Skip to main content
. 2017 Jul 26;10(Suppl 2):43. doi: 10.1186/s12920-017-0278-x

Fig. 5.

Fig. 5

Effect of method 1 on the power of the attack on beacon database considering different bias