contribution: Replied to Katerina's comments

This commit is contained in:
Manos Katsomallos 2021-10-30 16:59:12 +02:00
parent 784cc704ef
commit f778511c10

View File

@ -8,7 +8,11 @@ Furthermore, we consider the presence of temporal correlation, which is inherent
\paragraph{Privacy, space and time}
The first contribution of this thesis is the survey\kat{cite it here} of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in \kat{name the journal and the special issue}.
The first contribution of this thesis is the survey~\cite{katsomallos2019privacy}
% \kat{cite it here}
of the existing literature regarding methods on privacy-preserving continuous data publishing, which appeared in
% \kat{name the journal and the special issue}
the special feature on Geospatial Privacy and Security in the $19$th journal of Spatial Information Science.
We study works that were published over the past two decades and provide a guide that will navigate its users through the available methodology and help them select the algorithm(s) that fit(s) best their needs.
We categorize the works that we review depending on if they deal with \emph{microdata} or \emph{statistical data}.
@ -38,4 +42,8 @@ We extensively evaluate the methods that we propose by conducting experiments on
We compare {\thething} privacy with event- and user-level privacy protection, and investigates the behavior of the overall privacy loss under temporal correlation for different distributions of {\thethings}.
Furthermore, we estimate the impact of the privacy-preserving dummy {\thething} selection module on the utility of our privacy scheme.
The second and the third contributions are described in the article \kat{cite the technical report}, which is submitted at the research papers track at the \kat{name the conference}.
The second and the third contributions are described in the article~\cite{katsomallos2022landmark},
% \kat{cite the technical report}
which is submitted at the research papers track
% \kat{name the conference}
of the $12$th ACM conference on Data and Application Security and Privacy.