Research Article

A New Mining and Protection Method Based on Sensitive Data

Figure 3

Mining time of experiment on two datasets.
(a) Mining time on Dataset1
(b) Mining time on Dataset2