katsomallos2022landmark: Updated the status
This commit is contained in:
parent
96a34c6d90
commit
a3cf9bf94e
@ -995,7 +995,7 @@
|
||||
author = {Katsomallos, Manos and Tzompanaki, Katerina and Kotzinos, Dimitris},
|
||||
booktitle = {Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy},
|
||||
year = {2022},
|
||||
note = {Under review}
|
||||
note = {To appear}
|
||||
}
|
||||
|
||||
@inproceedings{kellaris2013practical,
|
||||
|
@ -31,4 +31,4 @@ We presented ($\varepsilon$, $L$)-\emph{{\thething} privacy}, a novel privacy no
|
||||
We showed that our methodology can provide adequate differential privacy guarantees while achieving better data utility than the user-level scheme.
|
||||
\end{itemize}
|
||||
% \kat{mention here again that the work appears in the article... submitted at...}
|
||||
This work is under review for being published in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.
|
||||
This work will appear in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.
|
||||
|
@ -1,6 +1,6 @@
|
||||
\chapter{Evaluation}
|
||||
\label{ch:eval}
|
||||
\nnfootnote{This chapter is under review for being published in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.\bigskip}
|
||||
\nnfootnote{This chapter will appear in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.\bigskip}
|
||||
|
||||
In this chapter, we present the experiments that we performed in order to evaluate {\thething} privacy (Chapter~\ref{ch:lmdk-prv}) on real and synthetic data sets.
|
||||
Section~\ref{sec:eval-dtl} contains all the details regarding the data sets the we used for our experiments along with the system configurations.
|
||||
|
@ -44,6 +44,6 @@ Furthermore, we estimate the impact of the privacy-preserving dummy {\thething}
|
||||
|
||||
The second and the third contributions are described in the article~\cite{katsomallos2022landmark},
|
||||
% \kat{cite the technical report}
|
||||
which is submitted at the research papers track
|
||||
which will appear at the research papers track
|
||||
% \kat{name the conference}
|
||||
of the $12$th ACM conference on Data and Application Security and Privacy.
|
||||
|
@ -1,6 +1,6 @@
|
||||
\chapter{{\Thething} privacy}
|
||||
\label{ch:lmdk-prv}
|
||||
\nnfootnote{This chapter is under review for being published in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.}
|
||||
\nnfootnote{This chapter will appear in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.}
|
||||
|
||||
% Crowdsensing applications
|
||||
The plethora of sensors currently embedded in personal devices and other infrastructures have paved the way for the development of numerous \emph{crowdsensing services} (e.g.,~Ring~\cite{ring}, TousAntiCovid~\cite{tousanticovid}, Waze~\cite{waze}, etc.) based on the collected personal, and usually geotagged and timestamped data.
|
||||
|
Loading…
Reference in New Issue
Block a user