Research Article

A Trajectory Privacy Protect Method Based on Location Pair Reorganization

Figure 1

Example of identifying dummy trajectory.