Research Article

Batching Location Cloaking Techniques for Location Privacy and Safety Protection

Figure 5

Effect of the location privacy (K).
(a)
(b)