Research Article
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points
Figure 11
Trajectory leakage probability comparison. (a) Regardless of the safety of the start- and end-points. (b) Considering the safety of the start- and end-points.
(a) |
(b) |