Research Article
Protecting the Moving User’s Locations by Combining Differential Privacy and -Anonymity under Temporal Correlations in Wireless Networks
Figure 8
Compared with the real trajectory.
(a) Real trajectory |
(b) Add noise to the Markov transfer mechanism |
(c) Cloaking region |