{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:18:10Z","timestamp":1760300290833,"version":"3.37.3"},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Natural Science Fund for colleges and universities of Jiangsu Province","award":["18KJB520049"],"award-info":[{"award-number":["18KJB520049"]}]},{"name":"industry University-Research-Cooperation Project in Jiangsu Province","award":["BY2018124"],"award-info":[{"award-number":["BY2018124"]}]},{"name":"National Scientific Data Sharing Platform for Population and Health"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2947261","type":"journal-article","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T19:52:07Z","timestamp":1571341927000},"page":"152076-152087","source":"Crossref","is-referenced-by-count":13,"title":["DNA Motif Finding Method Without Protection Can Leak User Privacy"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-9781","authenticated-orcid":false,"given":"Xiang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Huanhuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Minyu","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Aming","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1650-9982","authenticated-orcid":false,"given":"Kaijian","family":"Xia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"1","article-title":"A differential privacy DNA motif finding method based on closed frequent patterns","volume":"21","author":"wu","year":"2018","journal-title":"Cluster Comput"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1536\/ihj.50.23"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s00246-014-1073-5"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2767007"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2018.2854782"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/18.20.6097"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.86.4.1183"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374984-0.00325-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2322694"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/1748-7188-1-13"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1186\/1745-6150-9-4"},{"key":"ref37","first-page":"285","article-title":"An improved method for predicting structure class of 27-class protein folds using increment of diversity","volume":"40","author":"zhang","year":"2009","journal-title":"Inner Mongolia University"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btm610"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bth480"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/S0168-9525(00)02174-0"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1038\/nbt1053"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1373\/clinchem.2018.289512"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btq707"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2015.70"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/clpt.2008.89"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2230.2005.557_5.x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmoldx.2018.07.009"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s12021-014-9248-z"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1711125114"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-04875-5"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2009.01.018"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1038\/ejhg.2009.191"},{"key":"ref69","article-title":"A genetic algorithm for motif finding based on statistical significance","author":"gutierrez","year":"2015","journal-title":"Bioinformatics and Biomedical Engineering"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3389\/fnhum.2014.00239"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1101\/gr.091827.109"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653726"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/23294515.2018.1550123"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-017-0494-5"},{"key":"ref24","first-page":"1","article-title":"Genetic databases and biobanks: Who controls our genetic privacy","volume":"23","author":"bregman-eschet","year":"2006","journal-title":"Santa Clara Computer &amp High Tech Law J"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1056\/NEJMp1805870","article-title":"Sociogenetic risks&#x2014;Ancestry DNA testing, third-party identity, and protection of privacy","volume":"379","author":"thomas","year":"2018","journal-title":"New England J Med"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2015.7448655"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-017-0282-1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/18.suppl_1.S354"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1142\/S0219720004000466"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74126-8_14"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-11-S1-S11"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/gepi.6"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1126\/science.8211139"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkl198"},{"key":"ref54","first-page":"28","article-title":"Fitting a mixture model by expectation maximization to discover motifs in biopolymers","author":"bailey","year":"1994","journal-title":"Proc Int Conf Intell Syst Mol Biol"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/28.8.1808"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1990.10474930"},{"article-title":"Protecting dna sequence anonymity with generalization lattices","year":"2004","author":"malin","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3747\/pdi.2015.00261"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1126\/science.1229566"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/494007a"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1111\/nyas.13211"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M1603"},{"key":"ref16","first-page":"17","article-title":"Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing","author":"fredrikson","year":"2014","journal-title":"Proc USENIX Secur Symp UNIX Secur Symp"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-060116-054123"},{"key":"ref18","first-page":"524","article-title":"Re-identification of familial database records","author":"malin","year":"2006","journal-title":"AMIA Annual Symposium Proceedings AMIA Symposium"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2015.09.010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2015.2496261"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.07.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.isci.2018.09.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-018-2276-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-014-1440-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1142\/S0219720018500245"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkh465"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1111\/j.1755-0998.2011.03024.x"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113316"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkg618"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/15.7.563"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1007\/s12648-017-1127-7","article-title":"Charge calculation studies done on a single walled carbon nanotube using MOPAC","volume":"92","author":"chaturvedi","year":"2018","journal-title":"Indian J Phys"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1101\/pdb.top093195"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms4887"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkf669"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/20.11.2871"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08874960.pdf?arnumber=8874960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T19:40:26Z","timestamp":1628624426000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8874960\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":75,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2947261","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}