Seguir
Erman Ayday
Título
Citado por
Citado por
Año
Privacy in the genomic era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015
3522015
Addressing the concerns of the lacks family: quantification of kin genomic privacy
M Humbert, E Ayday, JP Hubaux, A Telenti
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2312013
Protecting and evaluating genomic privacy in medical tests and personalized medicine
E Ayday, JL Raisaro, JP Hubaux, J Rougemont
Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013
1562013
Realizing the potential of blockchain technologies in genomics
HI Ozercan, AM Ileri, E Ayday, C Alkan
Genome research 28 (9), 1255-1263, 2018
1542018
Whole genome sequencing: Revolutionary medicine or privacy nightmare?
E Ayday, E De Cristofaro, JP Hubaux, G Tsudik
Computer 48 (2), 58-66, 2015
139*2015
An iterative algorithm for trust management and adversary detection for delay-tolerant networks
E Ayday, F Fekri
IEEE Transactions on Mobile Computing 11 (9), 1514-1531, 2011
1192011
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies
F Tramèr, Z Huang, JP Hubaux, E Ayday
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1172015
{Privacy-Preserving} Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data
E Ayday, JL Raisaro, PJ McLaren, J Fellay, JP Hubaux
2013 USENIX workshop on health information technologies (HealthTech 13), 2013
1122013
Privacy-preserving processing of raw genomic data
E Ayday, JL Raisaro, U Hengartner, A Molyneaux, JP Hubaux
International Workshop on Data Privacy Management, 133-147, 2013
1102013
Genoguard: Protecting genomic data against brute-force attacks
Z Huang, E Ayday, J Fellay, JP Hubaux, A Juels
2015 IEEE Symposium on Security and Privacy, 447-462, 2015
992015
Iterative trust and reputation management using belief propagation
E Ayday, F Fekri
IEEE Transactions on Dependable and Secure Computing 9 (3), 375-386, 2011
912011
Controlled functional encryption
M Naveed, S Agrawal, M Prabhakaran, XF Wang, E Ayday, JP Hubaux, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
822014
De-anonymizing genomic databases using phenotypic traits
M Humbert, K Huguenin, J Hugonot, E Ayday, JP Hubaux
15th Privacy Enhancing Technologies Symposium (PETS) 2015 (2), 99-114, 2015
802015
A survey on information security threats and solutions for Machine to Machine (M2M) communications
G Tuna, DG Kogias, VC Gungor, C Gezer, E Taşkın, E Ayday
Journal of Parallel and Distributed Computing 109, 142-154, 2017
792017
Re-identification of individuals in genomic data-sharing beacons via allele inference
N Von Thenen, E Ayday, AE Cicek
Bioinformatics 35 (3), 365-371, 2019
752019
An iterative algorithm for trust and reputation management
E Ayday, H Lee, F Fekri
2009 IEEE International Symposium on Information Theory, 2051-2055, 2009
652009
Location-aware security services for wireless sensor networks using network coding
E Ayday, F Delgosha, F Fekri
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
612007
Trust management and adversary detection for delay tolerant networks
E Ayday, H Lee, F Fekri
2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 1788-1793, 2010
602010
Quantifying interdependent risks in genomic privacy
M Humbert, E Ayday, JP Hubaux, A Telenti
ACM Transactions on Privacy and Security (TOPS) 20 (1), 1-31, 2017
582017
An inference attack on genomic data using kinship, complex correlations, and phenotype information
I Deznabi, M Mobayen, N Jafari, O Tastan, E Ayday
IEEE/ACM transactions on computational biology and bioinformatics 15 (4 …, 2017
552017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20