Fig. 7From: A trusted de-swinging k-anonymity scheme for location privacy protectionThe reputation of malicious request nodesBack to article page