[HTML][HTML] Innovative applications of artificial intelligence in zoonotic disease management

W Guo, C Lv, M Guo, Q Zhao, X Yin, L Zhang - Science in One Health, 2023 - Elsevier
Zoonotic diseases, transmitted between humans and animals, pose a substantial threat to
global public health. In recent years, artificial intelligence (AI) has emerged as a …

Data integration strategies for predictive analytics in precision medicine

LJ Frey - Personalized medicine, 2018 - Taylor & Francis
With the rapid growth of health-related data including genomic, proteomic, imaging and
clinical, the arduous task of data integration can be overwhelmed by the complexity of the …

Charon: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data

R Mendes, T Oliveira, V Cogo, N Neves… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We present Charon, a cloud-backed storage system capable of storing and sharing big data
in a secure, reliable, and efficient way using multiple cloud providers and storage …

DNA-SeAl: sensitivity levels to optimize the performance of privacy-preserving DNA alignment

M Fernandes, J Decouchant, M Völp… - IEEE Journal of …, 2019 - ieeexplore.ieee.org
The advent of next-generation sequencing (NGS) machines made DNA sequencing
cheaper, but also put pressure on the genomic life-cycle, which includes aligning millions of …

Security, privacy, and trust management in DNA computing

M Fernandes, J Decouchant, FM Couto - Advances in Computers, 2023 - Elsevier
DNA computing is an emerging field that aims at enabling more efficient data storage and
processing. One principle of DNA computing is to encode some information (eg, image …

Computation semantics of the functional scientific workflow language Cuneiform

J Brandt, W Reisig, U Leser - Journal of Functional Programming, 2017 - cambridge.org
Cuneiform is a minimal functional programming language for large-scale scientific data
analysis. Implementing a strict black-box view on external operators and data, it allows the …

Advanced cloud privacy threat modeling

A Gholami, E Laure - arXiv preprint arXiv:1601.01500, 2016 - arxiv.org
Privacy-preservation for sensitive data has become a challenging issue in cloud computing.
Threat modeling as a part of requirements engineering in secure software development …

Data mesh meets blockchain

A Almaslukh, A Alameer, H Alsaleh, F Alkadyan… - International Journal of …, 2024 - Springer
Effective dataset management is crucial for enterprises to make informed decisions and
remain competitive. However, centralized dataset management approaches often result in …

Secure and distributed assessment of privacy-preserving GWAS releases

T Pascoal, J Decouchant, M Völp - Proceedings of the 23rd ACM/IFIP …, 2022 - dl.acm.org
Genome-wide association studies (GWAS) identify correlations between the genetic variants
and an observable characteristic such as a disease. Previous works presented privacy …

Security and privacy of sensitive data in cloud computing

A Gholami - 2016 - diva-portal.org
Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility
service, and it is revolutionizing many domains of computing. Compared with earlier …