Fig. 10From: A trusted de-swinging k-anonymity scheme for location privacy protectionThe percent of case 2 detected malicious nodesBack to article page