Searching journal content for articles similar to He et al. 24 (4): 664.

Displaying results 1-9 of 9
For checked items
  1. ...often becomes infeasible. Developing a privacy-preserving solution for this task is challenging owing to the burden of estimating kinship between all the pairs of individuals across data sets. We introduce SF-Relate, a practical and secure federated algorithm for identifying genetic relatives across...
  2. ...rare ones) to identify individuals has been repeatedly shown, the availability of small sets of noisy genotypes, from environmental DNA samples or functional genomics data, motivated us to quantify their informativeness. We present a computational tool suite, termed Privacy Leakage by Inference across...
  3. .... The compromise of position information also leads to potential threats for the content encrypted by SE. For example, if positions are known and coverage can be inferred from the encrypted content size, CNV (copy number variation) analysis can identify deletions/insertions without the need for the sequence itself...
  4. ...in restrictive regulatory environments owing to data privacy concerns. Although privacy-preserving analysis tools have been developed to broaden access to these servers, none of the existing methods support haplotype phasing, a critical component of the imputation workflow. The complexity of phasing algorithms...
  5. ..., predominantly composed of individuals with non-European ancestry, are reluctant to participate in genetic studies due to privacy concerns or apprehensions about potential misuse, as seen in prior cases (Maher 2015; Guglielmi 2019). To circumvent these challenges, data simulation tools can be used to augment...
  6. ...the technological discrepancy, and then develop a deconvolution framework called DeMixSC using this well-matched, that is, benchmark, data. Built upon a novel weighted nonnegative least-squares framework, DeMixSC identifies and adjusts genes with high technological discrepancy and aligns the benchmark data...
  7. ...investigation but then used as the foundation for public health and research programs.Although concerns about individual autonomy and privacy are either attenuated or absent in the context of post-mortem genetic testing, the results of an autopsy may be relevant to living biological relatives, with potential...
  8. ...prediction. MKLMM is as computationally efficient as standard LMMs and does not require storage of genotypes, thus achieving state-of-the-art predictive power without compromising computational feasibility or genomic privacy. [Supplemental material is available for this article.] One of the principal aims...
  9. ...to privacy with regard to their health information during the informed consent process (Richardson andCho 2012). However, this theory has been criticized because research does not aim to promote individual health, and creating obligations of ancillary care would compromise the central mission of researchers...
For checked items

Preprint Server