katsomallos2022landmark: Updated the status
This commit is contained in:
parent
96a34c6d90
commit
a3cf9bf94e
@ -995,7 +995,7 @@
|
|||||||
author = {Katsomallos, Manos and Tzompanaki, Katerina and Kotzinos, Dimitris},
|
author = {Katsomallos, Manos and Tzompanaki, Katerina and Kotzinos, Dimitris},
|
||||||
booktitle = {Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy},
|
booktitle = {Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy},
|
||||||
year = {2022},
|
year = {2022},
|
||||||
note = {Under review}
|
note = {To appear}
|
||||||
}
|
}
|
||||||
|
|
||||||
@inproceedings{kellaris2013practical,
|
@inproceedings{kellaris2013practical,
|
||||||
|
@ -31,4 +31,4 @@ We presented ($\varepsilon$, $L$)-\emph{{\thething} privacy}, a novel privacy no
|
|||||||
We showed that our methodology can provide adequate differential privacy guarantees while achieving better data utility than the user-level scheme.
|
We showed that our methodology can provide adequate differential privacy guarantees while achieving better data utility than the user-level scheme.
|
||||||
\end{itemize}
|
\end{itemize}
|
||||||
% \kat{mention here again that the work appears in the article... submitted at...}
|
% \kat{mention here again that the work appears in the article... submitted at...}
|
||||||
This work is under review for being published in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.
|
This work will appear in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
\chapter{Evaluation}
|
\chapter{Evaluation}
|
||||||
\label{ch:eval}
|
\label{ch:eval}
|
||||||
\nnfootnote{This chapter is under review for being published in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.\bigskip}
|
\nnfootnote{This chapter will appear in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.\bigskip}
|
||||||
|
|
||||||
In this chapter, we present the experiments that we performed in order to evaluate {\thething} privacy (Chapter~\ref{ch:lmdk-prv}) on real and synthetic data sets.
|
In this chapter, we present the experiments that we performed in order to evaluate {\thething} privacy (Chapter~\ref{ch:lmdk-prv}) on real and synthetic data sets.
|
||||||
Section~\ref{sec:eval-dtl} contains all the details regarding the data sets the we used for our experiments along with the system configurations.
|
Section~\ref{sec:eval-dtl} contains all the details regarding the data sets the we used for our experiments along with the system configurations.
|
||||||
|
@ -44,6 +44,6 @@ Furthermore, we estimate the impact of the privacy-preserving dummy {\thething}
|
|||||||
|
|
||||||
The second and the third contributions are described in the article~\cite{katsomallos2022landmark},
|
The second and the third contributions are described in the article~\cite{katsomallos2022landmark},
|
||||||
% \kat{cite the technical report}
|
% \kat{cite the technical report}
|
||||||
which is submitted at the research papers track
|
which will appear at the research papers track
|
||||||
% \kat{name the conference}
|
% \kat{name the conference}
|
||||||
of the $12$th ACM conference on Data and Application Security and Privacy.
|
of the $12$th ACM conference on Data and Application Security and Privacy.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
\chapter{{\Thething} privacy}
|
\chapter{{\Thething} privacy}
|
||||||
\label{ch:lmdk-prv}
|
\label{ch:lmdk-prv}
|
||||||
\nnfootnote{This chapter is under review for being published in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.}
|
\nnfootnote{This chapter will appear in the proceedings of the $12$th ACM conference on Data and Application Security and Privacy~\cite{katsomallos2022landmark}.}
|
||||||
|
|
||||||
% Crowdsensing applications
|
% Crowdsensing applications
|
||||||
The plethora of sensors currently embedded in personal devices and other infrastructures have paved the way for the development of numerous \emph{crowdsensing services} (e.g.,~Ring~\cite{ring}, TousAntiCovid~\cite{tousanticovid}, Waze~\cite{waze}, etc.) based on the collected personal, and usually geotagged and timestamped data.
|
The plethora of sensors currently embedded in personal devices and other infrastructures have paved the way for the development of numerous \emph{crowdsensing services} (e.g.,~Ring~\cite{ring}, TousAntiCovid~\cite{tousanticovid}, Waze~\cite{waze}, etc.) based on the collected personal, and usually geotagged and timestamped data.
|
||||||
|
Loading…
Reference in New Issue
Block a user