Supplementary Figure 9: Illustration of linking for the jth individual.
From: Quantification of private information leakage from phenotype-genotype data: linking attacks

The attacker first predicts the genotypes (á¹¼j) which are then used to compute the distance to all the individuals in the genotype dataset. The computed distances are then sorted in increasing order. The top-matching individual with smallest distance (in the example, individual a) is assigned as the linked individual. The first distance gap, d1,2, is computed as the difference between the second (dj,(2)) and the first (dj,(1)) distances in the sorted list.