Abstract
Dummy trajectory is widely used to protect the privacy of mobile users’ locations. However, two main challenges remain: (1) Map background information has not been modeled by machine learning methods in existing schemes, and (2) it is difficult to generate a good quality dummy trajectory that is similar to the real one. Focused on these two challenges, in this paper, we propose a dummy trajectory generation scheme with conditional generative adversary network (GAN), where the map features are extracted using convolutional neural network, which is regarded as a prior restriction of conditional GAN. Then, the movement pattern of the real trajectory is deduced by an auto-encoder and is involved in the dummy trajectory generation. Our model is trained and evaluated with two real-world datasets. Experimental results demonstrate that our scheme addresses these challenges well and defends against various attacks effectively.















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
The datasets analyzed during the current study are available in Geolife project (https://www.microsoft.com/en-us/research/project/geolife-building-social-networks-using-human-location-history/) and T-Drive research (https://www.microsoft.com/en-us/research/publication/t-drive-trajectory-data-sample/).
References
He W (2017) Research on lbs privacy protection technology in mobile social networks. In: 2017 IEEE 2nd advanced information technology, electronic and automation control conference (IAEAC), IEEE, pp 73–76. https://doi.org/10.1109/IAEAC.2017.8053979.
Krumm J (2009) A survey of computational location privacy. Personal Ubiquit Comput 13(6):391–399. https://doi.org/10.1007/s00779-008-0212-5
Wernke M, Skvortsov P, Dürr F, Rothermel K (2014) A classification of location privacy attacks and approaches. Personal Ubiquit Comput 18(1):163–175. https://doi.org/10.1007/s00779-012-0633-z
Chow C-Y, Mokbel MF, Aref WG (2009) Casper* query processing for location services without compromising privacy. ACM Trans Database Syst (TODS) 34(4):1–48. https://doi.org/10.1145/1620585.1620591
Chow C-Y, Mokbel MF, Liu X (2011) Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2):351–380. https://doi.org/10.1007/s10707-009-0099-y
Xu T, Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: IEEE INFOCOM 2008-The 27th conference on computer communications, pp 547–555. IEEE
Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: International conference on pervasive computing, pp 152–170. https://doi.org/10.1007/11428572_10.Springer
Mascetti S, Freni D, Bettini C, Wang XS, Jajodia S (2011) Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J 20(4):541–566. https://doi.org/10.1007/s00778-010-0213-7
Chen R, Fung BC, Mohammed N, Desai BC, Wang K (2013) Privacy-preserving trajectory data publishing by local suppression. Inf Sci 231:83–97. https://doi.org/10.1016/j.ins.2011.07.035
Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: The ninth international conference on mobile data management (mdm 2008), pp 65–72. Doi: https://doi.org/10.1109/MDM.2008.29.IEEE
Ngo H, Kim J (2015) Location privacy via differential private perturbation of cloaking area. In: 2015 IEEE 28th computer security foundations symposium, pp. 63–74. IEEE
Ou L, Qin Z, Liu Y, Yin H, Hu Y, Chen H (2016) Multi-user location correlation protection with differential privacy. In: 2016 IEEE 22nd international conference on parallel and distributed systems (ICPADS), pp 422–429. IEEE
Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: ICPS’05 proceedings international conference on pervasive services, 2005., pp 88–97. IEEE
You T-H, Peng W-C, Lee W-C (2007) Protecting moving trajectories with dummies. In: 2007 International conference on mobile data management, pp 278–282. IEEE
Lei P-R, Peng W-C, Su I-J, Chang C-P et al (2012) Dummy-based schemes for protecting movement trajectories. J Inf Sci Eng 28(2):335–350
Wu X, Sun G (2014) A novel dummy-based mechanism to protect privacy on trajectories. In: 2014 IEEE international conference on data mining workshop, pp 1120–1125. IEEE
Niu B, Li Q, Zhu X, Cao G, Li H (2014) Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014-IEEE conference on computer communications, pp 754–762. IEEE
Wu Q, Liu H, Zhang C, Fan Q, Li Z, Wang K (2019) Trajectory protection schemes based on a gravity mobility model in iot. Electronics 8(2):148. https://doi.org/10.3390/electronics8020148
Kato R, Iwata M, Hara T, Suzuki A, Xie X, Arase Y, Nishio S (2012) A dummy-based anonymization method based on user trajectory with pauses. In: Proceedings of the 20th international conference on advances in geographic information systems, pp 249–258
Pan J, Liu Y, Zhang W (2019) Detection of dummy trajectories using convolutional neural networks. Security Commun Netw. https://doi.org/10.1155/2019/8431074
Pan J, Yang J, Liu Y (2019) Dummy trajectory generation scheme based on deep learning. In: International symposium on cyberspace safety and security, pp 511–523. Springer
