Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 209,943,796 papers from all fields of science
Search
Sign In
Create Free Account
Personally identifiable information
Known as:
Personally-identifiable information
, Personal details
, Personally-identifying information
Expand
Personally identifiable information (PII), or sensitive personal information (SPI), as used in US privacy law and information security, is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Anonymous web browsing
Automatic number plate recognition
Big data
Browser security
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Deep Learning with Differential Privacy
Martín Abadi
,
Andy Chu
,
+4 authors
Li Zhang
Conference on Computer and Communications…
2016
Corpus ID: 207241585
Machine learning techniques based on neural networks are achieving remarkable results in a wide variety of domains. Often, the…
Expand
Highly Cited
2011
Highly Cited
2011
The PII Problem: Privacy and a New Concept of Personally Identifiable Information
P. Schwartz
,
Daniel J. Solove
2011
Corpus ID: 55008912
Personally identifiable information (PII) is one of the most central concepts in information privacy regulation. The scope of…
Expand
Highly Cited
2010
Highly Cited
2010
Myths and fallacies of "Personally Identifiable Information"
A. Narayanan
,
Vitaly Shmatikov
Communications of the ACM
2010
Corpus ID: 1641158
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and…
Expand
Highly Cited
2010
Highly Cited
2010
SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
E. McCallister
,
T. Grance
,
K. Scarfone
2010
Corpus ID: 150829370
The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable…
Expand
Highly Cited
2010
Highly Cited
2010
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
W. Enck
,
Peter Gilbert
,
+4 authors
Anmol Sheth
USENIX Symposium on Operating Systems Design and…
2010
Corpus ID: 433048
Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third…
Expand
Highly Cited
2009
Highly Cited
2009
On the leakage of personally identifiable information via online social networks
B. Krishnamurthy
,
C. Wills
CCRV
2009
Corpus ID: 9435183
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish…
Expand
Review
1999
Review
1999
to Contact Mechanics
J. Barbera
,
M. Ciavarellab
1999
Corpus ID: 16431579
Contact problems are central to Solid Mechanics, because contact is the principal method of applying loads to a deformable body…
Expand
Highly Cited
1999
Highly Cited
1999
Soft set theory—First results
D. Molodtsov
1999
Corpus ID: 119877597
Highly Cited
1998
Highly Cited
1998
Presentation Slides for 'Investor Psychology and Security Market Under and Overreactions'
Kent D. Daniel
,
D. Hirshleifer
,
A. Subrahmanyam
1998
Corpus ID: 32589687
We propose a theory of securities market under- and overreactions based on two well-known psychological biases: investor…
Expand
Review
1991
Review
1991
The Theory of Capital Structure
M. Harris
,
A. Raviv
1991
Corpus ID: 64643648
This paper surveys capital structure theories based on agency costs, asymmetric information, product/input market interactions…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE