{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00224687","sets":["1164:3925:11156:11157"]},"path":["11157"],"owner":"44499","recid":"224687","title":["Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis using Discrete Fourier Transform"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-02-27"},"_buckets":{"deposit":"b7285a71-8a51-4029-b2de-44ec2478399b"},"_deposit":{"id":"224687","pid":{"type":"depid","value":"224687","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis using Discrete Fourier Transform","author_link":["593028","593025","593026","593027"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis using Discrete Fourier Transform"},{"subitem_title":"Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis using Discrete Fourier Transform","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"プライバシー保護","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2023-02-27","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"The University of Tokyo"},{"subitem_text_value":"The University of Tokyo"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/224687/files/IPSJ-CSEC23100011.pdf","label":"IPSJ-CSEC23100011.pdf"},"date":[{"dateType":"Available","dateValue":"2025-02-27"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC23100011.pdf","filesize":[{"value":"825.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"b4dd265d-c087-40f0-8049-90539fe67201","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Akito, Yamamoto"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tetsuo, Shibuya"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Akito, Yamamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tetsuo, Shibuya","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"As the amount of data containing human genome information increases, these data will be further utilized in medicine. However, if the genomic statistics are released unchanged, there is a risk of identifying individuals. Although there are several privacy-preserving methods to release them, they have the problems of poor accuracy and intensive computational complexity. In this paper, we propose differentially private methods with both efficiency and high accuracy to release the top K significant SNPs. First, we propose an extended Fourier perturbation algorithm with more accurate privacy guarantees. Then, we present novel methods combining DFT with the Laplace and exponential mechanisms. These methods take only O(mlogm) time for a dataset containing m SNPs. We also theoretically guarantee that the value of sensitivity for these methods is smaller than that for existing methods. The experimental results indicate that our methods are advisable rather than existing methods.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"As the amount of data containing human genome information increases, these data will be further utilized in medicine. However, if the genomic statistics are released unchanged, there is a risk of identifying individuals. Although there are several privacy-preserving methods to release them, they have the problems of poor accuracy and intensive computational complexity. In this paper, we propose differentially private methods with both efficiency and high accuracy to release the top K significant SNPs. First, we propose an extended Fourier perturbation algorithm with more accurate privacy guarantees. Then, we present novel methods combining DFT with the Laplace and exponential mechanisms. These methods take only O(mlogm) time for a dataset containing m SNPs. We also theoretically guarantee that the value of sensitivity for these methods is smaller than that for existing methods. The experimental results indicate that our methods are advisable rather than existing methods.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2023-02-27","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"11","bibliographicVolumeNumber":"2023-CSEC-100"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":224687,"updated":"2025-01-19T13:03:26.557500+00:00","links":{},"created":"2025-01-19T01:24:15.394159+00:00"}