Kristen LeFevre

  • University of Michigan, Ann Arbor, USA

According to our database1, Kristen LeFevre authored at least 28 papers between 2004 and 2013.

Collaborative distances:



In proceedings 
PhD thesis 




Explaining accesses to electronic medical records using diagnosis information.
J. Am. Medical Informatics Assoc., 2013

Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy Paradox.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Look who I found: understanding the effects of sharing curated friend groups.
Proceedings of the Web Science 2012, 2012

The PViz comprehension tool for social network privacy settings.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Adversarial/External Knowledge (Privacy in the Presence of).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Hippocratic Database.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Explanation-Based Auditing.
Proc. VLDB Endow., 2011

Do Query Optimizers Need to be SSD-aware?
Proceedings of the International Workshop on Accelerating Data Management Systems Using Modern Processor and Storage Architectures, 2011

enList: Automatically Simplifying Privacy Policies.
Proceedings of the Data Mining Workshops (ICDMW), 2011

CRIUS: User-Friendly Database Design.
Proc. VLDB Endow., 2010

PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting.
Proc. VLDB Endow., 2010

Strategic Modeling of Information Sharing among Data Privacy Attackers.
Informatica (Slovenia), 2010

Privacy wizards for social networking sites.
Proceedings of the 19th International Conference on World Wide Web, 2010

GraSS: Graph Structure Summarization.
Proceedings of the SIAM International Conference on Data Mining, 2010

An online framework for publishing privacy-sensitive location traces.
Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2010

Splash: ad-hoc querying of data and statistical models.
Proceedings of the EDBT 2010, 2010

A privacy recommendation wizard for users of social networking sites.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Adversarial-knowledge dimensions in data privacy.
VLDB J., 2009

Privacy-Preserving Data Publishing.
Found. Trends Databases, 2009

PrivatePond: Outsourced Management of Web Corpuses.
Proceedings of the 12th International Workshop on the Web and Databases, 2009

Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Workload-aware anonymization techniques for large-scale datasets.
ACM Trans. Database Syst., 2008

Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Workload-aware anonymization.
Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006

Mondrian Multidimensional K-Anonymity.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Incognito: Efficient Full-Domain K-Anonymity.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2005

Limiting Disclosure in Hippocratic Databases.
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004

Managing Healthcare Data Hippocratically.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2004