Fig. 6From: Enhancing correlated big data privacy using differential privacy and machine learningStep 5 of proposed methodologyBack to article page