{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:25:18Z","timestamp":1774121118874,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196541","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"221-235","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies"],"prefix":"10.1145","author":[{"given":"Oleksandr","family":"Tkachenko","sequence":"first","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Christian","family":"Weinert","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Thomas","family":"Schneider","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Kay","family":"Hamacher","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"M. Aliasgari M. Blanton Y. Zhang and A. Steele . 2013. Secure computation on floating point numbers. In NDSS.  M. Aliasgari M. Blanton Y. Zhang and A. Steele . 2013. Secure computation on floating point numbers. In NDSS."},{"key":"e_1_3_2_1_2_1","unstructured":"F. Aminkeng A. Bhavsar H. Visscher S. Rassekh Y. Li J. Lee L. Brunham H. Caron E. van Dalen and L. Kremer . 2015. A coding variant in RARG confers susceptibility to anthracycline-induced cardiotoxicity in childhood cancer. In Nature Genetics.  F. Aminkeng A. Bhavsar H. Visscher S. Rassekh Y. Li J. Lee L. Brunham H. Caron E. van Dalen and L. Kremer . 2015. A coding variant in RARG confers susceptibility to anthracycline-induced cardiotoxicity in childhood cancer. In Nature Genetics."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029204"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"R. Bahmani M. Barbosa F. Brasser B. Portela A. Sadeghi G. Scerri and B. Warinschi . 2016. Secure multiparty computation from SGX. In FC.  R. Bahmani M. Barbosa F. Brasser B. Portela A. Sadeghi G. Scerri and B. Warinschi . 2016. Secure multiparty computation from SGX. In FC.","DOI":"10.1007\/978-3-319-70972-7_27"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"G. Barsh G. Copenhaver G. Gibson and S. Williams . 2012. Guidelines for genome-wide association studies. In PLoS Genet.  G. Barsh G. Copenhaver G. Gibson and S. Williams . 2012. Guidelines for genome-wide association studies. In PLoS Genet.","DOI":"10.1371\/journal.pgen.1002812"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237996"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.01.030"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"R. Cai Z. Hao M. Winslett X. Xiao Y. Yang Z. Zhang and S. Zhou . 2015. Deterministic identification of specific individuals from GWAS results. In Bioinformatics.  R. Cai Z. Hao M. Winslett X. Xiao Y. Yang Z. Zhang and S. Zhou . 2015. Deterministic identification of specific individuals from GWAS results. In Bioinformatics.","DOI":"10.1093\/bioinformatics\/btv018"},{"key":"e_1_3_2_1_12_1","unstructured":"F. Chen M. Dow S. Ding Y. Lu X. Jiang H. Tang and S. Wang . 2016. PREMIX: privacy-preserving estimation of individual admixture AMIA.  F. Chen M. Dow S. Ding Y. Lu X. Jiang H. Tang and S. Wang . 2016. PREMIX: privacy-preserving estimation of individual admixture AMIA."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143362"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"S. Constable Y. Tang S. Wang X. Jiang and S. Chapin . 2015. Privacy-preserving GWAS analysis on federated genomic datasets BMC Medical Informatics and Decision Making.  S. Constable Y. Tang S. Wang X. Jiang and S. Chapin . 2015. Privacy-preserving GWAS analysis on federated genomic datasets BMC Medical Informatics and Decision Making.","DOI":"10.1186\/1472-6947-15-S5-S2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0119-9"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813678"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"D. Demmler T. Schneider and M. Zohner . 2015 b. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation NDSS.  D. Demmler T. Schneider and M. Zohner . 2015 b. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation NDSS.","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2011.140"},{"key":"e_1_3_2_1_21_1","unstructured":"R. Fisher . 1925. Statistical methods for research workers.  R. Fisher . 1925. Statistical methods for research workers."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"M. Franz B. Deiseroth K. Hamacher S. Jha S. Katzenbeisser and H. Schr\u00f6der . 2010. Secure computations on non-integer values. In WIFS.  M. Franz B. Deiseroth K. Hamacher S. Jha S. Katzenbeisser and H. Schr\u00f6der . 2010. Secure computations on non-integer values. In WIFS.","DOI":"10.1109\/WIFS.2010.5711458"},{"key":"e_1_3_2_1_23_1","unstructured":"D. Gifford . 2014. Foundations of Computational and Systems Biology. (2014). https:\/\/ocw.mit.edu\/courses\/biology\/7--91j-foundations-of-computational-and-systems-biology-spring-2014\/lecture-slides\/MIT7_91JS14_Lecture20.pdf  D. Gifford . 