SBBD

Paper Registration

1

Select Book

2

Select Paper

3

Fill in paper information

4

Congratulations

Fill in your paper information

English Information

(*) To change the order drag the item to the new position.

Authors
# Name
1 Manuel Filho(edvarfilho1234@gmail.com)
2 Javam Machado(javam.machado@lsbd.ufc.br)

(*) To change the order drag the item to the new position.

Reference
# Reference
1 Almadhoun, N., Ayday, E., and Ulusoy, O. (2019). Differential privacy under dependent tuples—the case of genomic privacy. Bioinformatics, 36(6):1696–1703.
2 Asharov, G., Halevi, S., Lindell, Y., and Rabin, T. (2018). Privacy-preserving search of similar patients in genomic data. Proc. Priv. Enhancing Technol., 2018(4):104–124.
3 Dwork, C., McSherry, F., Nissim, K., and Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. In Halevi, S. and Rabin, T., editors, Theory of Cryptography, pages 265–284, Berlin, Heidelberg. Springer Berlin Heidelberg.
4 Dwork, C. and Roth, A. (2014). The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci., 9(3-4):211–407.
5 Lecuyer, M., Atlidakis, V., Geambasu, R., Hsu, D., and Jana, S. (2019). Certified robustness to adversarial examples with differential privacy. In 2019 IEEE Symposium on Security and Privacy (SP), pages 656–672. IEEE.
6 Li, N., Lyu, M., Su, D., and Yang, W. (2016). Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, & Trust. Morgan & Claypool Publishers.
7 McSherry, F. and Talwar, K. (2007). Mechanism design via differential privacy. In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS’07), pages 94–103. IEEE.
8 McSherry, F. and Talwar, K. (2007). Mechanism design via differential privacy. In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings, pages 94–103. IEEE Computer Society.
9 Shringarpure, S. S. and Bustamante, C. D. (2015). Privacy risks from genomic datasharing beacons. The American Journal of Human Genetics, 97(5):631–646.
10 Wang, R., Li, Y. F., Wang, X., Tang, H., and Zhou, X. (2009). Learning your identity and disease from research papers: information leaks in genome wide association study. In Al-Shaer, E., Jha, S., and Keromytis, A. D., editors, Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pages 534–544. ACM.
11 Wang, Z. and Moult, J. (2001). Snps, protein structure, and disease. Human mutation, 17(4):263–270.