Now showing items 1-11 of 11

    • Can you really anonymize the donors of genomic data in today’s digital world? 

      Alser, Mohammed; Almadhoun, Nour; Nouri, Azita; Alkan, Can; Ayday, Erman (Springer, 2016-09)
      The rapid progress in genome sequencing technologies leads to availability of high amounts of genomic data. Accelerating the pace of biomedical breakthroughs and discoveries necessitates not only collecting millions of ...
    • Differential privacy with bounded priors: Reconciling utility and privacy in genome-wide association studies 

      Tramèr, F.; Huang, Z.; Hubaux J.-P.; Ayday, Erman (ACM, 2015-10)
      Differential privacy (DP) has become widely accepted as a rigorous definition of data privacy, with stronger privacy guarantees than traditional statistical methods. However, recent studies have shown that for reasonable ...
    • Inference attacks against kin genomic privacy 

      Ayday, E.; Humbert M. (Institute of Electrical and Electronics Engineers Inc., 2017)
      Genomic data poses serious interdependent risks: your data might also leak information about your family members' data. Methods attackers use to infer genomic information, as well as recent proposals for enhancing genomic ...
    • Multirelational k-anonymity 

      Nergiz, M. Ercan; Clifton, C.; Nergiz, A. Erhan (IEEE, 2007-04)
      k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much research has been done to modify a single ...
    • Preventing unauthorized data flows 

      Uzun, Emre; Parlato, G.; Atluri, V.; Ferrara, A. L.; Vaidya, J.; Sural, S.; Lorenzi, D. (Springer, Cham, 2017)
      Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of ...
    • Privacy and security in the genomic era 

      Ayday, Erman; Hubaux, Jean-Pierre (ACM, 2016-10)
      With the help of rapidly developing technology, DNA sequencing is becoming less expensive. As a consequence, the research in genomics has gained speed in paving the way to personalized (genomic) medicine, and geneticists ...
    • Privacy in the genomic era 

      Naveed, M.; Ayday, E.; Clayton, E.W.; Fellay J.; Gunter, C.A.; Hubaux J.-P.; Malin, B.A.; Wang, X. (Association for Computing Machinery, 2015)
      Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highlydetailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, ...
    • Privacy-preserving data sharing and utilization between entities 

      Demirağ, Didem (Bilkent University, 2017-08)
      In this thesis, we aim to enable privacy-preserving data sharing between entities and propose two systems for this purpose: (i) a veri able computation scheme that enables privacy-preserving similarity computation in the ...
    • Privacy-preserving protocols for aggregate location queries via homomorphic encryption and multiparty computation 

      Eryonucu, Cihan (Bilkent University, 2019-07)
      Two main goals of the businesses are to serve their customers better and in the meantime, increase their pro t. One of the ways that businesses can improve their services is using location information of their customers ...
    • A privacy-preserving solution for the bipartite ranking problem 

      Faramarzi, Noushin Salek; Ayday, Erman; Güvenir, H. Altay (IEEE, 2016-12)
      In this paper, we propose an efficient solution for the privacy-preserving of a bipartite ranking algorithm. The bipartite ranking problem can be considered as finding a function that ranks positive instances (in a dataset) ...
    • Quantifying genomic privacy via inference attack with high-order SNV correlations 

      Samani, S. S.; Huang, Z.; Ayday, Erman; Elliot, M.; Fellay, J.; Hubaux, J.-P.; Kutalik, Z. (IEEE, 2015)
      As genomic data becomes widely used, the problem of genomic data privacy becomes a hot interdisciplinary research topic among geneticists, bioinformaticians and security and privacy experts. Practical attacks have been ...