2014. Foundations of Computational and Systems Biology. (2014). https:\/\/ocw.mit.edu\/courses\/biology\/7--91j-foundations-of-computational-and-systems-biology-spring-2014\/lecture-slides\/MIT7_91JS14_Lecture20.pdf"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"A. Gutmann J. Wagner Y. Ali A. Allen J. Arras B. Atkinson N. Farahany A. Garza C. Grady and S. Hauser . 2012. Privacy and progress in whole genome sequencing. In Presidential Committee for the Study of Bioethical Issues.  A. Gutmann J. Wagner Y. Ali A. Allen J. Arras B. Atkinson N. Farahany A. Garza C. Grady and S. Hauser . 2012. Privacy and progress in whole genome sequencing. In Presidential Committee for the Study of Bioethical Issues.","DOI":"10.1016\/S0140-6736(11)61884-9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866358"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"N. Homer S. Szelinger M. Redman D. Duggan W. Tembe J. Muehling J. Pearson D. Stephan S Nelson and D. Craig . 2008. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays PLoS Genet.  N. Homer S. Szelinger M. Redman D. Duggan W. Tembe J. Muehling J. Pearson D. Stephan S Nelson and D. Craig . 2008. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays PLoS Genet.","DOI":"10.1371\/journal.pgen.1000167"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Y. Ishai J. Kilian K. Nissim and E. Petrank . 2003. Extending oblivious transfers efficiently. In CRYPTO.  Y. Ishai J. Kilian K. Nissim and E. Petrank . 2003. Extending oblivious transfers efficiently. In CRYPTO.","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"X. Jiang Y. Zhao X. Wang B. Malin S. Wang L. Ohno-Machado and H. Tang . 2014. A community assessment of privacy preserving techniques for human genomes BMC Medical Informatics and Decision Making.  X. Jiang Y. Zhao X. Wang B. Malin S. Wang L. Ohno-Machado and H. Tang . 2014. A community assessment of privacy preserving techniques for human genomes BMC Medical Informatics and Decision Making.","DOI":"10.1186\/1472-6947-14-S1-S1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487687"},{"key":"e_1_3_2_1_31_1","unstructured":"S. Kamara and M. Raykova . 2011. Secure outsourced computation in a multi-tenant cloud IBM Workshop on Cryptography and Security in Clouds.  S. Kamara and M. Raykova . 2011. Secure outsourced computation in a multi-tenant cloud IBM Workshop on Cryptography and Security in Clouds."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btt066"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978357"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"F. Kerschbaum T. Schneider and A. Schr\u00f6pfer . 2014. Automatic protocol selection in secure two-party computations ACNS.  F. Kerschbaum T. Schneider and A. Schr\u00f6pfer . 2014. Automatic protocol selection in secure two-party computations ACNS.","DOI":"10.1007\/978-3-319-07536-5_33"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"J. Kim Y. Bai and W. Pan . 2015. An Adaptive Association Test for Multiple Phenotypes with GWAS Summary Statistics. Genetic Epidemiology.  J. Kim Y. Bai and W. Pan . 2015. An Adaptive Association Test for Multiple Phenotypes with GWAS Summary Statistics. Genetic Epidemiology.","DOI":"10.1002\/gepi.21931"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"M. Kim and K. Lauter . 2015. Private genome analysis through homomorphic encryption BMC Medical Informatics and Decision Making.  M. Kim and K. Lauter . 2015. Private genome analysis through homomorphic encryption BMC Medical Informatics and Decision Making.","DOI":"10.1186\/1472-6947-15-S5-S3"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70583-3_40"},{"key":"e_1_3_2_1_38_1","unstructured":"B. Kreuter A. Shelat B. Mood and K. Butler . 2013. PCF: a Portable Circuit Format for scalable two-party secure computation USENIX Security.   B. Kreuter A. Shelat B. Mood and K. Butler . 2013. PCF: a Portable Circuit Format for scalable two-party secure computation USENIX Security."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"T. Krips and J. Willemson . 2014. Hybrid model of fixed and floating point numbers in secure multiparty computations ISC.  T. Krips and J. Willemson . 2014. Hybrid model of fixed and floating point numbers in secure multiparty computations ISC.","DOI":"10.1007\/978-3-319-13257-0_11"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"X. Liu R. Deng W. Ding R. Lu and B. Qin . 2016. Privacy-preserving outsourced calculation on floating point numbers TIFS.  X. Liu R. Deng W. Ding R. Lu and B. Qin . 