1 code implementation • 20 Mar 2023 • Minkyu Jeon, Hyeonjin Park, Hyunwoo J. Kim, Michael Morley, Hyunghoon Cho
While prior works have explored image de-identification strategies based on synthetic averaging of images in other domains (e. g. facial images), existing techniques face difficulty in preserving both privacy and clinical utility in retinal images, as we demonstrate in our work.
no code implementations • 10 Jul 2020 • Fangwei Ye, Hyunghoon Cho, Salim El Rouayheb
Motivated by the growing availability of personal genomics services, we study an information-theoretic privacy problem that arises when sharing genomic data: a user wants to share his or her genome sequence while keeping the genotypes at certain positions hidden, which could otherwise reveal critical health-related information.
no code implementations • 25 Mar 2020 • Hyunghoon Cho, Daphne Ippolito, Yun William Yu
Importantly, though we discuss potential modifications, this document is not meant as a formal research paper, but instead is a response to some of the privacy characteristics of direct contact tracing apps like TraceTogether and an early-stage Request for Comments to the community.
Cryptography and Security
2 code implementations • 1 Jun 2018 • Hyunghoon Cho, Benjamin DeMeo, Jian Peng, Bonnie Berger
Representing data in hyperbolic space can effectively capture latent hierarchical relationships.
no code implementations • 10 Apr 2015 • Hyunghoon Cho, Bonnie Berger, Jian Peng
In this paper, we introduce diffusion component analysis (DCA), a framework that plugs in a diffusion model and learns a low-dimensional vector representation of each node to encode the topological properties of a network.