Author of the publication

Identifying Personal DNA Methylation Profiles by Genotype Inference.

, , , , , , and . IEEE Symposium on Security and Privacy, page 957-976. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why Johnny Can't Develop Mobile Crowdsourcing Applications with Location Privacy., , , and . CoRR, (2019)CTRL+Z: Recovering Anonymized Social Graphs., , , , , and . CoRR, (2017)ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models., , , , and . CoRR, (2018)Collaborative Location Privacy with Rational Users., , , and . GameSec, volume 7037 of Lecture Notes in Computer Science, page 163-181. Springer, (2011)Nowhere to Hide: Navigating around Privacy in Online Social Networks., , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 682-699. Springer, (2013)Dissecting Privacy Risks in Biomedical Data., , , , , and . EuroS&P, page 62-76. IEEE, (2018)One-to-n scrip systems for cooperative privacy-enhancing technologies., , and . Allerton, page 682-692. IEEE, (2011)Quantifying Interdependent Risks in Genomic Privacy., , , and . ACM Trans. Priv. Secur., 20 (1): 3:1-3:31 (2017)Membership Privacy in MicroRNA-based Studies., , , and . ACM Conference on Computer and Communications Security, page 319-330. ACM, (2016)A Study on the Use of Checksums for Integrity Verification of Web Downloads., , , , , and . ACM Trans. Priv. Secur., 24 (1): 4:1-4:36 (2020)