Rao J, Gao S, Kang Y, Huang Q (2020) Lstm-trajgan: a deep learning approach to trajectory privacy protection. arXiv preprint arXiv:2006.10521. https://doi.org/10.48550/arXiv.2006.10521
Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Adv Neural Inf Process Syst 27
De Brébisson A, Simon É, Auvolat A, Vincent P, Bengio Y (2015) Artificial neural networks applied to taxi destination prediction. arXiv preprint arXiv:1508.00021. Doi: https://doi.org/10.48550/arXiv.1508.00021
LeCun Y, Bengio Y et al (1995) Convolutional networks for images, speech, and time series. Handbook Brain Theory Neural Netw 3361(10):1995
Mirza M, Osindero S (2014) Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784. https://doi.org/10.48550/arXiv.1411.1784
Liu L, Zhang H, Xu X, Zhang Z, Yan S (2020) Collocating clothes with generative adversarial networks cosupervised by categories and attributes: a multidiscriminator framework. IEEE Trans Neural Netw Learn Syst 31(9):3540–3554. https://doi.org/10.1109/TNNLS.2019.2944979
Hinton GE, Zemel RS (1994) Autoencoders, minimum description length, and helmholtz free energy. Adv Neural Inf Process Syst 6:3–10
Hong Q, Shi Z, Sun J, Du S (2021) Memristive self-learning logic circuit with application to encoder and decoder. Neural Comput Appl. https://doi.org/10.1007/s00521-020-05281-z
Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Pereira F, Burges CJ, Bottou L, Weinberger KQ (eds) Adv Neural Inf Process Syst 25. Curran Associates, Inc. https://proceedings.neurips.cc/paper/2012/file/c399862d3b9d6b76c8436e924a68c45b-Paper.pdf
Deng Y, Xie X (2022) Cnn-based architecture recognition and contour standardization based on aerial images. Neural Comput Appl. https://doi.org/10.1007/s00521-022-07288-0
Nair V, Hinton GE (2010) Rectified linear units improve restricted boltzmann machines. In: ICML, pp 807–814. https://icml.cc/Conferences/2010/papers/432.pdf
Ioffe S, Szegedy C (2015) Batch normalization: Accelerating deep network training by reducing internal covariate shift. In: International conference on machine learning, pp 448–456. PMLR
Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735
Guo Q, Guo Y (2022) Lexicon enhanced chinese named entity recognition with pointer network. Neural Comput Appl. https://doi.org/10.1007/s00521-022-07287-1
Alahi A, Goel K, Ramanathan V, Robicquet A, Fei-Fei L, Savarese S (2016) Social lstm: Human trajectory prediction in crowded spaces. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 961–971
Gupta A, Johnson J, Fei-Fei L, Savarese S, Alahi A (2018) Social gan: Socially acceptable trajectories with generative adversarial networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2255–2264
Han J, Moraga C (1995) The influence of the sigmoid function parameters on the speed of backpropagation learning. In: International workshop on artificial neural networks, Berlin, Heidelberg, pp 195–201. Springer
Redmon J, Farhadi A (2017) Yolo9000: better, faster, stronger. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 7263–7271
Maas AL, Hannun AY, Ng AY et al (2013) Rectifier nonlinearities improve neural network acoustic models. In: Proceedings of the Icml, vol 30, p 3. Citeseer
Yan H, Zhang H, Liu L, Zhou D, Xu X, Zhang Z, Yan S (2022) Toward intelligent design: An ai-based fashion designer using generative adversarial networks aided by sketch and rendering generators. IEEE Trans Multimedia, pp 1–1. Doi: https://doi.org/10.1109/TMM.2022.3146010
Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980. https://doi.org/10.48550/arXiv.1412.6980
Heusel M, Ramsauer H, Unterthiner T, Nessler B, Hochreiter S (2017) Gans trained by a two time-scale update rule converge to a local nash equilibrium. Adv Neural Inf Process Syst 30. Doi: https://doi.org/10.48550/arXiv.1706.08500
Zheng Y, Xie X, Ma W-Y et al (2010) Geolife: a collaborative social networking service among user, location and trajectory. IEEE Data Eng Bull 33(2):32–39
Yuan J, Zheng Y, Zhang C, Xie W, Xie X, Sun G, Huang Y (2010) T-drive: driving directions based on taxi trajectories. In: Proceedings of the 18th SIGSPATIAL international conference on advances in geographic information systems, pp 99–108
Wang Z, Ye T, Lu M, Yuan X, Qu H, Yuan J, Wu Q (2014) Visual exploration of sparse traffic trajectory data. IEEE Trans Vis Comput Graph 20(12):1813–1822. https://doi.org/10.1109/TVCG.2014.2346746
Funding
This work is supported in part by the National Natural Science Foundation of China (62072133) and in part by the Key Projects of Guangxi Natural Science Foundation (2018GXNSFDA281040).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no competing interests to declare that are relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yang, J., Yu, X., Meng, W. et al. Dummy trajectory generation scheme based on generative adversarial networks. Neural Comput & Applic 35, 8453–8469 (2023). https://doi.org/10.1007/s00521-022-08121-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-022-08121-4