Fig. 5From: Location recommendation privacy protection method based on location sensitivity divisionExample of privacy budget allocation resultsBack to article page