Computer and Data Sciences Publications
Thursday, January 1, 2015
Humbert, M., Huguenin, K\'evin, Hugonot, J., Ayday, E. , & Hubaux, J.
(2015).
De-anonymizing genomic databases using phenotypic traits.
Proceedings on Privacy Enhancing Technologies,
2015
(2),
99--114.
Thursday, January 1, 2015
Alser, M., Almadhoun, N., Nouri, A., Alkan, C., & Ayday, E.
(2015).
Can you Really Anonymize the Donors of Genomic Data in Today’s Digital World?.
Springer,
(),
237--244.
Thursday, January 1, 2015
Tram\`er, Florian, Huang, Z., Hubaux, J., & Ayday, E.
(2015).
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies.
,
(),
1286--1297.
Thursday, January 1, 2015
Humbert, M., Huguenin, K\'evin, Hugonot, J., Ayday, E. , & Hubaux, J.
(2015).
De-anonymizing genomic databases using phenotypic traits.
Proceedings on Privacy Enhancing Technologies,
2015
(2),
99--114.
Thursday, January 1, 2015
Huang, Z., Ayday, E. , Fellay, J., Hubaux, J., & Juels, A.
(2015).
GenoGuard: Protecting genomic data against brute-force attacks.
,
(),
447--462.
Thursday, January 1, 2015
Hu, D., & Koyutürk, M.
(2015).
Comprehensive Evaluation of Composite Gene Features in Cancer Outcome Prediction.
Cancer Informatics,
(),
93-104.
Thursday, January 1, 2015
Tram\`er, Florian, Huang, Z., Hubaux, J., & Ayday, E.
(2015).
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies.
,
(),
1286--1297.
Thursday, January 1, 2015
Humbert, M., Ayday, E. , Hubaux, J., & Telenti, A.
(2015).
On non-cooperative genomic privacy.
,
(),
407--426.
Thursday, January 1, 2015
Koyutürk, M. , & Nibbe, R.
(2015).
Omics and Biomarkers Development for Intestinal Tumorigenesis.
Springer, Cham,
(),
365--389.
Wednesday, October 15, 2014
Wang, Z., Yang, S., Zhang, X. , & Li, J.
(2014).
Drug repositioning by integrating target information through a heterogeneous network model..
Bioinformatics (Oxford, England),
30
(20),
2923-30.
Wednesday, October 1, 2014
Schomp, K., Allman, M., & Rabinovich, M.
(2014).
DNS Resolvers Considered Harmful.
13th ACM Workshop on Hot Topics in Networks (HotNets),
(),
7 pages.
Monday, September 1, 2014
Cicek, A., Qi, X., Cakmak, A., Johnson, S., Zhan, X., Alshalwi, S., ... Ozsoyoglu, T.
(2014).
An Online System for Metabolic Network Analysis.
DATABASE journal, Oxford Press,
().
Monday, September 1, 2014
Alzoubi, H., Rabinovich, M. , Lee, S., Van Der Merwe, J., & Spatscheck, O.
(2014).
Anycast Request Routing for Content Delivery Networks.
Wiley Publishers,
().
Monday, September 1, 2014
Qiao, S., & Ozsoyoglu, Z. M.
(2014).
RDF Benchmarks to Real RDF Datasets: How different are they really?.
VLDB 2014 Workshop: BeRSys 2014,
().
Thursday, August 14, 2014
Doi, E., & Lewicki, M. S.
(2014).
A simple model of optimal population coding for sensory systems.
PLoS Computational Biology,
10
(8),
14.
Monday, March 31, 2014
Liberatore, V.
(2014).
Networked Control over Non-Deterministic Channels.
,
().
Wednesday, March 5, 2014
Yavas, G., Koyutürk, M. , Gould, M., McMahon, S., & LaFramboise, T.
(2014).
DB2: a probabilistic approach for accurate detection of tandem duplication breakpoints using paired-end reads..
BMC genomics,
15
(1),
175.
Wednesday, January 1, 2014
Lu, H., Jakl, M., Wang, Z., Tanaka, K., Ray, S. , Cervinka, P., ... Wilson, D. L.
(2014).
TCT-371 Evaluation of Highly Automated Software for Analyzing Intravascular Optical Coherence Tomography Pullbacks of Stents.
Journal of the American College of Cardiology,
64
(11_S).
Wednesday, January 1, 2014
RAISARO, J., Ayday, E. , McLaren, P., Hubaux, J., & Telenti, A.
(2014).
Privacy-Preserving HIV Pharmacogenetics: A Real Use Case of Genomic Data Protection.
Workshop on Genome Privacy ,
().
Wednesday, January 1, 2014
Naveed, M., Agrawal, S., Prabhakaran, M., Wang, X., Ayday, E. , Hubaux, J., ... Gunter, C.
(2014).
Controlled functional encryption.
,
(),
1280--1291.
Wednesday, January 1, 2014
Telenti, A., Ayday, E. , & Hubaux, J.
(2014).
On genomics, kin, and privacy.
F1000Research,
3
().
Wednesday, January 1, 2014
Naveed, M., Agrawal, S., Prabhakaran, M., Wang, X., Ayday, E. , Hubaux, J., ... Gunter, C.
(2014).
Controlled functional encryption.
,
(),
1280--1291.
Pages