Fig. 9From: A trusted de-swinging k-anonymity scheme for location privacy protectionThe percent of case 1 detected malicious nodesBack to article page