Research Article

A New Mining and Protection Method Based on Sensitive Data

Figure 2

Threshold determination time comparison.
(a) Sensitive data recognition rate on Dataset1
(b) Sensitive data recognition rate on Dataset2
(c) Algorithm comparison on Dataset1
(d) Algorithm comparison on Dataset2