Skip to main content
. Author manuscript; available in PMC: 2019 Aug 21.
Published in final edited form as: IEEE Trans Knowl Data Eng. 2018 Apr 9;31(7):1281–1295. doi: 10.1109/TKDE.2018.2824328

TABLE 1.

Summary of Notations

U The set of users in the database
i The ith user where i ∈ [1, |U|]
loc Value domain {loc1, …, locn} of all user’s data
lit, lit The data of user i at time t, litloc, litlit
Dt The database at time t, Dt={l1t,,lnt}
Mt Differentially private mechanism over Dt
rt Differentially private output at time t
Ai Adversary who targets user i without temporal correlations
AiT Adversary Ai with temporal correlations
PiB Transition matrix that represents Pr(lit1|lit), i.e., backward temporal correlation, known to AiT
PiF Transition matrix that represents Pr(lit|lit1), i.e., forward
temporal correlation, known to AiT
DKt The subset of database Dt{lit} known to AiT