Research Article

Research on Selection Method of Privacy Parameter

Figure 2

Fault tolerance values of adversary under different intervals.