Now showing items 1-9 of 9

    • Cryptographic solutions for credibility and liability issues of genomic data 

      Ayday, E.; Tang, Q.; Yilmaz, A. (Institute of Electrical and Electronics Engineers, 2019)
      In this work, we consider a scenario that includes an individual sharing his genomic data (or results obtained from his genomic data) with a service provider. In this scenario, (i) the service provider wants to make sure ...
    • Differential privacy with bounded priors: Reconciling utility and privacy in genome-wide association studies 

      Tramèr F.; Huang, Z.; Hubaux J.-P.; Ayday, E. (Association for Computing Machinery, 2015)
      Differential privacy (DP) has become widely accepted as a rigorous definition of data privacy, with stronger privacy guarantees than traditional statistical methods. However, recent studies have shown that for reasonable ...
    • GenoGuard: protecting genomic data against brute-force attacks 

      Huang Z.; Ayday, E.; Fellay J.; Hubaux, Jean-Pierre; Juels, A. (Institute of Electrical and Electronics Engineers Inc., 2015)
      Secure storage of genomic data is of great and increasing importance. The scientific community's improving ability to interpret individuals' genetic materials and the growing size of genetic database populations have been ...
    • An inference attack on genomic data using kinship, complex correlations, and phenotype information 

      Deznabi, I.; Mobayen, M.; Jafari, N.; Tastan, O.; Ayday, E. (IEEE, 2018)
      Abstract—Individuals (and their family members) share (partial) genomic data on public platforms. However, using special characteristics of genomic data, background knowledge that can be obtained from the Web, and family ...
    • On non-cooperative genomic privacy 

      Humbert, M.; Ayday, E.; Hubaux J.-P.; Telenti, A. (Springer Verlag, 2015)
      Over the last few years, the vast progress in genome sequencing has highly increased the availability of genomic data. Today, individuals can obtain their digital genomic sequences at reasonable prices from many online ...
    • Privacy threats and practical solutions for genetic risk tests 

      Barman, L.; Elgraini, M.-T.; Raisaro, J. L.; Hubaux, J. -P.; Ayday, E. (Institute of Electrical and Electronics Engineers Inc., 2015)
      Recently, several solutions have been proposed to address the complex challenge of protecting individuals' genetic data during personalized medicine tests. In this short paper, we analyze different privacy threats and ...
    • Privacy-preserving genomic testing in the clinic: a model using HIV treatment 

      Mclaren, P. J.; Raisaro, J. L.; Aouri, M.; Rotger, M.; Ayday, E.; Bartha, I.; Delgado, M. B.; Vallet, Y.; Günthard, H. F.; Cavassini, M.; Furrer, H.; Doco-Lecompte, T.; Marzolini, C.; Schmid, P.; Di Benedetto, C.; Decosterd, L. A.; Fellay, J.; Hubaux, Jean-Pierre; Telenti A. (Nature Publishing Group, 2016)
      Purpose:The implementation of genomic-based medicine is hindered by unresolved questions regarding data privacy and delivery of interpreted results to health-care practitioners. We used DNA-based prediction of HIV-related ...
    • Quantifying genomic privacy via inference attack with high-order SNV correlations 

      Samani, S. S.; Huang, Z.; Ayday, E.; Elliot, M.; Fellay, J.; Hubaux, J.-P.; Kutalik, Z. (Institute of Electrical and Electronics Engineers Inc., 2015)
      As genomic data becomes widely used, the problem of genomic data privacy becomes a hot interdisciplinary research topic among geneticists, bioinformaticians and security and privacy experts. Practical attacks have been ...
    • A utility maximizing and privacy preserving approach for protecting kinship in genomic databases 

      Kale, Gülce (Bilkent University, 2017-03)
      Rapid and low cost sequencing of genomic data enables widespread use of genomic information in research studies and personalized customer applications, where people share their genomic data in public databases. Although ...