Preserving source location privacy against the global attacker hiding in FOG | IEEE Conference Publication | IEEE Xplore