{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:46Z","timestamp":1773511246242,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["FKZ: 16KIS0656"],"award-info":[{"award-number":["FKZ: 16KIS0656"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SFB 1223, project A5"],"award-info":[{"award-number":["SFB 1223, project A5"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978355","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"319-330","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":85,"title":["Membership Privacy in MicroRNA-based Studies"],"prefix":"10.1145","author":[{"given":"Michael","family":"Backes","sequence":"first","affiliation":[{"name":"CISPA, Saarland University &amp; MPI-SWS, Saarbr\u00fccken, Germany"}]},{"given":"Pascal","family":"Berrang","sequence":"additional","affiliation":[{"name":"CISPA, Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Mathias","family":"Humbert","sequence":"additional","affiliation":[{"name":"CISPA, Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Praveen","family":"Manoharan","sequence":"additional","affiliation":[{"name":"CISPA, Saarland University, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Arrayexpress. https:\/\/www.ebi.ac.uk\/arrayexpress. Accessed: 2016-02--12.  Arrayexpress. https:\/\/www.ebi.ac.uk\/arrayexpress. Accessed: 2016-02--12."},{"key":"e_1_3_2_1_2_1","unstructured":"Cancer statistics. http:\/\/seer.cancer.gov\/statfacts\/html\/all.html. Accessed: 2016-05--18.  Cancer statistics. http:\/\/seer.cancer.gov\/statfacts\/html\/all.html. Accessed: 2016-05--18."},{"key":"e_1_3_2_1_3_1","unstructured":"Gene expression omnibus. http:\/\/www.ncbi.nlm.nih.gov\/geo. Accessed: 2016-02--12.  Gene expression omnibus. http:\/\/www.ncbi.nlm.nih.gov\/geo. Accessed: 2016-02--12."},{"key":"e_1_3_2_1_4_1","unstructured":"Genome-wide association studies. https:\/\/www.genome.gov\/20019523\/genomewide-association-studies-fact-sheet\/. Accessed: 2016-04--29.  Genome-wide association studies. https:\/\/www.genome.gov\/20019523\/genomewide-association-studies-fact-sheet\/. Accessed: 2016-04--29."},{"key":"e_1_3_2_1_5_1","unstructured":"Health insurer anthem discloses customer and employee data breach. http:\/\/www.computerworld.com\/article\/2879649\/health-insurer-anthem-discloses-customer-and-employee-data-breach.html. Accessed: 2016-02-03.  Health insurer anthem discloses customer and employee data breach. http:\/\/www.computerworld.com\/article\/2879649\/health-insurer-anthem-discloses-customer-and-employee-data-breach.html. Accessed: 2016-02-03."},{"key":"e_1_3_2_1_6_1","unstructured":"Human miRNA disease database. http:\/\/www.cuilab.cn\/hmdd. Accessed: 2016-05--15.  Human miRNA disease database. http:\/\/www.cuilab.cn\/hmdd. Accessed: 2016-05--15."},{"key":"e_1_3_2_1_7_1","unstructured":"Medical data - a new target for hackers. https:\/\/www.logpoint.com\/se\/about-us\/blog\/249-medical-data-a-new-target-for-hackers. Accessed: 2016-02-03.  Medical data - a new target for hackers. https:\/\/www.logpoint.com\/se\/about-us\/blog\/249-medical-data-a-new-target-for-hackers. Accessed: 2016-02-03."},{"key":"e_1_3_2_1_8_1","unstructured":"Number of microRNAs in human genome skyrockets. http:\/\/www.genengnews.com\/gen-news-highlights\/number-of-micrornas-in-human-genome-skyrockets\/81250958\/. Accessed: 2016-04--29.  Number of microRNAs in human genome skyrockets. http:\/\/www.genengnews.com\/gen-news-highlights\/number-of-micrornas-in-human-genome-skyrockets\/81250958\/. Accessed: 2016-04--29."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 25th USENIX Security Symposium","author":"Backes M.","year":"2016","unstructured":"M. Backes , P. Berrang , A. Hecksteden , M. Humbert , A. Keller , and T. Meyer . Privacy in epigenetics: Temporal linkability of microRNA expression profiles . In Proceedings of the 25th USENIX Security Symposium , 2016 . M. Backes, P. Berrang, A. Hecksteden, M. Humbert, A. Keller, and T. Meyer. Privacy in epigenetics: Temporal linkability of microRNA expression profiles. In Proceedings of the 25th USENIX Security Symposium, 2016."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2015.46"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13059-015-0723-0"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2015.10414"},{"key":"e_1_3_2_1_16_1","first-page":"17","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Fredrikson M.","year":"2014","unstructured":"M. Fredrikson , E. Lantz , S. Jha , S. Lin , D. Page , and T. Ristenpart . Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing . In Proceedings of the 23rd USENIX Security Symposium , pages 17 -- 32 , 2014 . M. Fredrikson, E. Lantz, S. Jha, S. Lin, D. Page, and T. Ristenpart. Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing. In Proceedings of the 23rd USENIX Security Symposium, pages 17--32, 2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1101\/gr.082701.108"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/09076828X"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487687"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cell.2007.01.029"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1038\/nmeth.1682"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12916-014-0224-0"},{"key":"e_1_3_2_1_24_1","first-page":"14","article-title":"A blood based 12-mirna signature of alzheimer disease patients","author":"Leidinger P.","year":"2013","unstructured":"P. Leidinger , C. Backes , S. Deutscher , K. Schmitt , S. C. Mueller , K. Frese , J. Haas , K. Ruprecht , F. Paul , C. Stahler , A blood based 12-mirna signature of alzheimer disease patients . Genome Biol , 14 , 2013 . P. Leidinger, C. Backes, S. Deutscher, K. Schmitt, S. C. Mueller, K. Frese, J. Haas, K. Ruprecht, F. Paul, C. Stahler, et al. A blood based 12-mirna signature of alzheimer disease patients. Genome Biol, 14, 2013.","journal-title":"Genome Biol"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516686"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1420955112"},{"key":"e_1_3_2_1_27_1","volume-title":"MicroRNA expression profiles classify human cancers. nature, 435(7043):834--838","author":"Lu J.","year":"2005","unstructured":"J. Lu , G. Getz , E. A. Miska , E. Alvarez-Saavedra , J. Lamb , D. Peck , A. Sweet-Cordero , B. L. Ebert , R. H. Mak , A. A. Ferrando , MicroRNA expression profiles classify human cancers. nature, 435(7043):834--838 , 2005 . J. Lu, G. Getz, E. A. Miska, E. Alvarez-Saavedra, J. Lamb, D. Peck, A. Sweet-Cordero, B. L. Ebert, R. H. Mak, A. A. Ferrando, et al. MicroRNA expression profiles classify human cancers. nature, 435(7043):834--838, 2005."},{"key":"e_1_3_2_1_28_1","volume-title":"On the problem of the most efficient tests of statistical hypotheses","author":"Neyman J.","year":"1992","unstructured":"J. Neyman and E. S. Pearson . On the problem of the most efficient tests of statistical hypotheses . 1992 . J. Neyman and E. S. Pearson. On the problem of the most efficient tests of statistical hypotheses. 1992."},{"key":"e_1_3_2_1_29_1","volume-title":"Advances in epigenetics and epigenomics for neurodegenerative diseases. Current neurology and neuroscience reports, 11:464--473","author":"Qureshi I. A.","year":"2011","unstructured":"I. A. Qureshi and M. F. Mehler . Advances in epigenetics and epigenomics for neurodegenerative diseases. Current neurology and neuroscience reports, 11:464--473 , 2011 . I. A. Qureshi and M. F. Mehler. Advances in epigenetics and epigenomics for neurodegenerative diseases. Current neurology and neuroscience reports, 11:464--473, 2011."},{"key":"e_1_3_2_1_30_1","volume-title":"Ohio","author":"Rothstein M. A.","year":"1991","unstructured":"M. A. Rothstein , Y. Cai , and G. E. Marchant . The ghost in our genes: legal and ethical implications of epigenetics. Health matrix (Cleveland , Ohio : 1991 ), 19:1, 2009. M. A. Rothstein, Y. Cai, and G. E. Marchant. The ghost in our genes: legal and ethical implications of epigenetics. Health matrix (Cleveland, Ohio: 1991), 19:1, 2009."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1038\/ng.436"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813610"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v5i1.629"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653726"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1145720"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.01.008"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11257-2_14"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041225.2041268"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978355","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:14Z","timestamp":1750218014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978355"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":38,"alternative-id":["10.1145\/2976749.2978355","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978355","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}