Research Article
A New Mining and Protection Method Based on Sensitive Data
Figure 2
Threshold determination time comparison.
(a) Sensitive data recognition rate on Dataset1 |
(b) Sensitive data recognition rate on Dataset2 |
(c) Algorithm comparison on Dataset1 |
(d) Algorithm comparison on Dataset2 |