Research Article

The Formal Analysis on Negative Information Selections for Privacy Protection in Data Publishing

Figure 2

The attacker’s simulation experiment overview.