2016. Privacy-preserving outsourced calculation on floating point numbers TIFS.","DOI":"10.1109\/TIFS.2016.2585121"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"W. Lu Y. Yamada and J. Sakuma . 2015. Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption. In BMC Medical Informatics and Decision Making.  W. Lu Y. Yamada and J. Sakuma . 2015. Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption. In BMC Medical Informatics and Decision Making.","DOI":"10.1186\/1472-6947-15-S5-S1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_43_1","unstructured":"MathWorks . 2017. Chi-square inverse cumulative distribution function. http:\/\/mathworks.com\/help\/stats\/chi2inv.html  MathWorks . 2017. Chi-square inverse cumulative distribution function. http:\/\/mathworks.com\/help\/stats\/chi2inv.html"},{"key":"e_1_3_2_1_44_1","unstructured":"J. McDonald . 2009. Handbook of biological statistics.  J. McDonald . 2009. Handbook of biological statistics."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2976751"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"M. Pillmeier M. Schulte and E. Walters . 2002. Design alternatives for barrel shifters. In SPIE.  M. Pillmeier M. Schulte and E. Walters . 2002. Design alternatives for barrel shifters. In SPIE.","DOI":"10.1117\/12.452034"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"P. Pullonen and S. Siim . 2015. Combining secret sharing and garbled circuits for efficient private IEEE 754 floating-point computations. In FC.  P. Pullonen and S. Siim . 2015. Combining secret sharing and garbled circuits for efficient private IEEE 754 floating-point computations. In FC.","DOI":"10.1007\/978-3-662-48051-9_13"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"E. Quillen X. Chen L. Almasy F. Yang H. He X. Li X. Wang T. Liu W. Hao and H. Deng . 2014. ALDH2 is associated to alcohol dependence and is the major genetic determinant of \u201cdaily maximum drinks\u201d in a GWAS study of an isolated rural Chinese sample American Journal of Medical Genetics Part B: Neuropsychiatric Genetics.  E. Quillen X. Chen L. Almasy F. Yang H. He X. Li X. Wang T. Liu W. Hao and H. Deng . 2014. ALDH2 is associated to alcohol dependence and is the major genetic determinant of \u201cdaily maximum drinks\u201d in a GWAS study of an isolated rural Chinese sample American Journal of Medical Genetics Part B: Neuropsychiatric Genetics.","DOI":"10.1002\/ajmg.b.32213"},{"key":"e_1_3_2_1_50_1","unstructured":"R. Rieger A. Michaelis and M. Green . 2012. Glossary of genetics and cytogenetics: classical and molecular.  R. Rieger A. Michaelis and M. Green . 2012. Glossary of genetics and cytogenetics: classical and molecular."},{"key":"e_1_3_2_1_51_1","unstructured":"R. Rogers and D. Kifer . 2017. A new class of private Chi-square hypothesis tests AISTATS.  R. Rogers and D. Kifer . 2017. A new class of private Chi-square hypothesis tests AISTATS."},{"key":"e_1_3_2_1_52_1","volume-title":"SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution with Intel SGX and Homomorphic Encryption. In arXiv preprint 1703.02577. https:\/\/arxiv.org\/abs\/1703.02577","author":"Sadat M.","year":"2017"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"T. Schneider and M. Zohner . 2013. GMW vs. Yao? Efficient secure two-party computation with low depth circuits FC.  T. Schneider and M. Zohner . 2013. GMW vs. Yao? Efficient secure two-party computation with low depth circuits FC.","DOI":"10.1007\/978-3-642-39884-1_23"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"S. Simmons and B. Berger . 2016. Realizing privacy preserving genome-wide association studies Bioinformatics.  S. Simmons and B. Berger . 2016. Realizing privacy preserving genome-wide association studies Bioinformatics.","DOI":"10.1093\/bioinformatics\/btw009"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"C. Spencer Z. Su P. Donnelly and J. Marchini . 2009. Designing genome-wide association studies: sample size power imputation and the choice of genotyping chip. In PLoS Genet.  C. Spencer Z. Su P. Donnelly and J. Marchini . 2009. Designing genome-wide association studies: sample size power imputation and the choice of genotyping chip. In PLoS Genet.","DOI":"10.1371\/journal.pgen.1000477"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"S. Stammler S. Katzenbeisser and K. Hamacher . 2016. Correcting Finite Sampling Issues in Entropy l-diversity Privacy in Statistical Databases.  S. Stammler S. Katzenbeisser and K. Hamacher . 2016. Correcting Finite Sampling Issues in Entropy l -diversity Privacy in Statistical Databases.","DOI":"10.1007\/978-3-319-45381-1_11"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"K. S. Steinsbekk B. K\u00e5re Myskja and B. Solberg . 