Research Article

A New Mining and Protection Method Based on Sensitive Data

Figure 4

DIFD algorithm experimental results.
(a) Anonymous group number comparison
(b) Time cost comparison