Research Article
Graph Embedding-Based Sensitive Link Protection in IoT Systems
Algorithm 2
Generate privacy graph by deleting edges.
Input:: the original graph | : the adjacency matrix of | : the set of sensitive links | : the end nodes set of | : the empty matrix with the same shape as | : the neighbor nodes set | Output:: the adjacency matrix of privacy graph | fordo | 2: find the neighbor nodes set of | fordo | 4: =1 | end for | 6: end for | return |
|