Fig. 8From: Location privacy protection algorithm for mobile networksLooking for a relative maximum boundary tree for a user under complex mobile networkBack to article page