contribution: Replied to Katerina's comments
This commit is contained in:
		@ -8,7 +8,11 @@ Furthermore, we consider the presence of temporal correlation, which is inherent
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
\paragraph{Privacy, space and time}
 | 
					\paragraph{Privacy, space and time}
 | 
				
			||||||
The first contribution of this thesis is the survey\kat{cite it here} of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in \kat{name the journal and the special issue}.
 | 
					The first contribution of this thesis is the survey~\cite{katsomallos2019privacy}
 | 
				
			||||||
 | 
					% \kat{cite it here}
 | 
				
			||||||
 | 
					of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in
 | 
				
			||||||
 | 
					% \kat{name the journal and the special issue}
 | 
				
			||||||
 | 
					the special feature on Geospatial Privacy and Security in the $19$th journal of Spatial Information Science.
 | 
				
			||||||
We study works that were published over the past two decades and provide a guide that will navigate its users through the available methodology and help them select the algorithm(s) that fit(s) best their needs.
 | 
					We study works that were published over the past two decades and provide a guide that will navigate its users through the available methodology and help them select the algorithm(s) that fit(s) best their needs.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
We categorize the works that we review depending on if they deal with \emph{microdata} or \emph{statistical data}.
 | 
					We categorize the works that we review depending on if they deal with \emph{microdata} or \emph{statistical data}.
 | 
				
			||||||
@ -38,4 +42,8 @@ We extensively evaluate the methods that we propose by conducting experiments on
 | 
				
			|||||||
We compare {\thething} privacy with event- and user-level privacy protection, and investigates the behavior of the overall privacy loss under temporal correlation for different distributions of {\thethings}.
 | 
					We compare {\thething} privacy with event- and user-level privacy protection, and investigates the behavior of the overall privacy loss under temporal correlation for different distributions of {\thethings}.
 | 
				
			||||||
Furthermore, we estimate the impact of the privacy-preserving dummy {\thething} selection module on the utility of our privacy scheme.
 | 
					Furthermore, we estimate the impact of the privacy-preserving dummy {\thething} selection module on the utility of our privacy scheme.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
The second and the third contributions are described in the article \kat{cite the technical report}, which is submitted at the research papers track at the \kat{name the conference}.
 | 
					The second and the third contributions are described in the article~\cite{katsomallos2022landmark},
 | 
				
			||||||
 | 
					% \kat{cite the technical report}
 | 
				
			||||||
 | 
					which is submitted at the research papers track
 | 
				
			||||||
 | 
					% \kat{name the conference}
 | 
				
			||||||
 | 
					of the $12$th ACM conference on Data and Application Security and Privacy.
 | 
				
			||||||
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user