Supplementary Figure 3: The attacker’s presumed strategy for a linking attack. | Nature Methods

Supplementary Figure 3: The attacker’s presumed strategy for a linking attack.

From: Quantification of private information leakage from phenotype-genotype data: linking attacks

Supplementary Figure 3

(a),(b) The phenotype and variant pairs are sorted by descending absolute correlations values. For the top n pairs, joint predictability and ICI are computed. (c) The average joint predictability of genotypes versus the average cumulative ICI leakage for multiple eQTLs. The error bars (one standard deviation) for ICI and predictability are shown on the real eQTLs.

Back to article page