Research Article

A New Mining and Protection Method Based on Sensitive Data

Figure 1

Data preprocessing flow chart.