related: Correlation instead of dependence
This commit is contained in:
parent
9bf1a38ca7
commit
ae78e225bf
@ -20,7 +20,7 @@ First, we group works with respect to whether they deal with microdata or statis
|
|||||||
The works are equally divided between the two data categories, while $55$\% of them propose location-specific techniques.
|
The works are equally divided between the two data categories, while $55$\% of them propose location-specific techniques.
|
||||||
Then, we further group them into two subcategories, whether they are designed for the finite or infinite (see Section.~\ref{subsec:data-publishing}) observation setting.
|
Then, we further group them into two subcategories, whether they are designed for the finite or infinite (see Section.~\ref{subsec:data-publishing}) observation setting.
|
||||||
$59$\% of the reviewed literature deals with finite data observation, $57$\% implements the streaming publishing mode, while $77$\% applies the global publishing scheme.
|
$59$\% of the reviewed literature deals with finite data observation, $57$\% implements the streaming publishing mode, while $77$\% applies the global publishing scheme.
|
||||||
Finally, we identify the privacy-related aspects of each work in terms of the method and protection level that they apply, as well as the privacy attacks that they are considering with emphasis on the underlying data dependence (see Figure~\ref{fig:rel-stats} for the detailed cumulative statistics).
|
Finally, we identify the privacy-related aspects of each work in terms of the method and protection level that they apply, as well as the privacy attacks that they are considering with emphasis on the underlying data correlation (see Figure~\ref{fig:rel-stats} for the detailed cumulative statistics).
|
||||||
|
|
||||||
\begin{figure}[htp]
|
\begin{figure}[htp]
|
||||||
\centering
|
\centering
|
||||||
@ -35,10 +35,10 @@ Finally, we identify the privacy-related aspects of each work in terms of the me
|
|||||||
\subcaptionbox{Privacy attack\label{fig:rel-atk}}{%
|
\subcaptionbox{Privacy attack\label{fig:rel-atk}}{%
|
||||||
\includegraphics[width=.5\linewidth]{related/rel-atk}%
|
\includegraphics[width=.5\linewidth]{related/rel-atk}%
|
||||||
}%
|
}%
|
||||||
\subcaptionbox{Data dependence\label{fig:rel-dep}}{%
|
\subcaptionbox{Data correlation\label{fig:rel-cor}}{%
|
||||||
\includegraphics[width=.5\linewidth]{related/rel-dep}%
|
\includegraphics[width=.5\linewidth]{related/rel-cor}%
|
||||||
}%
|
}%
|
||||||
\caption{The privacy-related aspects of the reviewed literature in terms of (a)~the privacy method utilized, (b)~the protection level provided, (c)~the privacy attack considered, and (d)~data dependence therein.}
|
\caption{The privacy-related aspects of the reviewed literature in terms of (a)~the privacy method utilized, (b)~the protection level provided, (c)~the privacy attack considered, and (d)~data correlation therein.}
|
||||||
\label{fig:rel-stats}
|
\label{fig:rel-stats}
|
||||||
\end{figure}
|
\end{figure}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user