contribution: Replied to Katerina's comments
This commit is contained in:
parent
784cc704ef
commit
f778511c10
@ -8,7 +8,11 @@ Furthermore, we consider the presence of temporal correlation, which is inherent
|
||||
|
||||
|
||||
\paragraph{Privacy, space and time}
|
||||
The first contribution of this thesis is the survey\kat{cite it here} of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in \kat{name the journal and the special issue}.
|
||||
The first contribution of this thesis is the survey~\cite{katsomallos2019privacy}
|
||||
% \kat{cite it here}
|
||||
of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in
|
||||
% \kat{name the journal and the special issue}
|
||||
the special feature on Geospatial Privacy and Security in the $19$th journal of Spatial Information Science.
|
||||
We study works that were published over the past two decades and provide a guide that will navigate its users through the available methodology and help them select the algorithm(s) that fit(s) best their needs.
|
||||
|
||||
We categorize the works that we review depending on if they deal with \emph{microdata} or \emph{statistical data}.
|
||||
@ -38,4 +42,8 @@ We extensively evaluate the methods that we propose by conducting experiments on
|
||||
We compare {\thething} privacy with event- and user-level privacy protection, and investigates the behavior of the overall privacy loss under temporal correlation for different distributions of {\thethings}.
|
||||
Furthermore, we estimate the impact of the privacy-preserving dummy {\thething} selection module on the utility of our privacy scheme.
|
||||
|
||||
The second and the third contributions are described in the article \kat{cite the technical report}, which is submitted at the research papers track at the \kat{name the conference}.
|
||||
The second and the third contributions are described in the article~\cite{katsomallos2022landmark},
|
||||
% \kat{cite the technical report}
|
||||
which is submitted at the research papers track
|
||||
% \kat{name the conference}
|
||||
of the $12$th ACM conference on Data and Application Security and Privacy.
|
||||
|
Loading…
Reference in New Issue
Block a user