Latanya Sweeney
#4,629
Most Influential Person Now
Computer scientist
Latanya Sweeney's AcademicInfluence.com Rankings
Latanya Sweeneycomputer-science Degrees
Computer Science
#335
World Rank
#348
Historical Rank
Database
#401
World Rank
#420
Historical Rank
Download Badge
Computer Science
Why Is Latanya Sweeney Influential?
(Suggest an Edit or Addition)According to Wikipedia, Latanya Arvette Sweeney is an American computer scientist. She is the Daniel Paul Professor of the Practice of Government and Technology at the Harvard Kennedy School and in the Harvard Faculty of Arts and Sciences at Harvard University. She is the founder and director of the Public Interest Tech Lab, founded in 2021 with a $3 million grant from the Ford Foundation as well as the Data Privacy Lab. She is the current Faculty Dean in Currier House at Harvard.
Latanya Sweeney's Published Works
Published Works
- k-Anonymity: A Model for Protecting Privacy (2002) (8020)
- Achieving k-Anonymity Privacy Protection Using Generalization and Suppression (2002) (2063)
- Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (1998) (1502)
- Generalizing data to provide anonymity when disclosing information (abstract) (1998) (862)
- Discrimination in online ad delivery (2013) (669)
- Simple Demographics Often Identify People Uniquely (2000) (493)
- Preserving privacy by de-identifying face images (2005) (460)
- Weaving Technology and Policy Together to Maintain Confidentiality (1997) (384)
- Replacing personally-identifying information in medical records, the Scrub system. (1996) (302)
- Guaranteeing anonymity when sharing medical data, the Datafly System (1997) (300)
- How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems (2004) (261)
- Identifying Participants in the Personal Genome Project by Name (2013) (204)
- Model-Based Face De-Identification (2006) (172)
- Computational disclosure control: a primer on data privacy protection (2001) (169)
- Datafly: A System for Providing Anonymity in Medical Data (1997) (162)
- Discrimination in Online Ad Delivery (2013) (159)
- Integrating Utility into Face De-identification (2005) (147)
- Matching Known Patients to Health Records in Washington State Data (2013) (89)
- Privacy Preserving Synthetic Data Release Using Deep Learning (2018) (81)
- Preserving Privacy by De-identifying Facial Images (2003) (80)
- Determining the identifiability of DNA database entries (2000) (76)
- Face De-identification (2009) (69)
- Re-identification of DNA through an automated linkage process (2001) (68)
- Patient-centered management of complex patients can reduce costs without shortening life. (2007) (67)
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY1 (2013) (61)
- Only You, Your Doctor, and Many Others May Know (2015) (60)
- Semi-supervised learning of multi-factor models for face de-identification (2008) (58)
- Email alias detection using social network analysis (2005) (58)
- Adaptive Gaussian Process for Short-Term Wind Speed Forecasting (2010) (42)
- Putting health IT on the path to success. (2013) (41)
- Sharing Sensitive Data with Confidence: The Datatags System (2015) (40)
- DataTags, Data Handling Policy Spaces and the Tags Language (2016) (40)
- New Directions in Contact Free Hand Recognition (2007) (40)
- Automating Open Science for Big Data (2015) (36)
- Privacy-enhanced linking (2005) (32)
- Re-identification Risks in HIPAA Safe Harbor Data: A study of data from one environmental health study. (2017) (30)
- Computational Disclosure Control for Medical Microdata (1997) (29)
- Protecting job seekers from identity theft (2006) (28)
- Trail Re-Identification: Learning Who You Are From Where You Have Been (2003) (26)
- Robust Hand Geometry Measurements for Person Identification using Active Appearance Models (2007) (25)
- Finding lists of people on the web (2004) (25)
- Inferring Genotype from Clinical Phenotype through a Knowledge Based Algorithm (2001) (25)
- A Secure Protocol to Distribute Unlinkable Health Data (2005) (24)
- Mining Images in Publicly-Available Cameras for Homeland Security (2005) (23)
- Towards Real-World Face De-Identification (2007) (21)
- Risks to Patient Privacy: A Re-identification of Patients in Maine and Vermont Statewide Hospital Data (2018) (20)
- Three Computational Systems for Disclosing Medical Data in the Year 1999 (1998) (19)
- Navigating computer science research through waves of privacy concerns: discussions among computer scientists at Carnegie Mellon University (2004) (19)
- Consumer-mediated health information exchanges: The 2012 ACMI debate (2014) (17)
