<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Data-driven anonymization process applied to time series</article-title>
      </title-group>
      <pub-date>
        <year>2014</year>
      </pub-date>
      <fpage>80</fpage>
      <lpage>90</lpage>
      <abstract>
        <p>Digital transformation and Big Data allow the use of highly valuable data. However, these data can be individual or sensitive, and represent an obvious threat for privacy. Anonymization, which achieves a trade-off between data protection and data utility, can be used in this context. There is not global anonymization technique which fits at all applications. Here, we describe a data-driven anonymization process and apply it on simulated electrical load data.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>The following paper is mainly written for a task
of dissemination about anonymization and good
pratice about it. Indeed, if anonymization is quiet
well known from academic point of view, it is
not still the case from France/Europe’s industrials’
one. However, privacy protection is a
fundamental growing task for them. Digital transformation
brings creation of global datalakes and allows
development of new valuable business. Moreover,
some Governments force an increasing putting in
Open Data, which should promote the opening
digital knowledge and ensure an open valuable
numeric ecosystem. At the same time, European
Union sets up rules to protect citizens, which
establish that citizens have protection right for their
individuals data. The data have to be fairly
processed for specific purpose, and with
individuals’ agreement. It is an important point because
keeping a maximum of personnal data for future
non specified mining task which should appear
through future methods is inconsistent with this
previous rule. People have right to access and
rectified their individual data. With 2016
regulation, applied from 2018, any company
offering goods or services (including cloud services) to</p>
      <p>
        EU citizen may be subject to regulation. Besides
this legal context, Big Data technologies enables
the treatment of massive, dynamic and
unstructured data, and facilitates data crossing,
weakening privacy protection. The data concerned can
be personal (name, address, etc), and allow to
(almost) directly identify an individual. Sensitive
data, like religious or political beliefs, pose a risk
for individual privacy too. Smartphone, smart
object, loyalty card, online purchase, social media
: there are large sources of individual and
sensitive data, which lead to an obvious risk for
privacy. Protect privacy means avoiding the
isolation of an individual, the correlation of some
information from different datasets for one
individual and the possiblity to obtain information on an
individual through exogeneous variables. Despite
appearances, the trade-off behind anonymization
is not an easy task. In datasets, it can have some
identifiers. Just delete or encrypt them is generally
not efficient (see e.
        <xref ref-type="bibr" rid="ref2">g. Hansell (2006</xref>
        ); Narayanan
and Shmati
        <xref ref-type="bibr" rid="ref31">kov (2008</xref>
        )). Others information can
be quasi-identifiers which allow re-identification
when they are crossing (e.g. in a health dataset,
sex and age). There are sensitive data (e.g. disease
in health context). Finally there are some
remaining parameters. In addition, the trade-off depends
of three parameters. First it depends of data
typology. Bank transaction data (e.g. see Ezhilarasi and
Hariharan (2015)) will not require the same
treatment that unstructured data like social media data,
which ask to hide metadata, the identifying
content and the relational graph data (e.
        <xref ref-type="bibr" rid="ref32">g. see Zhou
et al. (2008</xref>
        ); Ch
        <xref ref-type="bibr" rid="ref5">ester et al. (2013</xref>
        )). Second, the
trade-off depends of the future use of data. Third,
the anonymization strength is time dependent.
Indeed, new datasets and new re-identification
methods can be used to attack privacy. So, an
admissible anonymization methodology can be
unadmissible few months/years after.
      </p>
      <p>
        We illustrate an anonymization workflow on
(simulated) electrical smart meter data furniture,
which are a symbolic example of sensitive and
individual data whose exloitation possibility is
new and illustrates new needs of anonymization.
In France, smart meters, which are currently
deployed and whose deployment ended in 2020 will
allow to gather infra-daily household electrical
load. These data are by nature personal and
sensitive. Infra-daily individual loads allow to detect
if and when someone is at home and can increase
risk of burglary for instance. The individual habits
(see e.g.
        <xref ref-type="bibr" rid="ref3">(Blazakis et al., 2016)</xref>
        ) can be detected
and so sensitive data like religion (e.g. during
Ramadan) or some illegal activities (e.g. very
particular load pattern with cannabis plant) derived.
Provide these data is a complicated challenge.
Indeed, household electrical load will be available at
different level of time granularity (
        <xref ref-type="bibr" rid="ref5">e.g. see Tudor
et al. (2013</xref>
        ); Buchmann
        <xref ref-type="bibr" rid="ref5">et al. (2013</xref>
        )). To
simplify the context, in France, infra-daily load will
be available to the individuals, which can choose
to temporarily give access to these data to a third
party. Electric distributor will gather daily data
(even infra-daily in particular context). Provider
will access to monthly data. Althougt infra-daily
data are noisly, having access to identified daily
(even monthly) data allow easily to re-identify
infra-daily consomption (
        <xref ref-type="bibr" rid="ref5">e.g. see (Tudor et al.,
2013</xref>
        )). In this context, just hide direct
identifyer will be inadequate. On the other side, these
data have a strong valuable potential and many
actors are interested by them, for instance,
distributors to manage their network and achieve
maintenance task; local communities to improve their
urban policy; providers to propose new more
adaptive pricing; or start-up to popose individuals some
services to optimize the consomption. Based on
the future use of data, it is not necessary to keep
the same information. For instance new
adaptive pricing and dimension the networks through
household electrical load need different
information. Finally, the currently acceptable methods can
be questionned when data from gas smart meters,
which are currently deploying too, will be
available too. Indeed, gas meter data depends of similar
phenomenon that electrical meter data.
      </p>
      <p>The article is divided in four sections. In
Section 2, we give a short survey about
anonymization. In Section 3, we describe our global
anonymization process, from data gathering to
dataset publication. Section 4 presents a
simulator which are respectful of French electrical smart
meters anonymization task. We use simulate data
because we have not access to real data. We
applied the Section 3 process in Section 5 on Section
4 simulation.
2</p>
    </sec>
    <sec id="sec-2">
      <title>A short survey about anonymization</title>
      <p>For a dissemination task, it seems important to
have a brief discussion about the differences
between anonymization and encryption because
confuse the two is a common mistake. Data
encryption consists in using some mathematical
algorithms to transform data. The process can be
reversed with the good algorithm and the encryption
key. It could be used to transfer data between two
entities. The encryted data are still individuals and
so still personal data if original data are personal.
Although encrytion can be useful to be one of the
components of de-identification, it is neither
necessary nor sufficient for doing anonymization.</p>
      <p>
        Pseudonymisation, which consists of hiding
identifying metadata can b
        <xref ref-type="bibr" rid="ref5">e not efficient (see
Danezis (2013</xref>
        )). De-identification falls into two
categories of techniques: transform data to have
unreal individual, and aggregate and generalize
individual, where data provided symbolizing an
individuals set. Techniques can be used and
combined.