2013. Broad consent versus dynamic consent in biobank research: Is passive participation an ethical problem? European Journal of Human Genetics.  K. S. Steinsbekk B. K\u00e5re Myskja and B. Solberg . 2013. Broad consent versus dynamic consent in biobank research: Is passive participation an ethical problem? European Journal of Human Genetics.","DOI":"10.1038\/ejhg.2012.282"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"L. Sweeney A. Abu and J. Winn . 2013. Identifying participants in the personal genome project by name Data Privacy Lab IQSS.  L. Sweeney A. Abu and J. Winn . 2013. Identifying participants in the personal genome project by name Data Privacy Lab IQSS.","DOI":"10.2139\/ssrn.2257732"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"C. Uhler A. Slavkovi\u0107 and S. Fienberg . 2013. Privacy-preserving data sharing for genome-wide association studies JPC.  C. Uhler A. Slavkovi\u0107 and S. Fienberg . 2013. Privacy-preserving data sharing for genome-wide association studies JPC.","DOI":"10.29012\/jpc.v5i1.629"},{"key":"e_1_3_2_1_61_1","unstructured":"J. Vaidya B. Shafiq X. Jiang and L. Ohno-Machado . 2013. Identifying inference attacks against healthcare data repositories AMIA Summits on Translational Science.  J. Vaidya B. Shafiq X. Jiang and L. Ohno-Machado . 2013. Identifying inference attacks against healthcare data repositories AMIA Summits on Translational Science."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653726"},{"key":"e_1_3_2_1_63_1","unstructured":"A. Weintraub . 2016. Inside Genomics Pioneer Craig Venter's Latest Production Technology Review.  A. Weintraub . 2016. Inside Genomics Pioneer Craig Venter's Latest Production Technology Review."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"F. Yu S. Fienberg A. Slavkovi\u0107 and C. Uhler . 2014. Scalable privacy-preserving data sharing methodology for genome-wide association studies. In Journal of Biomedical Informatics.  F. Yu S. Fienberg A. Slavkovi\u0107 and C. Uhler . 2014. Scalable privacy-preserving data sharing methodology for genome-wide association studies. In Journal of Biomedical Informatics.","DOI":"10.1016\/j.jbi.2014.01.008"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"F. Yu and Z. Ji . 2014. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge BMC Medical Informatics and Decision Making.  F. Yu and Z. Ji . 2014. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge BMC Medical Informatics and Decision Making.","DOI":"10.1186\/1472-6947-14-S1-S3"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Y. Zhang M. Blanton and G. Almashaqbeh . 2015 a. Secure distributed genome analysis for GWAS and sequence comparison computation BMC Medical Informatics and Decision Making.  Y. Zhang M. Blanton and G. Almashaqbeh . 2015 a. Secure distributed genome analysis for GWAS and sequence comparison computation BMC Medical Informatics and Decision Making.","DOI":"10.1186\/1472-6947-15-S5-S4"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Y. Zhang W. Dai X. Jiang H. Xiong and S. Wang . 2015 b. Foresee: fully outsourced secure genome study based on homomorphic encryption BMC Medical Informatics and Decision Making.  Y. Zhang W. Dai X. Jiang H. Xiong and S. Wang . 2015 b. Foresee: fully outsourced secure genome study based on homomorphic encryption BMC Medical Informatics and Decision Making.","DOI":"10.1186\/1472-6947-15-S5-S5"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516752"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Y. Zhao X. Wang X. Jiang L. Ohno-Machado and H. Tang . 2014. Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery. In Journal of the American Medical Informatics Association.  Y. Zhao X. Wang X. Jiang L. Ohno-Machado and H. Tang . 2014. Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery. In Journal of the American Medical Informatics Association.","DOI":"10.1136\/amiajnl-2014-003043"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"X Zhou B. Peng Y. Li Y. Chen H. Tang and X. Wang . 2011. To release or not to release: evaluating information leaks in aggregate human-genome data. In ESORICS.   X Zhou B. Peng Y. Li Y. Chen H. Tang and X. Wang . 2011. To release or not to release: evaluating information leaks in aggregate human-genome data. In ESORICS.","DOI":"10.1007\/978-3-642-23822-2_33"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196541","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196541"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":68,"alternative-id":["10.1145\/3196494.3196541","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196541","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}