contribution: Replied to Katerina's comments
This commit is contained in:
		@ -8,7 +8,11 @@ Furthermore, we consider the presence of temporal correlation, which is inherent
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
\paragraph{Privacy, space and time}
 | 
			
		||||
The first contribution of this thesis is the survey\kat{cite it here} of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in \kat{name the journal and the special issue}.
 | 
			
		||||
The first contribution of this thesis is the survey~\cite{katsomallos2019privacy}
 | 
			
		||||
% \kat{cite it here}
 | 
			
		||||
of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in
 | 
			
		||||
% \kat{name the journal and the special issue}
 | 
			
		||||
the special feature on Geospatial Privacy and Security in the $19$th journal of Spatial Information Science.
 | 
			
		||||
We study works that were published over the past two decades and provide a guide that will navigate its users through the available methodology and help them select the algorithm(s) that fit(s) best their needs.
 | 
			
		||||
 | 
			
		||||
We categorize the works that we review depending on if they deal with \emph{microdata} or \emph{statistical data}.
 | 
			
		||||
@ -38,4 +42,8 @@ We extensively evaluate the methods that we propose by conducting experiments on
 | 
			
		||||
We compare {\thething} privacy with event- and user-level privacy protection, and investigates the behavior of the overall privacy loss under temporal correlation for different distributions of {\thethings}.
 | 
			
		||||
Furthermore, we estimate the impact of the privacy-preserving dummy {\thething} selection module on the utility of our privacy scheme.
 | 
			
		||||
 | 
			
		||||
The second and the third contributions are described in the article \kat{cite the technical report}, which is submitted at the research papers track at the \kat{name the conference}.
 | 
			
		||||
The second and the third contributions are described in the article~\cite{katsomallos2022landmark},
 | 
			
		||||
% \kat{cite the technical report}
 | 
			
		||||
which is submitted at the research papers track
 | 
			
		||||
% \kat{name the conference}
 | 
			
		||||
of the $12$th ACM conference on Data and Application Security and Privacy.
 | 
			
		||||
 | 
			
		||||
		Reference in New Issue
	
	Block a user