      </p>
      <p>
        Permutation techniques and puzzling
approaches deconstruct, transform and/or change
the data design (see e.g. Agrawal and Srikant
(2000), Zha
        <xref ref-type="bibr" rid="ref27">ng et al. (2007</xref>
        )). Noise addition
techniques are popular. For instance, Du
        <xref ref-type="bibr" rid="ref13">faux
and Ebrahimi (2006</xref>
        ) randomly transforms video
representation by inverting some signs in
decomposition coefficients and applies it to privacy
protection in video surveillan
        <xref ref-type="bibr" rid="ref1">ce. Aggarwal and
Yu (2008</xref>
        ) proposes a survey about randomization
methods. Classical randomization has some
advantages. Noise is independent of data and
does not require entire dataset. It can be applied
during data collection and on distri
        <xref ref-type="bibr" rid="ref20 ref59">buted system.
Liu et al. (2008</xref>
        ) proposes an survey of attacks
techniques on privacy obtained by perturbations
methods. When the anonymizer adds an
additive noise, the attackers can use methods like
(spectral, singular value decomposition, principal
component analysis, etc.) filtering, maximum
a posteriori estimation, or distribution analysis.
Under good conditions, multiplicative
pertubations have good properties, for instance preserve
Euclidian distance. An attacker who knows a
sample of input and output or has some
independent samples from the original distribution can
reverse the anonymization. Di
        <xref ref-type="bibr" rid="ref13">fferential privacy
(see Dwork (2006</xref>
        ), Dwork and Ro
        <xref ref-type="bibr" rid="ref24">th (2014</xref>
        )) is
a very popular form of noise addition. Here, we
add a random noise in such a way it makes a
mechanism which produces the same output with
almost similar probabilities when we consider
two adjacent inputs. The basic process to achieve
differential privacy is to sampling without
replacement the dataset and adding fictive individuals.
Differential privacy allows to work on privacy loss
and bound the risk. Chatzikokolakis
        <xref ref-type="bibr" rid="ref5">et al. (2013</xref>
        )
applies differential privacy on mobility trace
and tries to develop a mechanism more efficient
than just adding independent noise. McSherry
and Mironov (2009) proposes a framework of
differential privacy to produce recommendations
from collective user behavior in Netflix Prize
dataset.
      </p>
      <p>
        Privacy can be protected by creating individuals
sets. K-anon
        <xref ref-type="bibr" rid="ref28">ymization (see Sweeney (2002</xref>
        ))
consists of generalizing quasi-identifying information
to force having at least k individuals with the same
values. K-anonymity can be broken when all the
individuals of (at least) one class have the same
sensitive data. L-diversity (see Ma
        <xref ref-type="bibr" rid="ref14">chanavajjhala
et al. (2006</xref>
        )) forces each class to have at least l
different values of the sensitive data. I
        <xref ref-type="bibr" rid="ref27">n t-closeness
(see Li et al. (2007</xref>
        )) the sensitive data in each
class has to respect its distribution in the total
population. Generalization and suppression is
NPhard. Moreover, as expressed in Domingo-Ferrer
and
        <xref ref-type="bibr" rid="ref29">Torra (2005</xref>
        ), generalization and suppression
can be not adapted for ordinal categorical and for
continuous attribu
        <xref ref-type="bibr" rid="ref29">tes. Domingo-Ferrer and Torra
(2005</xref>
        ) proposes to use microaggregation for this
task. In microaggregation data are partitioned into
several clusters of length at least k with similar
records. Then, we apply an aggregator operator
(e.g. mean or median for continuous variable)
to compute the centroid of each cluster. Besides
clustering method, microaggregation has two
important parameters: the minimum dimension of
each cluster, adjusts the level of privacy protection
and the function allowing computation of
aggregate value, which is linked with future data utility
and protection level. The aggregation function can
be mean, sum, median, quantile, partial
autocorrelation function, time slicing profile, density, e
        <xref ref-type="bibr" rid="ref29">tc.
Domingo-Ferrer and Torra (2005</xref>
        ) partitiones data
throught Maximum Distance to Average Vector
(MDAV) al
        <xref ref-type="bibr" rid="ref2">gorithm. Aggarwal et al. (2006</xref>
        )
proposes microaggregation where some atypical
individuals can be not clustered and so not pu
        <xref ref-type="bibr" rid="ref20">blished.
Byun et al. (2007</xref>
        ), Lin
        <xref ref-type="bibr" rid="ref39">and Wei (2008</xref>
        ),
        <xref ref-type="bibr" rid="ref51">Li et al.
(2002</xref>
        ),
        <xref ref-type="bibr" rid="ref56">Xu and Numao (2015</xref>
        ) and Lou
        <xref ref-type="bibr" rid="ref31">kides and
Shao (2008</xref>
        ) proposes greedy heuristic to achieve
k-anonymity through clustering with not NP-hard
        <xref ref-type="bibr" rid="ref15">complexity. Bergeat et al. (2014</xref>
        ) compares two
software allowing k-anonymization on a French
health dataset of more than 20 million re
        <xref ref-type="bibr" rid="ref1">cords.
Gedik and Liu (2008</xref>
        ) uses k-anonymity to protect
mobile location privacy.
      </p>
      <p>
        When working on time series, previous
techniques can be us
        <xref ref-type="bibr" rid="ref5">ed. For instance, Shou
et al. (2013</xref>
        ) proposes what they named (k,
P)anonymity to preserve pattern in time series. In
electrical household load
        <xref ref-type="bibr" rid="ref18">protection, Chin et al.
(2016</xref>
        ) proposes to solve an optimization problem
with two components : first is about information
leakage rate of consomer load given grid load and
second is about the co
        <xref ref-type="bibr" rid="ref17">st of errors. Shi et al. (2011</xref>
        )
proposes a differential privacy form to prote
        <xref ref-type="bibr" rid="ref33">ct time
series. Zhang et al. (2015</xref>
        ) proposes noise
generation to protection cloud data. Hong
        <xref ref-type="bibr" rid="ref5">et al. (2013</xref>
        )
proposes a survey about time series privacy
protection.
      </p>
      <p>
        After de-identification, it is important to
measure de-identification degree.
Venkatasu
        <xref ref-type="bibr" rid="ref20 ref59">bramanian (2008</xref>
        ) surveys the metric proposed to
measure privacy and privacy loss. Authors divide
measuring privacy into three categories: statistical
methods, taking account variance of perturbated
variable, probabilistic methods, considering
information theory and Bayesian analysis, and
computational methods, coming from the idea of a
resource-bounded attacker and measuring privacy
loss in function of the information available for
suc
        <xref ref-type="bibr" rid="ref25">h attacker. Tóth et al. (2004</xref>
        ) works on
message transmission and analyzes two entropy based
anonymity measures. Authors measure separate
global anonymity, which quantify the necessary
effort to fully compromise dataset, that we name
latter journalist scenario, and local anonymity,
which quantify the probability that transmission of
one user are compromised, that we name
prose
        <xref ref-type="bibr" rid="ref15">cutor scenario. Gambs et al. (2014</xref>
        ) works on attacks
on geolocated data. Nin and Torra (2009) proposes
a framework of protection and re-identification for
time series. Ma and Yau (2015) proposes some
information measures for quantifying privacy
protection of tme-series Data.
