Research Article

A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points

Figure 8

Loss rate. (a) Data loss rate. (b) Utility loss rate.
(a)
(b)