text: Updated references
This commit is contained in:
parent
fd9e19f10d
commit
784cc704ef
@ -1,6 +1,6 @@
|
|||||||
\chapter{Evaluation}
|
\chapter{Evaluation}
|
||||||
\label{ch:eval}
|
\label{ch:eval}
|
||||||
\nnfootnote{This chapter is under review for being published in the proceedings of the $12$th ACM Conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.\bigskip}
|
\nnfootnote{This chapter is under review for being published in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.\bigskip}
|
||||||
|
|
||||||
In this chapter, we present the experiments that we performed in order to evaluate {\thething} privacy (Chapter~\ref{ch:lmdk-prv}) on real and synthetic data sets.
|
In this chapter, we present the experiments that we performed in order to evaluate {\thething} privacy (Chapter~\ref{ch:lmdk-prv}) on real and synthetic data sets.
|
||||||
Section~\ref{sec:eval-dtl} contains all the details regarding the data sets the we used for our experiments along with the system configurations.
|
Section~\ref{sec:eval-dtl} contains all the details regarding the data sets the we used for our experiments along with the system configurations.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
\chapter{{\Thething} privacy}
|
\chapter{{\Thething} privacy}
|
||||||
\label{ch:lmdk-prv}
|
\label{ch:lmdk-prv}
|
||||||
\nnfootnote{This chapter is under review for being published in the proceedings of the $12$th ACM Conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.}
|
\nnfootnote{This chapter is under review for being published in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.}
|
||||||
|
|
||||||
% Crowdsensing applications
|
% Crowdsensing applications
|
||||||
The plethora of sensors currently embedded in personal devices and other infrastructures have paved the way for the development of numerous \emph{crowdsensing services} (e.g.,~Ring~\cite{ring}, TousAntiCovid~\cite{tousanticovid}, Waze~\cite{waze}, etc.) based on the collected personal, and usually geotagged and timestamped data.
|
The plethora of sensors currently embedded in personal devices and other infrastructures have paved the way for the development of numerous \emph{crowdsensing services} (e.g.,~Ring~\cite{ring}, TousAntiCovid~\cite{tousanticovid}, Waze~\cite{waze}, etc.) based on the collected personal, and usually geotagged and timestamped data.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
\chapter{Related work}
|
\chapter{Related work}
|
||||||
\label{ch:rel}
|
\label{ch:rel}
|
||||||
\nnfootnote{This chapter was published in the $19$th Journal of Spatial Information Science~\cite{katsomallos2019privacy}.}
|
\nnfootnote{This chapter appeared in the special feature on Geospatial Privacy and Security of the $19$th journal of Spatial Information Science~\cite{katsomallos2019privacy}.}
|
||||||
% \kat{Change the way you introduce the related work chapter; do not list a series of surveys. You should speak about the several directions for privacy-preserving methods (and then citing the surveys if you want). Then, you should focus on the particular configuration that you are interested in (continual observation). Summarize what we will see in the next sections by giving also the general structure of the chapter.}
|
% \kat{Change the way you introduce the related work chapter; do not list a series of surveys. You should speak about the several directions for privacy-preserving methods (and then citing the surveys if you want). Then, you should focus on the particular configuration that you are interested in (continual observation). Summarize what we will see in the next sections by giving also the general structure of the chapter.}
|
||||||
% \mk{Moved to summary}
|
% \mk{Moved to summary}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user