      </p>
      <p>Interested reader can find in the first-rate book
Torra (2017) the stakes of data privacy and
techniques associated.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Anonymization process</title>
      <p>Each anonymization task has a specific and a
generic part, and so is unique. In this section
we describe our global data-driven anonymization
process (see Figure 1) which allows separating the
two parts of the process.</p>
      <p>After data gathering we have to tag data in
function of theirs categories : identifier,
quasiindentifier, sensitive data, and remainded
parameters. Next step consists in data pseudonymisation.
Identifiers have to be hidden (deletion, encryption,
etc.). Obviously, that is generally not enough to
insure privacy protection. We have to establish one
metric to measure data protection and another one
for data utility. As anonymization could not be
total and perfect, we have to choose the
threshold of re-identification acceptance. Despite
deidentification process there are still residuals risk,
which has to be compared to the benefits.</p>
      <p>It is necessary to build a re-identification
framework, which is driven by the context and has
to be realistic. That means the worst case
situation, where an attacker is almost all-knowing,
is probably not realistic and decreases the
efficiency of the trade-off utility data / privacy
protection. The re-identification framework depends
of many parameters. The attacker type must be
determined. Its resources will depend of who
he is (e.g. a member of the organization which
anonymizes data and so has access at plenty data
to attack anonymized dataset, a member of a
near organization which has access to similar data
which can be crossed, a Machine Learning expert
which can deploy efficient re-identification
models, a neighbor which has access to contextual
data, etc.). Many reasons can motivated the
attacker (retrieve information about individual to do
aggressive commercial supply or burglary, harm
the organization which manages the
anonymization to recover data governance for instance, show
its capacity in re-identification, etc.). The
reidentification framework will depend of the attack
category. Crossing anonymized data with dataset
which is not anonymized is a classical way to try
re-identification. Information in anonymized data
can be used too (e.g. anonymized Internet requests
can be identified by crossing location and interest
of individual). It will depend of the chosen
reidentification meaning. It can mean identify an
individual or identify sensitive information about
an individual. For instance, if household load
have been anonymized by pseudonymization then
adding a noise, the noisy curve can be identify to
a customer. If we do microaggregation, it could
be possible to find the customer cluster and
possibly deduce probable sensitive information and
behavior for the customer. The re-identification
framework will depend of the technique to
measure re-identification risk. To be valuable,
attackers have to be confident in their re-identification.
When we compute the risk of individual
identification, true positive are not the key performance
indicator. Here, true positive means the good
individual from anonymized data have been
identified at the individual from not anonymized data.
However, this individual from not anonymized
data can be identified at many other individuals in
anonymized data. That decreases re-identification
risk. Of course, identification errors decrease the
confidence too. The risk have to combine all
these information. Lastly, re-identification
framework will depend of the re-identification scenario.
Many are possible : we can target all or almost all
individuals when we know they are in the dataset
(journalist scenario), we can target one or some
individuals (prosecutor scenario), we can try to
distinguish studies with and without one individual,
etc.</p>
      <p>Then, as anonymization is a trade-off between
utility and protection, we have to choose the
minimum utility of data. We have two case. Data could
be provided to a third party to answer to a
specific need. Only necessary information, and not
more, have to be provided. After anonymization,
the study has to be possible. For instance, if a
electric provider want to do new daily pricing, they
will only need precise daily profile. Data could be
given without specific need, for instance to push
data in Open Data. We need to compute a metric
of privacy cost. For instance, when we add a noise
in time series, we can compute a signal to noise
ratio.</p>
      <p>Lastly, as anonymization can not be perfect,
we have to choose the limit of acceptance for
re-identification risk. It determines the trade-off
achievement point. It depends of the level of
individuality and sensitivity. The choice is driven
by the exportation model used at the end. We can
choose a Publish and forget model, where
typically data are provided in Open Data. Then, it
is (almost) impossible to stop data sharing.
Another model is Data Use Agreement model where
agreement decides what the third party can do.
Finally we can use a closed model where data are in
a closed environment and the third party has only
access to the results of its requests.</p>
      <p>To avoid scalability problem during non
industrial step we can do an optional sub-sampling.
Deidentification methods, which depends of data
typology and future data use, are applied. Then, we
measure the re-identification risk. When the risk is
lower than the authorized maximum, we transform
the entire dataset. Then, we measure the utility of
anonymized data. If the minimum utility is not
respected, we re-start all the steps of this paragraph,
else we export data in the chosen model.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Appliance context : simulated electrical load</title>
      <p>
        Electrical household load simulation has a rich
literature. Many authors use variant of Markov
Chain (
        <xref ref-type="bibr" rid="ref5">e.g. Labeeuw and Deconinck (2013</xref>
        ),
Muratori
        <xref ref-type="bibr" rid="ref5">et al. (2013</xref>
        ), McLoughlin et al. (2010)).
McQueen et al. (2004) uses Monte Carlo
simulation model of load demand taking into
account the statistical spread of demand in each half
hour using data sampled from a gamma
dis
        <xref ref-type="bibr" rid="ref29">tribution. Paatero and Lund (2005</xref>
        ) uses bottom-up
load model for generating household load
        <xref ref-type="bibr" rid="ref44">profiles.
Pompey et al. (2015</xref>
        ) trains Additive Model (see
Has
        <xref ref-type="bibr" rid="ref22">tie and Tibshirani (1990</xref>
        )) to achieve
massivescale simulation of electrical load in Smart Grids.
Additive Models have yet proven their efficiency
to model and forecast electricity load at aggregate
le
        <xref ref-type="bibr" rid="ref4">vel (see Pierrot and Goude (2011</xref>
        ) in F
        <xref ref-type="bibr" rid="ref40">rance, Fan
and Hyndman (2012</xref>
        ) in Australia) as at local level
      </p>
      <p>
        We simulate three curves types : we name the
first “second house load”, which are almost
constant with a random noise added, the second
“little professional”, which are represented by
segment curves with a load almost null the week-end
and the night and almost constant during the day,
where the jump intensity and activities period are
randomly chosen, and the third “household load”,
with calendar and thermic components. To
simulate the last, we apply similar idea that
        <xref ref-type="bibr" rid="ref44">Pompey
et al. (2015</xref>
        ). We train
        <xref ref-type="bibr" rid="ref17 ref45">simulation models on
GEFCom 2012</xref>
        data
        <xref ref-type="bibr" rid="ref19">set (see Hong et al. (2014</xref>
        )). The
dataset comes from a Kaggle challenge and
contains the hourly load demand of 20 local areas in
USA and the temperature of 11 weather stations.
We train many different Additive Models on this
dataset whose features sets contain calendar
parameters (type of day, number of day since the
beginning of the year, etc.) and a random
number of raw and smoothing temperatures. They are
trained on different period. Then, we compute two
months of their forecasting with random
translation of features (e.g. one additive model design
is translated of one hour and its temperatures of
two Fahrenheit), to introduce variety in simulated
load. We train some quantile additive models too
(see Gaillard et al. (2016)) to simulate some
extreme behaviors. Our simulated data are smoother
than real individual load but it is not a real
problem here. Indeed, for our appliance, it is important
that simulation respects some assumptions. We
assume there are different levels of load and three
curves families and the consomptions are almost
uniqueness even at low frequenci
        <xref ref-type="bibr" rid="ref5">e as shown in
Tudor et al. (2013</xref>
        ). To respect an uniqueness
assumption, we arbitrarily impose that daily
aggregation during one week of two curves of
“household load" rounded to the thousands can not be
equal. We choose the daily time scale of
aggregation because we are faced with an attacker using
daily data and by considering one week, we
integrate the weekly cycle which are important when
considering electrical information.
