Fig. 3From: Controlling the signal: Practical privacy protection of genomic data sharing through Beacon servicesThe performance of the genomic data protection methods across 10 runsBack to article page