Research Article
Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks
(i) | Input: , D, m, , Q | (ii) | Output: , and | (1) | | (2) | for t in D do | (3) | for do | (4) | = | (5) | = | (6) | Sort elements of by their frequencies in in ascending order. | (7) | Remove the last elements in . | (8) | | (9) | end | (10) | end |
|