      </p>
      <p>We assume that a provider needs to refine a
pricing for an area of its customers. It needs some
infra-daily information (peak of demand, profile,
etc.). In our scenario, a potential attacker has
access to identified daily data. We assume the
exportation model is a “publish and forget model”,
which explains the possibility for an attacker to</p>
      <p>Parameter Utility
Signal to noise ratio, noise trend, anomaly
detecfamilly tion, total scope
Type and quantity of permu- total scope
tation
type of transformation (stan- total scope, trend,
dardization, etc.) anomaly detection
time scale total scope, anomaly</p>
      <p>detection
sampling probability and fic- total scope, trend,
tive curve anomaly detection
clustering, clusters dimen- total scope, clusters
sion, aggregation function trend, profile
scope, aggregation function total scope, scope trend,
profile</p>
    </sec>
    <sec id="sec-5">
      <title>Appliance of anonymization process</title>
      <p>After data gathering, we have to tag the data. Here
we assume data have two attributes: an
individual identifier and simulated time series. First, we
pseudomyze the individual identifier by
substituting it with random numbers without replacement
to ensure uniqueness. We have only one
quasiidentifier, which is the sensitive data too, the
simulated time series. In our simulation framework, the
highest level of attackers can be a competing
organization which has identified data at a fine
granularity level (daily data), with good level of
optimization and computing whose objective is to find
information about customers’ behaviors to make
aggressive supply. Data are provided to answer
to a specific need of a third party: having data
to etablish new pricing. For this topic,
microaggregation is relevent. Then, we protect privacy
throught the minimum dimension of clusters. The
components of the trade-off are the choice of
clustering methodology, the choice of the dimension
of clusters and the choice of the aggregator
operator. With microaggregation, an attacker could,
at worst, identify probable customers behaviors.
More the minimum dimension of clusters is weak
or more one load participates at the building of a
cluster, more the attacker can be certain of its
deductions.
5.1</p>
      <sec id="sec-5-1">
        <title>Statistical and Machine Learning Setup</title>
        <p>Table 1 presents some techniques which can be
used to protect time series. Permutation, which
consists to exchange data from one curve to
another, is a form of noise introduction and can
create unrealistic curves. Transformation can be
smoothing, standardization, etc. whose
objective is to erase some individualities. Time slicing
breaks individual trends. Differential privacy can
be completed by post-treatment to improve
protection. The re-identification risk of the first five
techniques of Table 1 are about customer
identification and can be studied with classical time
series identification and classification techniques
(Deep Learning, Ensemble Method, K Nearest
Neighbors, etc.). Moreover, some methods are
reversible. For instance, denoising methods can
be applied for the first one. For deterministic
transformation, the perturbation can be inverted
with the knowledge of transformation parameters.
Attempting to re-build chronological can reverse
time slicing. Sensitive information can be
refund from the two last methods when attackers
can identify the cluster of a customer. Here we
work to provide data to a provider who wants to
make a new pricing. It needs precise profile and
we choose to use microaggregation. As a provider
will not propose one tariff by individual, but many
tariffs depending of large group, we do not need
precise individual data.
5.2</p>
      </sec>
      <sec id="sec-5-2">
        <title>Chosen methodology</title>
        <p>
          We use time series clus
          <xref ref-type="bibr" rid="ref29">tering (see Liao (2005</xref>
          ),
Rani and
          <xref ref-type="bibr" rid="ref17 ref45">Sikka (2012</xref>
          )). As explain in these
surveys, there are many ways to cluster time series.
First, clustering algorithm can directly be applied
on raw data. However, it can be inefficient
because of noisy data. Second consists to extract
features from time series and applies clustering
algorithm on these features. Third is model-based
approaches where time series are modelled before
being clustered. Another important choice is the
distance measure like Euclidean, Kullback-Leibler
divergence, Dynamic Time Warping (see Berndt
and Clifford (1994)), etc.
        </p>
        <p>
          Wavelets Decomposition (see Beylkin et al.
(1991)) have yet being used in time series
studies because it allows to work on the different
levels of frequencies of the signal and to denoise the
signal. We apply the pre-
          <xref ref-type="bibr" rid="ref18">processing of Cugliari
et al. (2016</xref>
          ) which successfully applies
disaggregated load clustering to forecast load demand.
After time series projection, authors compute
relative contribution of each energy level. Assume
that (, j,k) is a Haar basis. A continuous
signal can be approximated in a truncated Haar
basis: fˆ(t) = c0 (t) + PjJ=01 P2kj=01 dj,k j,k(t),
where c0, dj,k are the decomposition coefficients
obtained with Fast Wavelet Transform algorithm.
Then, we define relative contribution of level j by
relj = logit
✓
ln ⇣ 1 p p ⌘ . In these features, we do not consider
c0, which corresponds to the mean level of each
load. We focus our effort on the profiles form
which is important to establish new pricing.
        </p>
        <p>
          As in Cugliari et al. (2016), we use the relative
contribution after a Haar Decomposition. In place
of K-Means we use Maximum Distance to
Average Vector generic (MDAV-generic) presented
by Domingo-Ferrer and
          <xref ref-type="bibr" rid="ref29">Torra (2005</xref>
          ), because we
want to have clusters of minimum size k regardless
the number of clusters, and not k clusters
regardless their size. Instead of MDAV-generic, we could
have use less rigid algorithms like V-MDAV (
          <xref ref-type="bibr" rid="ref21">see
Solanas and Ballesté (2006</xref>
          )), which does not force
each cluster (except some last) to be of a fixed size.
Through MDAV-generic, we know in advance the
number of clusters, which can be interested when
there are a data furniture requirements
specitication with the third party. We benchmark the
technique with a mean based aggregation and a
variance based aggregation. By mean (resp. variance)
based aggregation, we mean achieving K
Nearest Neighbor on the mean (resp. variance) load
of each individual with initializing by the
smallest mean (resp. variance). The benchmarks have
some advantages : they are easy to implement and
timely computated.
        </p>
        <p>Cluster algorithm allows to divide the
individuals in subsets of pre-determined minimum length.
Then, we have to choose the aggregation
techniques. We can compute the median load of the
individuals of each cluster at each time. This choice
allows to minimize the absolute loss for each
cluster and to hide some extremes values. However,
there is a non-zero probability that one individual
of one cluster is (almost) always the median. In
this case, giving the median is equivalent to give
the load of one individual. The mean can be
computed at each instant for each cluster. However,
the attacker has access for each individual i to Ai
the vector of daily load, and (lj )j the infra-daily
loads of each final aggregat (and so to (Lj ) the
daily loads of each cluster). The attacker can try
to solve for each cluster j,
arg
pi2{ 0,1} ||Lj
min</p>
        <p>1
P pi</p>
        <p>X piAi||2.</p>
        <p>
          This adversaries model is then equivalent to a
Knapsack problem (see Kellerer et al. (2004)),
which can be solved by many algorithms (e.g.
programming dynamic or simulated annealing). Even
it is a NP-hard problem and the attacker needs an
exact solution, many works show it is possible to
consider the problem in a multi-parallel way and
use GPU programming (
          <xref ref-type="bibr" rid="ref17 ref45">see Boyer et al. (2012</xref>
          ),
          <xref ref-type="bibr" rid="ref17 ref45">Suri et al. (2012</xref>
          )). Adding a noise, even small,
allows to get out of the knapsack problem.
Algorithm 1 MDAV-generic
Assume D the relative contribution dataset and k
an integer.
        </p>
        <p>1. While card(D)</p>
        <p>3k
(a) Compute the average attribute-wise of
all records in D
(b) Compute the most distant record d1 of
previous average in term of Euclidian
norm
(c) Find the most distant record d2 of d1
(d) Use d2 and d1 as the center of two
clusters of length k
(e) Delete the records of the two clusters
and come back at the beginning
2. If 2k  card(D)  3k
1
(a) Compute the average attribute-wise of
remaining records in D
(b) Compute the most distant record d1 of
previous average (Euclidian norm)
(c) Use d1 as the center of a cluster of length
k
(d) Form another cluster with the others
remaining records in D
3. If card(D) &lt; 2k, form a cluster with
remaining records
5.3</p>
      </sec>
      <sec id="sec-5-3">
        <title>Results</title>
        <p>
          We compare the performance when clustering
algorithm is applied on 1 400 centralized simulated
time series. Remind the objectives consist in
furniture of profil as homogeneous as possible to a
third party which wants to propose new pricing.
That means the third party has to collect
cluster homogeneous, and data utility measure has to
concern this point. If data are giving for a task
of forecasting, we should measure differently the
utility, for instance by computing MAPE (Mean
Absolute Percentage Error) on a test subset (e.g.
          <xref ref-type="bibr" rid="ref17">see Pierrot and Goude (2011</xref>
          )). Here, in a task
of pricing, there is no forecasting need. It
illustrates the dependency between anonymization
and future use of data. We measure data
utility by computing indicators like silhouette index
and the Davies-Bouldin index. These two
indicators represent measures of homogeneity of
clusters. We do not use indicators like Root Mean
Square Error, because there are different load
levels. We work from 4 to 28 anonymization by step
of 4. In Figure 2, we plot the relative
computation time when the reference level is the
computation time of 28-anonymization. Computation
time decreases when k grows. The Figure 3 gives
an estimation of Silhouette Index density for each
k-anonymization. This index, computed for each
individual, is between -1 and 1. Stronger is this
index, stronger the individual is connected to its
cluster and far away the others clusters. It has to be
upper than 0 if an individual is well clustered.
Obviously, when k grows (data protection increases),
the index decreases (data utility decreases). We
see three modes in the density : the upper
corresponds to second home, the medium to
professional and the last to household.
        </p>
        <p>Bouldin-Davies index represents the average
similarity between each cluster and its most
similar one, averaged over all the clusters. Lower this
index is, the better the clustering is. In Figure
4, we give the ratio between Bouldin-Davies
Index of each k-anonymization and the one of
28anonymization. Figure 4 illustrates data utility
loss caused by increasing data protection. There is
a big gap of data utility between 4-anonymization
and 8-anonymisation. However, the data
protection is insufficient.</p>
        <p>In Figure 5 we compare the MDAV-generic
applied on relative contribution of wavelet
decomposition with two aggregations : one done by mean
level (before centralization) and the other by
standard deviation level. In relative Bouldin-Davies
we give the ratio of Bouldin-Davies Index for
each k-anomyzation by mean and standard
deviation and the Bouldin-Davies Index when
MDAVgeneric is applied with the same k. All the
indicators show MDAV-generic applied on relative
contribution of wavelet decomposition outperforms
the two forms of trivial aggregation, and second
order (based on variance) aggregation is more
efficient than first order (based on mean).
6</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>The process allows to formalize a global
datadriven anonymization process facilizing the
separation between specific and generic part of
anonymization and integrating business
knowledge and Data Science algorithms. Through this
process formalization, we optimize the trade-off
privacy protection/data utility.</p>
      <p>
        To illustrate the process, we simulate a
context near (but different) the situation of electrical
smart meters data provision. We assume a third
party tries making new pricing and propose a
microaggregation process of time series using
preprocessing through the methodology of Cugliari
et al. (2016) and clustering algorithm of
DomingoFerrer and
        <xref ref-type="bibr" rid="ref29">Torra (2005</xref>
        ). Instead punctual
information giving at each instant, it could be
interesting to give a probabilistic view load.
      </p>
      <p>Our example is based on static data. In many
applications, it is interesting to receive data in
almost streaming way. One of the next step is to
develop incremental microaggregation and
measure the privacy loss and the data utility in this
context. Another future work is the development
of a big data framework allowing anonymization
with noise addition, differential privacy and
scalable microaggregation dividing the specific part
inherent at each type of data, business constraint
and future data utility with generic part. Lastly,
here, we work of global datalake anonymization,
which assumes there is a level where raw data are
stored before transformation. Local
anonymization, where data are anonymized at individual level
have to be studied.</p>
      <p>
        R. Agrawal and R. Srikant. 2000. Privacy preserving
data mining. In ACM SIGMOD Conference.
M. Bergeat, N. Cuppens-Boulahia, F. Cuppens, N. Jess,
F. Dupont, S. Oulmakhzoune, and G. De
        <xref ref-type="bibr" rid="ref18">Peretti.
2014</xref>
        . A French Anonymization Experiment with
Health Data. In
        <xref ref-type="bibr" rid="ref18">PSD 2014</xref>
        : Privacy in
Statistical Databases. Eivissa, Spain.
https://hal.archivesouvertes.fr/hal-01214624.
      </p>
      <p>D.J. Berndt and J. Clifford. 1994. Using dynamic time
warping to find patterns in time series. In Usama M.
Fayyad and Ramasamy Uthurusamy, editors, KDD
Workshop. AAAI Press, pages 359–370.</p>
      <p>Measuring</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>C.C.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.S.</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>A survey of randomization methods for privacy-preserving data mining</article-title>
          .
          <source>In Privacy-Preserving Data Mining - Models and Algorithms</source>
          , pages
          <fpage>137</fpage>
          -
          <lpage>156</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>G.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Feder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kenthapadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Khuller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Panigrahy</surname>
          </string-name>
          , D. Thomas,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Zhu</surname>
          </string-name>
          .
          <year>2006</year>
          .
          <article-title>Achieving anonymity via clustering</article-title>
          .
          <source>In Proceedings of the twenty-fifth ACM SIGMODSIGACT-SIGART symposium on Principles of database systems. ACM</source>
          , ACM, New York, G. Beylkin,
          <string-name>
            <given-names>R.</given-names>
            <surname>Coifman</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Rokhlin</surname>
          </string-name>
          .
          <year>1991</year>
          .
          <article-title>Fast wavelet transforms and numerical algorithms I</article-title>
          .
          <source>Comm. Pure Appl</source>
          . Math.
