Fig. 3From: A trusted de-swinging k-anonymity scheme for location privacy protectionThe distribution of historical query probabilityBack to article page