Research Results |
CameraWatch |
Publicly available cameras observing people in public spaces
Method Application: camera views (Search, Submit), Demo |
SSNwatch |
Publicly available Social Security numbers
Method Application: Matching a person to their SSN, Demo |
Learning information about people and organizations
GenTree |
Learning semantically robust rules from data
Method Application: voter registration data |
Linking |
Learning sensitive information by linking de-identified and explicitly identified data
Method Application: health data Application: genomic data |
RosterFinder |
Locating lists of people on the web
Method Application: computer science undergraduates (ICU), Demo |
ScamSlam |
Learning the Criminal Relations Behind Scam Spam
Method Application: Internet Fraud |
Semantic Learning |
Sentiment Extraction from Text
Method Application: Personal Preferences |
Trails |
Learning where people have been by the trails of data they leave behind
Method Application: DNA sequences Application: web logs, Demo (Internet Explorer Only) |
Controlling what can be learned about people and organizations
Identifiability of data |
To how many people (or organizations) can a piece of data refer
Method: formal method Application: field-structured data, HIPAA certification Application: bioterrorism surveillance, HIPAA certification |
k-anonymity |
Entities (e.g., people, organizations) are made "truthfully" indistinct from
k-1 other entities in the data
Method: formal model, generalization, PCA Application: field-structured data: Datafly, demo Application: video data: k-Same, demo |
Multiparty Computation |
Multiparty Computation of Randomly Ordered Players Application: Distributed Surveillance Configurable Security Protocols Application: Secure List Comparison |
Scrub |
De-identifying textual documents such as email, notes and letters
Method Application: clinical notes and letters |
Privacy Technology Issues and Impact
Computer science research and privacy concerns |
Information explosion in data collection and data sharing |
For a more comprehesive list of research activities conducted at the Data Privacy Lab,
see Data Privacy Lab projects.
Related Data Privacy Lab links