Research Article

Graph Embedding-Based Sensitive Link Protection in IoT Systems

Algorithm 2

Generate privacy graph by deleting edges.
Input:: the original graph
  : the adjacency matrix of
  : the set of sensitive links
  : the end nodes set of
  : the empty matrix with the same shape as
  : the neighbor nodes set
Output:: the adjacency matrix of privacy graph
  fordo
2:  find the neighbor nodes set of
   fordo
4:    =1
   end for
6: end for
  return