          <volume>44</volume>
          (
          <issue>2</issue>
          ):
          <fpage>141</fpage>
          -
          <lpage>183</lpage>
          . https://doi.org/10.1002/cpa.3160440202.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Blazakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Davarzani</surname>
          </string-name>
          , G. Stavrakakis,
          <string-name>
            <given-names>and I.</given-names>
            <surname>Pisica</surname>
          </string-name>
          .
          <year>2016</year>
          .
          <article-title>Lessons learnt from mining meter data of residential consumers</article-title>
          .
          <source>Periodica Polytechnica Electrical Engineering and Computer Science</source>
          <volume>60</volume>
          (
          <issue>4</issue>
          ):
          <fpage>266</fpage>
          -
          <lpage>272</lpage>
          . https://doi.org/10.3311/PPee.9993.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Boyer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>El Baz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Elkihel</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>Solving knapsack problems on {GPU}</article-title>
          .
          <source>Computers and Operations Research</source>
          <volume>39</volume>
          (
          <issue>1</issue>
          ):
          <fpage>42</fpage>
          -
          <lpage>47</lpage>
          . Special Issue on Knapsack Problems and Applications. https://doi.org/http://dx.doi.org/10.1016/j.cor.
          <year>2011</year>
          .
          <volume>03</volume>
          .014.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>E.</given-names>
            <surname>Buchmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Böhm</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Burghardt</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Kessler</surname>
          </string-name>
          .
          <year>2013</year>
          .
          <article-title>Re-identification of smart meter data</article-title>
          .
          <source>Personal and Ubiquitous Computing</source>
          <volume>17</volume>
          (
          <issue>4</issue>
          ):
          <fpage>653</fpage>
          -
          <lpage>662</lpage>
          . https://doi.org/10.1007/s00779-012-0513-6.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>J.W.</given-names>
            <surname>Byun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kamra</surname>
          </string-name>
          , E. Bertino, and
          <string-name>
            <given-names>N.</given-names>
            <surname>Li</surname>
          </string-name>
          .
          <year>2007</year>
          .
          <article-title>Efficient k-Anonymization Using Clustering Techniques</article-title>
          , Springer Berlin Heidelberg, Berlin, Heidelberg, pages
          <fpage>188</fpage>
          -
          <lpage>200</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Chatzikokolakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Palamidessi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Stronati</surname>
          </string-name>
          .
          <year>2013</year>
          .
          <article-title>A predictive differentially-private mechanism for mobility traces</article-title>
          .
          <source>CoRR abs/1311</source>
          .4008. http://arxiv.org/abs/1311.4008.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Chester</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. M.</given-names>
            <surname>Kapron</surname>
          </string-name>
          , G. Srivastava, and
          <string-name>
            <given-names>S.</given-names>
            <surname>Venkatesh</surname>
          </string-name>
          .
          <year>2013</year>
          .
          <article-title>Complexity of social network anonymization</article-title>
          .
          <source>Social Netw. Analys. Mining</source>
          <volume>3</volume>
          (
          <issue>2</issue>
          ):
          <fpage>151</fpage>
          -
          <lpage>166</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>J-X. Chin</surname>
            , T. Tinoco De Rubira, and
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Hug</surname>
          </string-name>
          .
          <year>2016</year>
          .
          <article-title>Privacy-protecting energy management unit through model-distribution predictive control</article-title>
          .
          <source>CoRR abs/1612</source>
          .05120. http://arxiv.org/abs/1612.05120.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Cugliari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Goude</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Poggi</surname>
          </string-name>
          .
          <year>2016</year>
          .
          <article-title>Disaggregated electricity forecasting using wavelet-based clustering of individual consumers</article-title>
          .
          <source>In 2016 IEEE International Energy Conference (ENERGYCON)</source>
          . pages
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . https://doi.org/10.1109/ENERGYCON.
          <year>2016</year>
          .
          <volume>7514087</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>G.</given-names>
            <surname>Danezis</surname>
          </string-name>
          .
          <year>2013</year>
          .
          <article-title>Privacy technology options for protecting and processing utility reading</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Domingo-Ferrer</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Torra</surname>
          </string-name>
          .
          <year>2005</year>
          .
          <article-title>Ordinal, continuous and heterogeneous k-anonymity through microaggregation</article-title>
          .
          <source>Data Mining and Knowledge Discovery</source>
          <volume>11</volume>
          (
          <issue>2</issue>
          ):
          <fpage>195</fpage>
          -
          <lpage>212</lpage>
          . https://doi.org/10.1007/s10618-005-0007-5.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Dufaux</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Ebrahimi</surname>
          </string-name>
          .
          <year>2006</year>
          .
          <article-title>Scrambling for video surveillance with privacy</article-title>
          .
          <source>In 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06)</source>
          . pages
          <fpage>160</fpage>
          -
          <lpage>160</lpage>
          . https://doi.org/10.1109/CVPRW.
          <year>2006</year>
          .
          <volume>184</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Dwork</surname>
          </string-name>
          .
          <year>2006</year>
          . Differential Privacy, Springer Berlin Heidelberg, Berlin, Heidelberg, pages
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Dwork</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Roth</surname>
          </string-name>
          .
          <year>2014</year>
          .
          <article-title>The algorithmic foundations of differential privacy</article-title>
          .
          <source>Foundations and Trends in Theoretical Computer Science</source>
          <volume>9</volume>
          (
          <issue>3U</issue>
          ˝ 4):
          <fpage>211</fpage>
          -
          <lpage>407</lpage>
          . https://doi.org/10.1561/0400000042.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Ezhilarasi</surname>
          </string-name>
          and
          <string-name>
            <given-names>Mr. M.</given-names>
            <surname>Hariharan</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>Protecting sensitive information in bank transaction with data anonymization</article-title>
          .
          <source>International Journal For Technological Research In Engineering (</source>
          <volume>2</volume>
          (
          <issue>11</issue>
          )).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Fan</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.J.</given-names>
            <surname>Hyndman</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>Shortterm load forecasting based on a semiparametric additive model</article-title>
          .
          <source>Power Systems</source>
          , IEEE Transactions on
          <volume>27</volume>
          (
          <issue>1</issue>
          ):
          <fpage>134</fpage>
          -
          <lpage>141</lpage>
          . https://doi.org/10.1109/TPWRS.
          <year>2011</year>
          .
          <volume>2162082</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Gaillard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Goude</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Nedellec</surname>
          </string-name>
          .
          <year>2016</year>
          .
          <article-title>Additive models and robust aggregation for gefcom2014 probabilistic electric load and electricity price forecasting</article-title>
          .
          <source>International Journal of Forecasting</source>
          <volume>32</volume>
          (
          <issue>3</issue>
          ):
          <fpage>1038</fpage>
          -
          <lpage>1050</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Gambs</surname>
          </string-name>
          ,
          <string-name>
            <surname>M-O. Killijian</surname>
          </string-name>
          , and M.
          <source>Nunez del Prado Cortez</source>
          .
          <year>2014</year>
          .
          <article-title>De-anonymization attack on geolocated data</article-title>
          .
          <source>Journal of Computer and System Sciences</source>
          <volume>80</volume>
          (
          <issue>8</issue>
          ):
          <fpage>1597</fpage>
          -
          <lpage>1614</lpage>
          .
