
Cancer Informatics,
(),
93-104.
Thursday, January 1, 2015
Humbert, M., Huguenin, K\'evin, Hugonot, J., Ayday, E. , & Hubaux, J.
(2015).
De-anonymizing genomic databases using phenotypic traits.
Proceedings on Privacy Enhancing Technologies,
2015
(2),
99--114.
Thursday, January 1, 2015
Huang, Z., Ayday, E. , Fellay, J., Hubaux, J., & Juels, A.
(2015).
GenoGuard: Protecting genomic data against brute-force attacks.
,
(),
447--462.
Thursday, January 1, 2015
Koyutürk, M. , & Nibbe, R.
(2015).
Omics and Biomarkers Development for Intestinal Tumorigenesis.
Springer, Cham,
(),
365--389.
Thursday, January 1, 2015
Tram\`er, Florian, Huang, Z., Hubaux, J., & Ayday, E.
(2015).
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies.
,
(),
1286--1297.
Thursday, January 1, 2015
Humbert, M., Ayday, E. , Hubaux, J., & Telenti, A.
(2015).
On non-cooperative genomic privacy.
,
(),
407--426.
Thursday, January 1, 2015
Hayes, M., & Li, J.
(2015).
An integrative framework for the identification of double minute chromosomes using next generation sequencing data.
BMC GENETICS,
16
(),
-.
Thursday, January 1, 2015
Xiao, X. , Tillmann, N., Fahndrich, M., De Halleux, J., & Moskal, M.
(2015).
User-aware privacy control via extended static-information-flow analysis.
Automated Software Engineering Journal (ASEJ),
22
(3),
333–366.
Pages