Author of the publication

DataTags, Data Handling Policy Spaces and the Tags Language.

, , and . IEEE Symposium on Security and Privacy Workshops, page 1-8. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sweeney, Latanya
add a person with the name Sweeney, Latanya
 

Other publications of authors with the same name

Model-Based De-Identification of Facial Images., , , , and . AMIA, AMIA, (2008)A Secure Protocol to Distribute Unlinkable Health Data., and . AMIA, AMIA, (2005)AI Technologies to Defeat Identity Theft Vulnerabilities.. AAAI Spring Symposium: AI Technologies for Homeland Security, page 136-138. AAAI, (2005)Technologies to Defeat Fraudulent Schemes Related to Email Requests., , and . AAAI Spring Symposium: AI Technologies for Homeland Security, page 133-135. AAAI, (2005)Identifying Participants in the Personal Genome Project by Name (A Re-identification Experiment), , and . CoRR, (2013)Matching Known Patients to Health Records in Washington State Data.. CoRR, (2013)Adaptive Gaussian Process for Short-Term Wind Speed Forecasting., , , and . ECAI, volume 215 of Frontiers in Artificial Intelligence and Applications, page 661-666. IOS Press, (2010)Privacy Preserving Synthetic Data Release Using Deep Learning., , , , and . ECML/PKDD (1), volume 11051 of Lecture Notes in Computer Science, page 510-526. Springer, (2018)Re-identification of DNA through an automated linkage process., and . AMIA, AMIA, (2001)Datafly: A System for Providing Anonymity in Medical Data.. DBSec, volume 113 of IFIP Conference Proceedings, page 356-381. Chapman & Hall, (1997)