Fig. 3
From: Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services

The performance of the genomic data protection methods across 10 runs
From: Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services
The performance of the genomic data protection methods across 10 runs