{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T20:10:05Z","timestamp":1755893405913,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Social Fund through the Regional Operational Program Centro 2020 of Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia (FCT)","award":["UID\/CEC\/00326\/2020"],"award-info":[{"award-number":["UID\/CEC\/00326\/2020"]}]},{"name":"European Structural and Investment Funds in the FEDER component, through the Operational Competitiveness and Internationalization Programme (COMPETE 2020) and Portugal 2020","award":["Project n\u00b0 047264, Funding Reference POCI-01-0247-FEDER-047264"],"award-info":[{"award-number":["Project n\u00b0 047264, Funding Reference POCI-01-0247-FEDER-047264"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["LA\/P\/0063\/2020"],"award-info":[{"award-number":["LA\/P\/0063\/2020"]}]},{"name":"Smart Networks and Services Joint Undertaking (SNS JU) under the European Union?s Horizon Europe research and innovation programme","award":["101096110"],"award-info":[{"award-number":["101096110"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia (FCT)","award":["2020.04714.BD"],"award-info":[{"award-number":["2020.04714.BD"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,19]]},"DOI":"10.1145\/3626232.3653284","type":"proceedings-article","created":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T18:20:25Z","timestamp":1718043625000},"page":"319-324","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data Types"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8920-8128","authenticated-orcid":false,"given":"Mariana","family":"Cunha","sequence":"first","affiliation":[{"name":"CISUC &amp; CRACS\/INESC TEC, and Department of Computer Science, University of Porto, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4119-0694","authenticated-orcid":false,"given":"Guilherme","family":"Duarte","sequence":"additional","affiliation":[{"name":"CISUC &amp; CRACS\/INESC TEC, and Department of Computer Science, University of Porto, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3406-9375","authenticated-orcid":false,"given":"Ricardo","family":"Andrade","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2077-7223","authenticated-orcid":false,"given":"Ricardo","family":"Mendes","sequence":"additional","affiliation":[{"name":"CISUC &amp; Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5805-1351","authenticated-orcid":false,"given":"Jo\u00e3o P.","family":"Vilela","sequence":"additional","affiliation":[{"name":"CISUC &amp; CRACS\/INESC TEC, and Department of Computer Science, University of Porto, Coimbra, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2024,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Science","volume":"347","author":"Acquisti Alessandro","year":"2015","unstructured":"Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science, Vol. 347, 6221 (2015), 509--514."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1534-x"},{"volume-title":"Privacy-Preserving Face Detection: A Comprehensive Analysis of Face Anonymization Techniques. Master's thesis","author":"Andrade Ricardo","key":"e_1_3_2_1_3_1","unstructured":"Ricardo Andrade. 2023. Privacy-Preserving Face Detection: A Comprehensive Analysis of Face Anonymization Techniques. Master's thesis. University of Porto."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432699"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2019.8888111"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100403"},{"key":"e_1_3_2_1_8_1","unstructured":"Dawson-Haggerty et al. 2019. trimesh. https:\/\/trimsh.org\/"},{"key":"e_1_3_2_1_9_1","volume-title":"Unique in the crowd: The privacy bounds of human mobility. Scientific reports","author":"De Montjoye Yves-Alexandre","year":"2013","unstructured":"Yves-Alexandre De Montjoye, C\u00e9sar A Hidalgo, Michel Verleysen, and Vincent D Blondel. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific reports, Vol. 3, 1 (2013), 1--5."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605098.3636050"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2010.170"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568260"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2647967"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_22"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3096024"},{"key":"e_1_3_2_1_17_1","volume-title":"Velocity-Aware Geo-Indistinguishability. In Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","author":"Mendes Ricardo","year":"2023","unstructured":"Ricardo Mendes, Mariana Cunha, and Jo ao P. Vilela. 