          <article-title>Special Issue on Theory and Applications in Parallel and Distributed Computing Systems</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>B.</given-names>
            <surname>Gedik</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Liu</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>Protecting location privacy with personalized k-anonymity: Architecture and algorithms</article-title>
          .
          <source>IEEE Transactions on Mobile Computing</source>
          <volume>7</volume>
          (
          <issue>1</issue>
          ):
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          . https://doi.org/10.1109/TMC.
          <year>2007</year>
          .
          <volume>1062</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Hansell</surname>
          </string-name>
          .
          <year>2006</year>
          .
          <article-title>Aol removes search data on vast group of web users</article-title>
          . New York Times .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>T. J.</given-names>
            <surname>Hastie</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Tibshirani</surname>
          </string-name>
          .
          <year>1990</year>
          .
          <article-title>Generalized additive models</article-title>
          . London: Chapman &amp; Hall.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <surname>S-K. Hong</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Gurjar</surname>
          </string-name>
          ,
          <string-name>
            <surname>H-S. Kim</surname>
            , and
            <given-names>Y.S.</given-names>
          </string-name>
          <string-name>
            <surname>Moon</surname>
          </string-name>
          .
          <year>2013</year>
          .
          <article-title>A survey on privacy preserving time-series data mining</article-title>
          .
          <source>3rd International Conference on Intelligent Computational Systems</source>
          (ICICS'
          <year>2013</year>
          ) .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>T.</given-names>
            <surname>Hong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pinson</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Fan</surname>
          </string-name>
          .
          <year>2014</year>
          .
          <article-title>Global energy forecasting competition 2012</article-title>
          .
          <source>International Journal of Forecasting</source>
          <volume>30</volume>
          (
          <issue>2</issue>
          ):
          <fpage>357</fpage>
          -
          <lpage>363</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <given-names>H.</given-names>
            <surname>Kellerer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Pferschy</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Pisinger</surname>
          </string-name>
          .
          <year>2004</year>
          .
          <article-title>Introduction to NP-Completeness of knapsack problems</article-title>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <given-names>W.</given-names>
            <surname>Labeeuw</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Deconinck</surname>
          </string-name>
          .
          <year>2013</year>
          .
          <article-title>Residential electrical load model based on mixture model clustering and markov models</article-title>
          .
          <source>IEEE Transactions on Industrial Informatics</source>
          <volume>9</volume>
          (
          <issue>3</issue>
          ):
          <fpage>1561</fpage>
          -
          <lpage>1569</lpage>
          . https://doi.org/10.1109/TII.
          <year>2013</year>
          .
          <volume>2240309</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <given-names>N.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Li</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Venkatasubramanian</surname>
          </string-name>
          .
          <year>2007</year>
          .
          <article-title>tcloseness: Privacy beyond k-anonymity and ldiversity</article-title>
          .
          <source>In 2007 IEEE 23rd International Conference on Data Engineering</source>
          . pages
          <fpage>106</fpage>
          -
          <lpage>115</lpage>
          . https://doi.org/10.1109/ICDE.
          <year>2007</year>
          .
          <volume>367856</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Jajodia</surname>
          </string-name>
          .
          <year>2002</year>
          .
          <string-name>
            <given-names>A</given-names>
            <surname>Privacy-Enhanced Microaggregation</surname>
          </string-name>
          <string-name>
            <surname>Method</surname>
          </string-name>
          , Springer Berlin Heidelberg, Berlin, Heidelberg, pages
          <fpage>148</fpage>
          -
          <lpage>159</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <given-names>T. Warren</given-names>
            <surname>Liao</surname>
          </string-name>
          .
          <year>2005</year>
          .
          <article-title>Clustering of time series data, a survey</article-title>
          .
          <source>Pattern Recognition</source>
          <volume>38</volume>
          :
          <fpage>1857</fpage>
          -
          <lpage>1874</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <surname>J-L Lin</surname>
          </string-name>
          and
          <string-name>
            <surname>M-C Wei</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>An efficient clustering method for k-anonymization</article-title>
          .
          <source>In Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society</source>
          ,
          <string-name>
            <surname>PAIS</surname>
          </string-name>
          <year>2008</year>
          . pages
          <fpage>499</fpage>
          -
          <lpage>502</lpage>
          . https://doi.org/10.1109/CANDAR.
          <year>2015</year>
          .
          <volume>61</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Giannella</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Kargupta</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>A survey of attack techniques on privacy-preserving data perturbation methods</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <string-name>
            <given-names>G.</given-names>
            <surname>Loukides and J-H. Shao</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>An efficient clustering algorithm for k-anonymisation</article-title>
          .
          <source>Journal of Computer Science and Technology</source>
          <volume>23</volume>
          (
          <issue>2</issue>
          ):
          <fpage>188</fpage>
          -
          <lpage>202</lpage>
          . https://doi.org/10.1007/s11390-008-9121-3.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <string-name>
            <given-names>C. Y.T.</given-names>
            <surname>Ma</surname>
          </string-name>
          and
          <string-name>
            <given-names>D. K.Y.</given-names>
            <surname>Yau</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>On informationtheoretic measures for quantifying privacy protection of time-series data</article-title>
          .
          <source>In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. ACM</source>
          , New York, NY, USA, ASIA CCS '
          <volume>15</volume>
          , pages
          <fpage>427</fpage>
          -
          <lpage>438</lpage>
          . https://doi.org/10.1145/2714576.2714577.
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Machanavajjhala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kifer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gehrke</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Venkitasubramaniam</surname>
          </string-name>
          .
          <year>2006</year>
          .
          <article-title>l-diversity: Privacy beyond k-anonymity</article-title>
          .
          <source>In IN ICDE.</source>
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>McLoughlin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Duffy</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Conlon</surname>
          </string-name>
          .
          <year>2010</year>
          .
          <article-title>The generation of domestic electricity load profiles through markov chain modelling</article-title>
          .
          <source>Euro-Asian Journal of Sustainable Energy Development Policy</source>
          <volume>3</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>HO. McQueen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. R.</given-names>
            <surname>Hyland</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Watson</surname>
          </string-name>
          .
          <year>2004</year>
          .
          <article-title>Monte carlo simulation of residential electricity demand for forecasting maximum demand on distribution networks</article-title>
          .
          <source>IEEE Transactions on Power Systems</source>
          <volume>19</volume>
          (
          <issue>3</issue>
          ):
          <fpage>1685</fpage>
          -
          <lpage>1689</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>McSherry</surname>
          </string-name>
          and
          <string-name>
            <given-names>I.</given-names>
            <surname>Mironov</surname>
          </string-name>
          .
          <year>2009</year>
          .
          <article-title>Differentially private recommender systems: building privacy into the net</article-title>
          .
          <source>In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM</source>
          , New York, NY, USA, KDD '
          <volume>09</volume>
          , pages
          <fpage>627</fpage>
          -
          <lpage>636</lpage>
          . https://doi.org/10.1145/1557019.1557090.
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Muratori</surname>
          </string-name>
          , Ma. C. Roberts,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sioshansi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Marano</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G.</given-names>
            <surname>Rizzoni</surname>
          </string-name>
          .
