Research Article

Protecting the Moving User’s Locations by Combining Differential Privacy and -Anonymity under Temporal Correlations in Wireless Networks

Figure 8

Compared with the real trajectory.
(a) Real trajectory
(b) Add noise to the Markov transfer mechanism
(c) Cloaking region