Research Article

Privacy Protection Method for Multiple Sensitive Attributes Based on Strong Rule

Figure 1

The comparison of execution time, .