|
|
|
![]() |
Research Results |
| CameraWatch |
Publicly available cameras observing people in public spaces
Method Application: camera views (Search, Submit), Demo |
| SSNwatch |
Publicly available Social Security numbers
Method Application: Matching a person to their SSN, Demo |
Learning information about people and organizations
| GenTree |
Learning semantically robust rules from data
Method Application: voter registration data |
| Linking |
Learning sensitive information by linking de-identified and explicitly identified data
Method Application: health data Application: genomic data |
| RosterFinder |
Locating lists of people on the web
Method Application: computer science undergraduates (ICU), Demo |
| ScamSlam |
Learning the Criminal Relations Behind Scam Spam
Method Application: Internet Fraud |
| Semantic Learning |
Sentiment Extraction from Text
Method Application: Personal Preferences |
| Trails |
Learning where people have been by the trails of data they leave behind
Method Application: DNA sequences Application: web logs, Demo (Internet Explorer Only) |
Controlling what can be learned about people and organizations
| Identifiability of data |
To how many people (or organizations) can a piece of data refer
Method: formal method Application: field-structured data, HIPAA certification Application: bioterrorism surveillance, HIPAA certification |
| k-anonymity |
Entities (e.g., people, organizations) are made "truthfully" indistinct from
k-1 other entities in the data
Method: formal model, generalization, PCA Application: field-structured data: Datafly, demo Application: video data: k-Same, demo |
| Multiparty Computation |
Multiparty Computation of Randomly Ordered Players Application: Distributed Surveillance Configurable Security Protocols Application: Secure List Comparison |
| Scrub |
De-identifying textual documents such as email, notes and letters
Method Application: clinical notes and letters |
Privacy Technology Issues and Impact
| Computer science research and privacy concerns |
| Information explosion in data collection and data sharing |
For a more comprehesive list of research activities conducted at the Data Privacy Lab,
see Data Privacy Lab projects.
Related Data Privacy Lab links