Research Article

Research on Selection Method of Privacy Parameter

Figure 1

Fault tolerance values of adversary under different parameters.