2023. Velocity-Aware Geo-Indistinguishability. In Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy (Charlotte, NC, USA) (CODASPY '23). Association for Computing Machinery, New York, NY, USA, 141--152."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0032"},{"key":"e_1_3_2_1_19_1","volume-title":"Privacy-Preserving Data Mining: Methods, Metrics, and Applications","author":"Mendes Ricardo","year":"2017","unstructured":"Ricardo Mendes and Jo ao P. Vilela. 2017. Privacy-Preserving Data Mining: Methods, Metrics, and Applications. IEEE Access , Vol. 5 (June 2017), 10562--10582."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653771.1653818"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00038"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.15783\/C7J010"},{"key":"e_1_3_2_1_23_1","volume-title":"AMIA Annual Symposium Proceedings","volume":"2014","author":"Prasser Fabian","year":"2014","unstructured":"Fabian Prasser, Florian Kohlmayer, Ronald Lautenschl\"ager, and Klaus A Kuhn. 2014. Arx-a comprehensive tool for anonymizing biomedical data. In AMIA Annual Symposium Proceedings, Vol. 2014. American Medical Informatics Association, 984."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00091"},{"key":"e_1_3_2_1_25_1","unstructured":"Pierangela Samarati and Latanya Sweeney. 1998. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report. technical report SRI International."},{"key":"e_1_3_2_1_26_1","volume-title":"LightFace: A Hybrid Deep Face Recognition Framework. In 2020 Innovations in Intelligent Systems and Applications Conference (ASYU). IEEE, 23--27","author":"Serengil Sefik Ilkin","year":"2020","unstructured":"Sefik Ilkin Serengil and Alper Ozpinar. 2020. LightFace: A Hybrid Deep Face Recognition Framework. In 2020 Innovations in Intelligent Systems and Applications Conference (ASYU). IEEE, 23--27."},{"key":"e_1_3_2_1_27_1","volume-title":"Location Privacy Meter. https:\/\/github.com\/privacytrustlab\/location_privacy_meter","author":"Shokri Reza","year":"2023","unstructured":"Reza Shokri and Vincent Bindschaedler. 2021. Location Privacy Meter. https:\/\/github.com\/privacytrustlab\/location_privacy_meter. Accessed: Dec 2023."},{"volume-title":"3rd Hot Topics in Privacy Enhancing Technologies.","author":"Shokri Reza","key":"e_1_3_2_1_28_1","unstructured":"Reza Shokri, Julien Freudiger, and Jean-Pierre Hubaux. 2010. A Unified Framework for Location Privacy. In 3rd Hot Topics in Privacy Enhancing Technologies."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.01450"},{"key":"e_1_3_2_1_32_1","unstructured":"The United Nations. 1948. Universal Declaration of Human Rights."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.004"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3274359"},{"key":"e_1_3_2_1_36_1","volume-title":"Geolife GPS trajectory dataset - User Guide. https:\/\/www.microsoft.com\/en-us\/research\/publication\/geolife-gps-trajectory-dataset-user-guide\/ Accessed","author":"Zheng Yu","year":"2023","unstructured":"Yu Zheng, Hao Fu, Xing Xie, Wei-Ying Ma, and Quannan Li. 2011. Geolife GPS trajectory dataset - User Guide. https:\/\/www.microsoft.com\/en-us\/research\/publication\/geolife-gps-trajectory-dataset-user-guide\/ Accessed: Dec 2023."},{"key":"e_1_3_2_1_37_1","volume-title":"Open3D: A Modern Library for 3D Data Processing. arXiv:1801.09847","author":"Zhou Qian-Yi","year":"2018","unstructured":"Qian-Yi Zhou, Jaesik Park, and Vladlen Koltun. 2018. Open3D: A Modern Library for 3D Data Processing. arXiv:1801.09847 (2018)."}],"event":{"name":"CODASPY '24: Fourteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Porto Portugal","acronym":"CODASPY '24"},"container-title":["Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3626232.3653284","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3626232.3653284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:48:34Z","timestamp":1755892114000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3626232.3653284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":37,"alternative-id":["10.1145\/3626232.3653284","10.1145\/3626232"],"URL":"https:\/\/doi.org\/10.1145\/3626232.3653284","relation":{},"subject":[],"published":{"date-parts":[[2024,6,19]]},"assertion":[{"value":"2024-06-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}