{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:32:40Z","timestamp":1761744760798,"version":"3.37.3"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"German Federal Ministry of Education and Research"},{"name":"Center for IT-Security, Privacy and Accountability","award":["16KIS0656"],"award-info":[{"award-number":["16KIS0656"]}]},{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Collaborative Research Center"},{"name":"Methods and Tools for Understanding and Controlling Privacy","award":["SFB 1223"],"award-info":[{"award-number":["SFB 1223"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Comput. Biol. and Bioinf."],"published-print":{"date-parts":[[2018,9,1]]},"DOI":"10.1109\/tcbb.2018.2859380","type":"journal-article","created":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T21:32:14Z","timestamp":1532467934000},"page":"1405-1412","source":"Crossref","is-referenced-by-count":10,"title":["Simulating the Large-Scale Erosion of Genomic Privacy Over Time"],"prefix":"10.1109","volume":"15","author":[{"given":"Michael","family":"Backes","sequence":"first","affiliation":[{"name":"CISPA, Helmholtz Center i.G., Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9194-9603","authenticated-orcid":false,"given":"Pascal","family":"Berrang","sequence":"additional","affiliation":[{"name":"Saarland University, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5046-1727","authenticated-orcid":false,"given":"Mathias","family":"Humbert","sequence":"additional","affiliation":[{"name":"ETH Zurich and EPFL, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0217-2469","authenticated-orcid":false,"given":"Xiaoyu","family":"Shen","sequence":"additional","affiliation":[{"name":"Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Verena","family":"Wolf","sequence":"additional","affiliation":[{"name":"Saarland University, Saarbr\u00fccken, Germany"}]}],"member":"263","reference":[{"key":"ref33","first-page":"1223","article-title":"Privacy in epigenetics: Temporal linkability of microRNA expression profiles","author":"backes","year":"2016","journal-title":"Proc 25th Usenix Security Symp"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/ng.2248"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2009.0174"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1038\/ng1863"},{"key":"ref34","first-page":"319","article-title":"Membership privacy in microRNA-based\n studies","author":"backes","year":"2016","journal-title":"Proc 23rd ACM Conf Comput Commun Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.59"},{"key":"ref11","first-page":"1141","article-title":"Addressing the concerns of the Lacks\n family: Quantification of kin genomic privacy","author":"humbert","year":"2013","journal-title":"Proc ACM SIGSAC Conf Comput Commun Security"},{"journal-title":"Probabilistic Graphical Models Principles and Techniques","year":"2009","author":"koller","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/18.910572"},{"journal-title":"Probabilistic Reasoning in Intelligent Systems Networks of Plausible Inference","year":"1988","author":"pearl","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1081443232"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1214\/088342304000000026"},{"key":"ref17","article-title":"Quantifying interdependent risks in\n genomic privacy","volume":"20","author":"humbert","year":"2017","journal-title":"ACM Trans Privacy Secur"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1038\/ng.436"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_24"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008947712763"},{"year":"2018","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-5823.2000.tb00389.x"},{"year":"2016","author":"regalado","key":"ref3"},{"year":"2018","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.genom.9.081307.164242"},{"key":"ref5","article-title":"Democratizing dna fingerprinting","author":"zaaijer","year":"2016","journal-title":"BioRxiv"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/nrg3723"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/ng.3247"},{"year":"2018","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2767007"},{"year":"2018","key":"ref1"},{"key":"ref20","first-page":"50","article-title":"Genomic privacy metrics: A systematic comparison","author":"wagner","year":"2015","journal-title":"Proc Workshop Genome Privacy Secur"},{"key":"ref22","first-page":"1024","article-title":"The bayes net toolbox for Matlab","volume":"33","author":"murphy","year":"2001","journal-title":"Comput Sci Statist"},{"year":"2018","key":"ref21"},{"year":"2018","key":"ref24"},{"year":"2018","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1995.1029"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/18.suppl_1.S189"}],"container-title":["IEEE\/ACM Transactions on Computational Biology and Bioinformatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8857\/8485525\/08418770.pdf?arnumber=8418770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T18:18:51Z","timestamp":1722363531000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8418770\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,1]]},"references-count":34,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tcbb.2018.2859380","relation":{},"ISSN":["1545-5963","1557-9964","2374-0043"],"issn-type":[{"type":"print","value":"1545-5963"},{"type":"electronic","value":"1557-9964"},{"type":"electronic","value":"2374-0043"}],"subject":[],"published":{"date-parts":[[2018,9,1]]}}}