Fig. 6From: Location privacy protection algorithm for mobile networksA complex model of mobile networkBack to article page