Skip to content

Commit 6d9fb90

Browse files
zachratlifftudorcebere
authored andcommitted
include example in how-to-use page
1 parent 16444f3 commit 6d9fb90

File tree

1 file changed

+17
-0
lines changed

1 file changed

+17
-0
lines changed

pages/how_to_use_the_repository/index.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,23 @@ class: deployments-registry
66
permalink: /how_to_use_the_repository/
77
---
88

9+
## How to Use the Repository
10+
11+
Each row in the [repository spreadsheet](https://docs.google.com/spreadsheets/d/1yG-B58i29vz0xp-yKjFPy1yj6fchGfp4keASS-zXdq8/edit#gid=0) corresponds to a published research paper describing an *output privacy attack*.
12+
Before diving into the column definitions, it is helpful to begin with a concrete example.
13+
14+
---
15+
16+
#### Example Entry
17+
18+
| **Title** | **Authors** | **Year** | **Data Type (Inputs)** | **Type of Data Release (Outputs)** | **Attacker Objectives** | **Research Type** |
19+
|------------|-------------|----------|-------------------------|------------------------------------|--------------------------|------------------|
20+
| *The 2010 Census Confidentiality Protections Failed, Here's How and Why* | <details><summary>John M. Abowd _et al._</summary>John M. Abowd, Tamara Adams, Robert Ashmead, David Darais, Sourya Dey, Simson L. Garfinkel, Nathan Goldschlag, Daniel Kifer, Philip Leclerc, Ethan Lew, Scott Moore, Rolando A. Rodríguez, Ramy N. Tadros, Lars Vilhuber</details> | 2023 | Tabular | Linear Queries | Reconstruction | Empirical |
21+
22+
This example illustrates how each paper is cataloged according to the **data type**, **release type**, **attacker objective**, and other metadata that enable cross-comparison and filtering across the literature.
23+
24+
---
25+
926
## How to use the repository
1027

1128
The information associated with each paper follows the format:

0 commit comments

Comments
 (0)