Fig. 2From: A privacy-preserving exception handling approach for dynamic mobile crowdsourcing applicationsThree steps of our exception handling approach ExHSimhashBack to article page