{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:24:09Z","timestamp":1762341849465,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511501","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"179-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Landmark Privacy: Configurable Differential Privacy Protection for Time Series"],"prefix":"10.1145","author":[{"given":"Manos","family":"Katsomallos","sequence":"first","affiliation":[{"name":"ETIS UMR 8051, CY Cergy Paris University, ENSEA, CNRS, Cergy-Pontoise, France"}]},{"given":"Katerina","family":"Tzompanaki","sequence":"additional","affiliation":[{"name":"ETIS UMR 8051, CY Cergy Paris University, ENSEA, CNRS, Cergy-Pontoise, France"}]},{"given":"Dimitris","family":"Kotzinos","sequence":"additional","affiliation":[{"name":"ETIS UMR 8051, CY Cergy Paris University, ENSEA, CNRS, Cergy-Pontoise, France"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Accessed on October 11 2021. Ring. https:\/\/ring.com  Accessed on October 11 2021. Ring. https:\/\/ring.com","DOI":"10.1016\/S1350-4789(21)00110-0"},{"key":"e_1_3_2_2_2_1","unstructured":"Accessed on October 11 2021. TousAntiCovid. https:\/\/bonjour.tousanticovid.gouv.fr  Accessed on October 11 2021. TousAntiCovid. https:\/\/bonjour.tousanticovid.gouv.fr"},{"key":"e_1_3_2_2_3_1","unstructured":"Accessed on October 11 2021. Waze. https:\/\/waze.com  Accessed on October 11 2021. Waze. https:\/\/waze.com"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010226"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/3287990.3288056"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2448496.2448530"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2015.15"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2824328"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382263"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134102"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","key":"e_1_3_2_2_13_1","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating noise to sensitivity in private data analysis . In Theory of cryptography conference . Springer , 265--284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth etal 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3--4 (2014) 211--407.  Cynthia Dwork Aaron Roth et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3--4 (2014) 211--407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.96"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS48487.2020.00008"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119387596"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868470.1868479"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218422"},{"key":"e_1_3_2_2_21_1","first-page":"57","article-title":"Privacy, Space and Time: a Survey on Privacy-Preserving Continuous Data Publishing","volume":"2019","author":"Katsomallos Manos","year":"2019","unstructured":"Manos Katsomallos , Katerina Tzompanaki , and Dimitris Kotzinos . 2019 . Privacy, Space and Time: a Survey on Privacy-Preserving Continuous Data Publishing . Journal of Spatial Information Science 2019 , 19 (2019), 57 -- 103 . Manos Katsomallos, Katerina Tzompanaki, and Dimitris Kotzinos. 2019. Privacy, Space and Time: a Survey on Privacy-Preserving Continuous Data Publishing. Journal of Spatial Information Science 2019, 19 (2019), 57--103.","journal-title":"Journal of Spatial Information Science"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732989"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.03.015"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463434.1463477"},{"key":"e_1_3_2_2_26_1","volume-title":"HUE: The hourly usage of energy dataset for buildings in British Columbia. Technical Report.","author":"Makonin Stephen","year":"2018","unstructured":"Stephen Makonin . 2018 . HUE: The hourly usage of energy dataset for buildings in British Columbia. Technical Report. Stephen Makonin. 2018. HUE: The hourly usage of energy dataset for buildings in British Columbia. Technical Report."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVA.2015.7153234"},{"key":"e_1_3_2_2_30_1","volume-title":"Sonia Ben Mokhtar, and Lionel Brunie","author":"Primault Vincent","year":"2018","unstructured":"Vincent Primault , Antoine Boutet , Sonia Ben Mokhtar, and Lionel Brunie . 2018 . The Long Road to Computational Location Privacy: A Survey. IEEE Communications Surveys & Tutorials ( 2018). Vincent Primault, Antoine Boutet, Sonia Ben Mokhtar, and Lionel Brunie. 2018. The Long Road to Computational Location Privacy: A Survey. IEEE Communications Surveys & Tutorials (2018)."},{"key":"e_1_3_2_2_31_1","unstructured":"Jon Russell. 2018. Fitness app Strava exposes the location of military bases. https:\/\/techcrunch.com\/2018\/01\/28\/strava-exposes-military-bases. Accessed on October 11 2021.  Jon Russell. 2018. Fitness app Strava exposes the location of military bases. https:\/\/techcrunch.com\/2018\/01\/28\/strava-exposes-military-bases. Accessed on October 11 2021."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-019-0325-x"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057432.1057456"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30056-3"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.02.004"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01834-3"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.002"},{"volume-title":"26th {USENIX} Security Symposium ({USENIX} Security 17). 729--745.","author":"Wang Tianhao","key":"e_1_3_2_2_38_1","unstructured":"Tianhao Wang , Jeremiah Blocki , Ninghui Li , and Somesh Jha . 2017. Locally differentially private protocols for frequency estimation . In 26th {USENIX} Security Symposium ({USENIX} Security 17). 729--745. Tianhao Wang, Jeremiah Blocki, Ninghui Li, and Somesh Jha. 2017. Locally differentially private protocols for frequency estimation. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 729--745."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869807"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511501","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511501"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":40,"alternative-id":["10.1145\/3508398.3511501","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511501","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}