Latanya Sweeney

Orcid: 0000-0003-3610-8892

Affiliations:
  • Harvard University


According to our database1, Latanya Sweeney authored at least 47 papers between 1997 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Privacy Preserving Synthetic Data Release Using Deep Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

Keynote 1.
Proceedings of the Conference on Fairness, Accountability and Transparency, 2018

2016
DataTags, Data Handling Policy Spaces and the Tags Language.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Practical Differentially Private Modeling of Human Movement Data.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

2015
An Open Science Platform for the Next Generation of Data.
CoRR, 2015

2014
Consumer-mediated health information exchanges: The 2012 ACMI debate.
J. Biomed. Informatics, 2014

2013
Identifying Participants in the Personal Genome Project by Name (A Re-identification Experiment)
CoRR, 2013

Matching Known Patients to Health Records in Washington State Data.
CoRR, 2013

Survey of Publicly Available State Health Databases.
CoRR, 2013

Discrimination in online ad delivery.
Commun. ACM, 2013

2012
ACMI Debate: AMIA Symposium 2012 - Chicago, Illinois.
Proceedings of the AMIA 2012, 2012

2010
Temporal Maximum Margin Markov Network.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2010

Structure preserving semantic coherent object segmentation.
Proceedings of the International Conference on Image Processing, 2010

Adaptive Gaussian Process for Short-Term Wind Speed Forecasting.
Proceedings of the ECAI 2010, 2010

2009
Face De-identification.
Proceedings of the Protecting Privacy in Video Surveillance, 2009

2008
Semi-supervised learning of multi-factor models for face de-identification.
Proceedings of the 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008), 2008

Model-Based De-Identification of Facial Images.
Proceedings of the AMIA 2008, 2008

2007
2D Image Database Indexing: A Coefficient-Based Approach.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

New Directions in Contact Free Hand Recognition.
Proceedings of the International Conference on Image Processing, 2007

2006
Protecting Job Seekers from Identity Theft.
IEEE Internet Comput., 2006

Composition and Disclosure of Unlinkable Distributed Databases.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Model-Based Face De-Identification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2006

2005
Preserving Privacy by De-Identifying Face Images.
IEEE Trans. Knowl. Data Eng., 2005

Privacy-enhanced linking.
SIGKDD Explor., 2005

Homeland Security.
IEEE Intell. Syst., 2005

Integrating Utility into Face De-identification.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Email alias detection using social network analysis.
Proceedings of the 3rd international workshop on Link discovery, 2005

A Secure Protocol to Distribute Unlinkable Health Data.
Proceedings of the AMIA 2005, 2005

Mining Images in Publicly-Available Cameras for Homeland Security.
Proceedings of the AI Technologies for Homeland Security, 2005

AI Technologies to Defeat Identity Theft Vulnerabilities.
Proceedings of the AI Technologies for Homeland Security, 2005

Technologies to Defeat Fraudulent Schemes Related to Email Requests.
Proceedings of the AI Technologies for Homeland Security, 2005

2004
Finding lists of people on the web.
SIGCAS Comput. Soc., 2004

Navigating computer science research through waves of privacy concerns: discussions among computer scientists at Carnegie Mellon University.
SIGCAS Comput. Soc., 2004

How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.
J. Biomed. Informatics, 2004

2002
Achieving k-Anonymity Privacy Protection Using Generalization and Suppression.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2002

k-Anonymity: A Model for Protecting Privacy.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2002

Inferring Genotype from Clinical Phenotype through a Knowledge Based Algorithm.
Proceedings of the 7th Pacific Symposium on Biocomputing, 2002

2001
Computational disclosure control: a primer on data privacy protection.
PhD thesis, 2001

Electronic Disease Surveillance and Reporting: The eReport System.
Proceedings of the AMIA 2001, 2001

Re-identification of DNA through an automated linkage process.
Proceedings of the AMIA 2001, 2001

2000
Determining the identifiability of DNA database entries.
Proceedings of the AMIA 2000, 2000

1999
An Intelligent Tutor for Teaching Basic Computer Science and Java Programming to Medical Informatics Students.
Proceedings of the AMIA 1999, 1999

Y2K BEACON: An Intelligent Web-Based Crisis Center for Disseminating Year 2000 Biomedical Equipment Compliance Information.
Proceedings of the AMIA 1999, 1999

1998
Generalizing Data to Provide Anonymity when Disclosing Information (Abstract).
Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1998

Three Computational Systems for Disclosing Medical Data in the Year 1999.
Proceedings of the MEDINFO '98, 1998

1997
Datafly: A System for Providing Anonymity in Medical Data.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Guaranteeing anonymity when sharing medical data, the Datafly System.
Proceedings of the AMIA 1997, 1997


  Loading...