diff --git a/graphics/related/rel-dep.pdf b/graphics/related/rel-cor.pdf similarity index 100% rename from graphics/related/rel-dep.pdf rename to graphics/related/rel-cor.pdf diff --git a/text/related/main.tex b/text/related/main.tex index 1a41bba..8694f68 100644 --- a/text/related/main.tex +++ b/text/related/main.tex @@ -20,7 +20,7 @@ First, we group works with respect to whether they deal with microdata or statis The works are equally divided between the two data categories, while $55$\% of them propose location-specific techniques. Then, we further group them into two subcategories, whether they are designed for the finite or infinite (see Section.~\ref{subsec:data-publishing}) observation setting. $59$\% of the reviewed literature deals with finite data observation, $57$\% implements the streaming publishing mode, while $77$\% applies the global publishing scheme. -Finally, we identify the privacy-related aspects of each work in terms of the method and protection level that they apply, as well as the privacy attacks that they are considering with emphasis on the underlying data dependence (see Figure~\ref{fig:rel-stats} for the detailed cumulative statistics). +Finally, we identify the privacy-related aspects of each work in terms of the method and protection level that they apply, as well as the privacy attacks that they are considering with emphasis on the underlying data correlation (see Figure~\ref{fig:rel-stats} for the detailed cumulative statistics). \begin{figure}[htp] \centering @@ -35,10 +35,10 @@ Finally, we identify the privacy-related aspects of each work in terms of the me \subcaptionbox{Privacy attack\label{fig:rel-atk}}{% \includegraphics[width=.5\linewidth]{related/rel-atk}% }% - \subcaptionbox{Data dependence\label{fig:rel-dep}}{% - \includegraphics[width=.5\linewidth]{related/rel-dep}% + \subcaptionbox{Data correlation\label{fig:rel-cor}}{% + \includegraphics[width=.5\linewidth]{related/rel-cor}% }% - \caption{The privacy-related aspects of the reviewed literature in terms of (a)~the privacy method utilized, (b)~the protection level provided, (c)~the privacy attack considered, and (d)~data dependence therein.} + \caption{The privacy-related aspects of the reviewed literature in terms of (a)~the privacy method utilized, (b)~the protection level provided, (c)~the privacy attack considered, and (d)~data correlation therein.} \label{fig:rel-stats} \end{figure}