Research Article

Data Privacy in Wearable IoT Devices: Anonymization and Deanonymization

Figure 6

Application execution log.