default search action
Kristen LeFevre
Person information
- affiliation: University of Michigan, Ann Arbor, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j8]Daniel Fabbri, Kristen LeFevre:
Explaining accesses to electronic medical records using diagnosis information. J. Am. Medical Informatics Assoc. 20(1): 52-60 (2013) - [c18]Jessica Staddon, Alessandro Acquisti, Kristen LeFevre:
Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy Paradox. SocialCom 2013: 295-302 - [e2]Kristen LeFevre, Ashwin Machanavajjhala, Adam Silberstein:
Proceedings of the 3rd ACM SIGMOD Workshop on Databases and Social Networks, DBSocial 2013, New York, NY, USA, June, 23, 2013. ACM 2013, ISBN 978-1-4503-2191-4 [contents] - 2012
- [c17]Alessandra Mazzia, Kristen LeFevre, Eytan Adar:
The PViz comprehension tool for social network privacy settings. SOUPS 2012: 13 - [c16]Lujun Fang, Alex Fabrikant, Kristen LeFevre:
Look who I found: understanding the effects of sharing curated friend groups. WebSci 2012: 95-104 - [e1]Denilson Barbosa, Kristen LeFevre, Evimaria Terzi:
Proceedings of the 2nd ACM SIGMOD Workshop on Databases and Social Networks, DBSocial 2012, Scottsdale, AZ, USA, May 20, 2012. ACM 2012, ISBN 978-1-4503-1495-4 [contents] - 2011
- [j7]Daniel Fabbri, Kristen LeFevre:
Explanation-Based Auditing. Proc. VLDB Endow. 5(1): 1-12 (2011) - [c15]Rajesh Bejugam, Kristen LeFevre:
enList: Automatically Simplifying Privacy Policies. ICDM Workshops 2011: 620-627 - [c14]Steven Pelley, Kristen LeFevre, Thomas F. Wenisch:
Do Query Optimizers Need to be SSD-aware? ADMS@VLDB 2011: 44-51 - [r2]Kristen LeFevre, Bee-Chung Chen:
Adversarial/External Knowledge (Privacy in the Presence of). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 24-26 - [r1]Tyrone Grandison, Kristen LeFevre:
Hippocratic Database. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 556-559 - [i1]Daniel Fabbri, Kristen LeFevre:
Explanation-Based Auditing. CoRR abs/1109.6880 (2011) - 2010
- [j6]Quang Duong, Kristen LeFevre, Michael P. Wellman:
Strategic Modeling of Information Sharing among Data Privacy Attackers. Informatica (Slovenia) 34(2): 151-158 (2010) - [j5]Daniel Fabbri, Kristen LeFevre, Qiang Zhu:
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting. Proc. VLDB Endow. 3(1): 36-47 (2010) - [j4]Li Qian, Kristen LeFevre, H. V. Jagadish:
CRIUS: User-Friendly Database Design. Proc. VLDB Endow. 4(2): 81-92 (2010) - [c13]Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami:
A privacy recommendation wizard for users of social networking sites. CCS 2010: 630-632 - [c12]Lujun Fang, Kristen LeFevre:
Splash: ad-hoc querying of data and statistical models. EDBT 2010: 275-286 - [c11]Wen Jin, Kristen LeFevre, Jignesh M. Patel:
An online framework for publishing privacy-sensitive location traces. MobiDE 2010: 1-8 - [c10]Kristen LeFevre, Evimaria Terzi:
GraSS: Graph Structure Summarization. SDM 2010: 454-465 - [c9]Lujun Fang, Kristen LeFevre:
Privacy wizards for social networking sites. WWW 2010: 351-360
2000 – 2009
- 2009
- [j3]Bee-Chung Chen, Daniel Kifer, Kristen LeFevre, Ashwin Machanavajjhala:
Privacy-Preserving Data Publishing. Found. Trends Databases 2(1-2): 1-167 (2009) - [j2]Bee-Chung Chen, Kristen LeFevre, Raghu Ramakrishnan:
Adversarial-knowledge dimensions in data privacy. VLDB J. 18(2): 429-467 (2009) - [c8]Jing Zhang, Adriane Chapman, Kristen LeFevre:
Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance. Secure Data Management 2009: 17-32 - [c7]Daniel Fabbri, Arnab Nandi, Kristen LeFevre, H. V. Jagadish:
PrivatePond: Outsourced Management of Web Corpuses. WebDB 2009 - 2008
- [j1]Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan:
Workload-aware anonymization techniques for large-scale datasets. ACM Trans. Database Syst. 33(3): 17:1-17:47 (2008) - 2007
- [c6]Bee-Chung Chen, Raghu Ramakrishnan, Kristen LeFevre:
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge. VLDB 2007: 770-781 - 2006
- [c5]Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan:
Mondrian Multidimensional K-Anonymity. ICDE 2006: 25 - [c4]Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan:
Workload-aware anonymization. KDD 2006: 277-286 - 2005
- [c3]Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan:
Incognito: Efficient Full-Domain K-Anonymity. SIGMOD Conference 2005: 49-60 - 2004
- [c2]Rakesh Agrawal, Ameet Kini, Kristen LeFevre, Amy Wang, Yirong Xu, Diana Zhou:
Managing Healthcare Data Hippocratically. SIGMOD Conference 2004: 947-948 - [c1]Kristen LeFevre, Rakesh Agrawal, Vuk Ercegovac, Raghu Ramakrishnan, Yirong Xu, David J. DeWitt:
Limiting Disclosure in Hippocratic Databases. VLDB 2004: 108-119
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint