Publications

White Papers, Technical Reports, Published Citations, References


Below are links to Published articles authored by members of the Data Privacy Lab ("the Lab"). Links to White Papers and Technical Reports authored by members of the Data Privacy Lab appear above. The References link consists of compilations of reference material on particular topics and areas. Most publications listed in the References are not authored by members of the Lab, but are related to Lab work.


Citations of Published Work from Lab Members

    2006

  • L. Sweeney, A. Halpert, J. Waranoff. Managing End-of-Life Care in Complex Patients Can Reduce Costs Without Shortening Life. American Journal of Managed Care, to appear. (Abstract)

  • Acquisti, A. and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook, Workshop on Privacy-Enhancing Technologies (PET) 2006. (PDF)

  • Sweeney, L. Protecting Job Seekers from Identity Theft. IEEE Internet Computing 10 (2) March 2006. (PDF)

  • Malin, B. and Sweeney, L. Composition and disclosure of unlinkable distributed databases. 22nd IEEE International Conference on Data Engineering, Atlanta, GA, April 2006.


    2005

  • Gross, R. and Acquisti, A. Information Revelation and Privacy in Online Social Networks. Workshop on Privacy in the Electronic Society (WPES), 2005 (PDF)

  • B. Malin. Betrayed By My Shadow: Learning Data Identity By Trail Matching . Journal of Privacy Technology. 2005; 20050609001.

  • E. Newton, L. Sweeney, and B. Malin. Preserving Privacy by De-identifying Facial Images. IEEE Transactions on Knowledge and Data Engineering. 2005; 17(2): 232-243.

  • B. Malin, E. Airoldi, S. Edoho-Eket, and Y. Li. Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants. In Proceedings of the 21st IEEE International Conference on Data Engineering, Tokyo, Japan, April 2005.

  • Sweeney, L. Privacy-Enhanced Linking. ACM SIGKDD Explorations 7(2) December 2005. (PDF).

  • Sweeney, L. Privacy-Preserving Surveillance using Databases from Daily Life. IEEE Intelligent Systems, 20 (5), September-October 2005.
    Earlier version available as Privacy-Preserving Surveillance using Selective Revelation, Carnegie Mellon University, LIDAP Working Paper 15, February 2005. (PDF).

  • Malin, B. and Sweeney, L. A secure protocol to distribute unlinkable health data. Proceedings, Journal of the American Medical Informatics Association. Washington, DC. Oct 2005: 485-489.

  • Holzer, R., Malin, B., and Sweeney, L. Email Alias Detection Using Network Analysis. Proceedings of the ACM SIGKDD Workshop on Link Discovery: Issues, Approaches, and Applications. Chicago, IL. August 2005.

  • Sweeney, L. AI Technologies to Defeat Identity Theft Vulnerabilities. AAAI Spring Symposium, AI Technologies for Homeland Security, 2005.

  • Sweeney, L. and Gross, R. Mining Images in Publicly-Available Cameras for Homeland Security. AAAI Spring Symposium, AI Technologies for Homeland Security, 2005.

  • Airoldi, E. and Malin, B., and Sweeney, L. Technologies to Defeat Fraudulent Schemes Related to Email Requests. AAAI Spring Symposium, AI Technologies for Homeland Security, 2005.

  • Sweeney, L. Privacy-Preserving Bio-terrorism Surveillance. AAAI Spring Symposium, AI Technologies for Homeland Security, 2005.

  • Sweeney, L. Towards a Privacy-Preserving Watchlist Solution. AAAI Spring Symposium, AI Technologies for Homeland Security, 2005.

  • Gross, R. Airoldi, E., Malin, B., and Sweeney, L. Integrating Utility into Face De-Identification. Workshop on Privacy-Enhanced Technologies, 2005. l.

  • X. Bai, R. Padman, and E. Airoldi. On Learning Parsimonious Models for Extracting Consumer Opinions. In Proceedings of the 38th Annual Hawaii International Confereonce on System Sciences (HICSS). Big Island, HI. Jan 2005.

  • B. Malin. Protecting Genomic Sequence Anonymity with Generalization Lattices. Methods of Information in Medicine. Forthcoming.

  • B. Malin. Unsupervised Name Disambiguation via Social Network Similarity. In Proceedings of the Workshop on Link Analysis, Counterterrorism, and Security, in conjunction with the SIAM 2005 International Conference on Data Mining. Newport Beach, CA. April 2005: 93-102.

  • B. Malin. An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future. Journal of the American Medical Informatics Association. 2005; 12(1): 28-34.


    2004

  • E. Airoldi and C. Faloutsos. Recovering Latent Time-Series from Their Observed Sums: Network Tomography with Particle Filters. In Proceedings of the ACM SIGKDD International Conference on Knolwedge Discovery and Data Mining. Seattle, WA. 2004: 30-39.

  • E. Airoldi and B. Malin. Data Mining Challenges for Electronic Safety: The Case of Fraudulent Intent Detection in E-mails. In Proceedings of the Workshop on Privacy and Security Aspects of Data Mining, in conjunction with the 4th IEEE International Conference on Data Mining. Brighton, England. Nov 2004.

  • X. Bai, R. Padman, and E. Airoldi. Sentiment Extraction from Unstructured Text using Tabu Search-Enhanced Markov Blanket. In Proceedings of the International Workshop on Mining for and from the Semantic Web, in conjunction with the ACM SIGKDD International Confereonce on Knowledge Discovery and Data Mining. Seattle, WA. Aug 2004.

  • B. Malin. Data and Collocation Surveillance Through Location Access Patterns. In Proceedings of the North American Association for Computational Social and Organizational Science (NAACSOS) Conference. Pittsburgh, PA, June 2004.

  • L. Sweeney. Navigating Computer Science Research Through Waves of Privacy Concerns: Discussions among Computer Scientists at Carnegie Mellon University. ACM Computers and Society. April 2004; 34 (1).

  • L. Sweeney. Finding Lists of People on the Web. ACM Computers and Society. April 2004; 34 (1).

  • B. Malin and L. Sweeney. How (Not) to Protect Genomic Data Privacy in a Distributed Network: Using Trail Re-identification to Evaluate and Design Anonymity Protection Systems. Journal of Biomedical Informatics. 2004; 37(3): 179-192.


    Earlier

  • B. Malin. Correlating Web Usage of Health Information with Patient Medical Data. In Proceedings of the American Medical Informatics Association 2002 Annual Symposium. San Antonio, TX, Nov 2002: 484-488.

  • B. Malin and L. Sweeney. Inferring Genotype from Clinical Phenotype Through a Knowledge-based Algorithm. In Pacific Symposium on Biocomputing 2002. Lihue, HI, Jan 2002: 41-52.

  • L. Sweeney. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems. 2002; 10 (5): 557-570.

  • L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems. 2002; 10 (5): 571-588.

  • B. Malin and L. Sweeney. Re-identification of DNA Through an Automated Linkage Process. In Proceedings of the American Medical Informatics Association 2001 Annual Symposium. Washington, DC, Nov 2001: 423-7.


White Papers, Technical Reports, Published Citations, References


Related links



Copyright © 2011. President and Fellows Harvard University.   |   IQSS   |    Data Privacy Lab   |    [info@dataprivacylab.org]