From f778511c109c912df695c8962db03505809242ac Mon Sep 17 00:00:00 2001 From: Manos Katsomallos Date: Sat, 30 Oct 2021 16:59:12 +0200 Subject: [PATCH] contribution: Replied to Katerina's comments --- text/introduction/contribution.tex | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a/text/introduction/contribution.tex b/text/introduction/contribution.tex index ed065f0..9483e14 100644 --- a/text/introduction/contribution.tex +++ b/text/introduction/contribution.tex @@ -8,7 +8,11 @@ Furthermore, we consider the presence of temporal correlation, which is inherent \paragraph{Privacy, space and time} -The first contribution of this thesis is the survey\kat{cite it here} of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in \kat{name the journal and the special issue}. +The first contribution of this thesis is the survey~\cite{katsomallos2019privacy} +% \kat{cite it here} +of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in +% \kat{name the journal and the special issue} +the special feature on Geospatial Privacy and Security in the $19$th journal of Spatial Information Science. We study works that were published over the past two decades and provide a guide that will navigate its users through the available methodology and help them select the algorithm(s) that fit(s) best their needs. We categorize the works that we review depending on if they deal with \emph{microdata} or \emph{statistical data}. @@ -38,4 +42,8 @@ We extensively evaluate the methods that we propose by conducting experiments on We compare {\thething} privacy with event- and user-level privacy protection, and investigates the behavior of the overall privacy loss under temporal correlation for different distributions of {\thethings}. Furthermore, we estimate the impact of the privacy-preserving dummy {\thething} selection module on the utility of our privacy scheme. -The second and the third contributions are described in the article \kat{cite the technical report}, which is submitted at the research papers track at the \kat{name the conference}. \ No newline at end of file +The second and the third contributions are described in the article~\cite{katsomallos2022landmark}, +% \kat{cite the technical report} +which is submitted at the research papers track +% \kat{name the conference} +of the $12$th ACM conference on Data and Application Security and Privacy.