- Saying it’s Anonymous Doesn't Make It So: Re-identifications of “anonymized” law school data (2018) (17)
- AI Technologies to Defeat Identity Theft Vulnerabilities (2005) (17)
- Trail re-identification and unlinkability in distributed databases (2006) (14)
- Towards the optimal suppression of details when disclosing medical data, the use of sub-combination analysis (1998) (13)
- Practical Differentially Private Modeling of Human Movement Data (2016) (13)
- Foundations of Privacy Protection from a Computer Science Perspective (2000) (11)
- Survey of Publicly Available State Health Databases (2013) (10)
- A Multiparty Computation for Randomly Ordering Players and Making Random Selections (2004) (10)
- Privacy-Preserving Surveillance Using Selective Revelation (2005) (9)
- That's AI? A History and Critique of the Field (2003) (8)
- ENRES : A Semantic Framework for Entity Resolution Modelling (2005) (8)
- Privacy-Preserving Surveillance Using Databases from Daily Life (2005) (8)
- Patient Identifiability in Pharmaceutical Marketing Data (2011) (6)
- Privacy Risks of Sharing Data from Environmental Health Studies (2020) (6)
- Speech Perception Using Real-Time Phoneme Detection: The BeBe System (1998) (5)
- Composition and Disclosure of Unlinkable Distributed Databases (2006) (5)
- Maintaining Patient Confidentiality When Sharing Medical Data Requires a Symbiotic Relationship Between Technology and Policy (1997) (5)
- An Open Science Platform for the Next Generation of Data (2013) (4)
- Voter Identity Theft: Submitting Changes to Voter Registrations Online to Disrupt Elections (2017) (4)
- Homeland Security (2005) (4)
- Model-Based De-Identification of Facial Images (2008) (3)
- Privacy and medical-records research. (1998) (3)
- Adding Semantics and Rigor to Association Rule Learning: the GenTree Approach (2005) (3)
- Technologies to Defeat Fraudulent Schemes Related to Email Requests (2005) (3)
- Risk Assessments of Personal Identification Technologies for Domestic Violence Homeless Shelters (2005) (3)
- Face de-identification using multi-factor active appearance models (2008) (2)
- Electronic Disease Surveillance and Reporting: The eReport System (2001) (2)
- Compromising Privacy in Distributed Population-Based Databases with Trail Matching : A DNA Example (2002) (2)
- Demonstration of a Privacy-Preserving System that Performs an Unduplicated Accounting of Services across Homeless Programs (2008) (2)
- HandShot: A Fast 3-D Imaging System for Capturing Fingerprints, Palm Prints and Hand Geometry (2004) (2)
- 2D Image Database Indexing: A Coefficient-Based Approach (2007) (2)
- From Sensor Network To Social NetworkÐ A Study On The Energy Impact In Buildings (2009) (1)
- Temporal Maximum Margin Markov Network (2010) (1)
- RobustHandGeometry Measurements forPersonIdentification using Active Appearance Models (2007) (0)
- The Medical Billing Framework as the Backbone of the National Health Information Infrastructure (2009) (0)
- Extracting Names from Websites Containing Lists of People (2006) (0)
- Trends & Controversies Using Social Science Technology to Understand and Counter the 21st-century Strategic Threat Ieee Intelligent Systems Challenges of 21st-century Warfare How Social Science Technology Can Help Population Resources Technology Master Variables Violent Conflict Lateral Pressure Int (2005) (0)
- An Intelligent Tutor for Teaching Basic Computer Science and Java Programming to Medical Informatics Students (1999) (0)
- Y2K BEACON: An Intelligent Web-Based Crisis Center for Disseminating Year 2000 Biomedical Equipment Compliance Information (1999) (0)
- Sprees, a finite-state orthographic learning system that recognizes and generates phonologically similar spellings (1997) (0)
- Power Learning: Using Computers as Teaching Machines (1998) (0)
- Structure preserving semantic coherent object segmentation (2010) (0)
- Learning Semantically Robust Rules from Data (2004) (0)
- Introduction * 0 1. the Trade-off Dilemma Confidentiality, Disclosure, and Data Access 2. Fundamental Concepts Data Structures Disclosure Limitation Methods 3. the Contribution of the Book Public Access through Data Manipulation (0)
- Keynote 1 (2021) (0)
- Locating Lists of People on the Web: RosterFinder (2003) (0)
- ACMI Debate: AMIA Symposium 2012 - Chicago, Illinois (2012) (0)
This paper list is powered by the following services:
Other Resources About Latanya Sweeney
What Schools Are Affiliated With Latanya Sweeney?
Latanya Sweeney is affiliated with the following schools: