Research Article

Batching Location Cloaking Techniques for Location Privacy and Safety Protection

Figure 4

Effect of the number of users.
(a)
(b)