Research Article

D2D Big Data Privacy-Preserving Framework Based on (a, k)-Anonymity Model

Figure 7

Running time and ILoss with the number of iterations vs. poker and synthetic datasets.
(a)
(b)
(c)