          <year>2013</year>
          .
          <article-title>A highly resolved modeling technique to simulate residential power demand</article-title>
          .
          <source>Applied Energy</source>
          <volume>107</volume>
          :
          <fpage>465</fpage>
          -
          <lpage>473</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Narayanan</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Shmatikov</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>Robust deanonymization of large sparse datasets</article-title>
          .
          <source>In 2008 IEEE Symposium on Security and Privacy</source>
          (sp
          <year>2008</year>
          ). pages
          <fpage>111</fpage>
          -
          <lpage>125</lpage>
          . https://doi.org/10.1109/SP.
          <year>2008</year>
          .
          <volume>33</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Nedellec</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cugliari</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Goude</surname>
          </string-name>
          .
          <year>2014</year>
          .
          <article-title>Gefcom2012: Electric load forecasting and backcasting with semi-parametric models</article-title>
          .
          <source>International Journal of Forecasting</source>
          <volume>30</volume>
          (
          <issue>2</issue>
          ):
          <fpage>375</fpage>
          -
          <lpage>381</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Nin</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Torra</surname>
          </string-name>
          .
          <year>2009</year>
          .
          <article-title>Towards the evaluation of time series protection methods</article-title>
          .
          <source>Information Sciences</source>
          <volume>179</volume>
          (
          <issue>11</issue>
          ):
          <fpage>1663</fpage>
          -
          <lpage>1677</lpage>
          . Including Special Issue on Chance Discovery.
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <string-name>
            <given-names>J.V.</given-names>
            <surname>Paatero</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.D.</given-names>
            <surname>Lund</surname>
          </string-name>
          .
          <year>2005</year>
          .
          <article-title>A model for generating household electricity load profiles</article-title>
          .
          <source>International journal of energy research 30.</source>
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Pierrot</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Goude</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Short-term electricity load forecasting with generalized additive models</article-title>
          .
          <source>Proceedings of ISAP</source>
          power pages
          <fpage>593</fpage>
          -
          <lpage>600</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Pompey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bondu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Goude</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Sinn</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>Massive-Scale Simulation of Electrical Load in Smart Grids Using Generalized Additive Models</article-title>
          , Springer International Publishing, Cham, pages
          <fpage>193</fpage>
          -
          <lpage>212</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Rani</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Sikka</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>Recent techniques of clustering of time series data: A survey</article-title>
          .
          <source>International Journal of Computer Applications .</source>
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          <string-name>
            <given-names>E.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.-H. H.</given-names>
            <surname>Chan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. G.</given-names>
            <surname>Rieffel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Chow</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Song</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Privacy-preserving aggregation of time-series data</article-title>
          .
          <source>In Proceedings of the Network and Distributed System Security Symposium, NDSS</source>
          <year>2011</year>
          , San Diego, California, USA, 6th February - 9th
          <source>February</source>
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            <surname>Shou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Shang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Chen</surname>
          </string-name>
          , G. Chen, and
          <string-name>
            <given-names>C.</given-names>
            <surname>Zhang</surname>
          </string-name>
          .
          <year>2013</year>
          .
          <article-title>Supporting pattern-preserving anonymization for time-series data</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>25</volume>
          (
          <issue>4</issue>
          ):
          <fpage>877</fpage>
          -
          <lpage>892</lpage>
          . https://doi.org/10.1109/TKDE.
          <year>2011</year>
          .
          <volume>249</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Solanas</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Ballesté</surname>
          </string-name>
          .
          <year>2006</year>
          .
          <article-title>V-mdav: Variable group size multivariate microaggregation</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          <string-name>
            <given-names>B.</given-names>
            <surname>Suri</surname>
          </string-name>
          , U. D.
          <string-name>
            <surname>Bordoloi</surname>
            , and
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Eles</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>A scalable gpu-based approach to accelerate the multiple-choice knapsack problem</article-title>
          .
          <source>In 2012 Design, Automation Test in Europe Conference Exhibition (DATE)</source>
          . pages
          <fpage>1126</fpage>
          -
          <lpage>1129</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          https://doi.org/10.1109/DATE.
          <year>2012</year>
          .
          <volume>6176665</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            <surname>Sweeney</surname>
          </string-name>
          .
          <year>2002</year>
          .
          <article-title>K-anonimity: A model for protecting privacy</article-title>
          .
          <source>International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems</source>
          <volume>10</volume>
          (
          <issue>05</issue>
          ):
          <fpage>557</fpage>
          -
          <lpage>570</lpage>
          . https://doi.org/10.1142/S0218488502001648.
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Torra</surname>
          </string-name>
          .
          <year>2017</year>
          .
          <article-title>Data Privacy: Foundations, New Developments and the Big Data Challenge (Studies in Big Data)</article-title>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          <string-name>
            <given-names>G.</given-names>
            <surname>Tóth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hornák</surname>
          </string-name>
          , and et al.
          <year>2004</year>
          . anonymity revisited.
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Tudor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Almgren</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Papatriantafilou</surname>
          </string-name>
          .
          <year>2013</year>
          .
          <article-title>Analysis of the impact of data granularity on privacy for the smart grid</article-title>
          .
          <source>WPES '13 Proceedings of the 12th ACM .</source>
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Venkatasubramanian</surname>
          </string-name>
          .
          <year>2008</year>
          . Measures of Anonymity, Springer US, Boston, MA, pages
          <fpage>81</fpage>
          -
          <lpage>103</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          <string-name>
            <given-names>X.</given-names>
            <surname>Xu</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Numao</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>An efficient generalized clustering method for achieving k-anonymization</article-title>
          .
          <source>In 2015 Third International Symposium on Computing and Networking (CANDAR)</source>
          . pages
          <fpage>499</fpage>
          -
          <lpage>502</lpage>
          . https://doi.org/10.1109/CANDAR.
          <year>2015</year>
          .
          <volume>61</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          <string-name>
            <given-names>G.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , X. Liu, and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yang</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>Timeseries pattern based effective noise generation for privacy protection on cloud</article-title>
          .
          <source>IEEE Transactions on Computers</source>
          <volume>64</volume>
          (
          <issue>5</issue>
          ):
          <fpage>1456</fpage>
          -
          <lpage>1469</lpage>
          . https://doi.org/10.1109/TC.
          <year>2014</year>
          .
          <volume>2298013</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Koudas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Srivastava</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <year>2007</year>
          .
          <article-title>Aggregate query answering on anonymized tables</article-title>
          .
          <source>In 2007 IEEE 23rd International Conference on Data Engineering</source>
          . pages
          <fpage>116</fpage>
          -
          <lpage>125</lpage>
          . https://doi.org/10.1109/ICDE.
          <year>2007</year>
          .
          <volume>367857</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pei</surname>
          </string-name>
          , and
          <string-name>
            <given-names>W.</given-names>
            <surname>Luk</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>A brief survey on anonymization techniques for privacy preserving publishing of social network data</article-title>
          .
          <source>SIGKDD Explor. Newsl</source>
          .
          <volume>10</volume>
          :
          <fpage>12</fpage>
          -
          <lpage>22</lpage>
          . https://doi.org/10.1145/1540276.1540279.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>