Skip to main content

Advertisement

Log in

Dummy trajectory generation scheme based on generative adversarial networks

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Dummy trajectory is widely used to protect the privacy of mobile users’ locations. However, two main challenges remain: (1) Map background information has not been modeled by machine learning methods in existing schemes, and (2) it is difficult to generate a good quality dummy trajectory that is similar to the real one. Focused on these two challenges, in this paper, we propose a dummy trajectory generation scheme with conditional generative adversary network (GAN), where the map features are extracted using convolutional neural network, which is regarded as a prior restriction of conditional GAN. Then, the movement pattern of the real trajectory is deduced by an auto-encoder and is involved in the dummy trajectory generation. Our model is trained and evaluated with two real-world datasets. Experimental results demonstrate that our scheme addresses these challenges well and defends against various attacks effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

The datasets analyzed during the current study are available in Geolife project (https://www.microsoft.com/en-us/research/project/geolife-building-social-networks-using-human-location-history/) and T-Drive research (https://www.microsoft.com/en-us/research/publication/t-drive-trajectory-data-sample/).

References

  1. He W (2017) Research on lbs privacy protection technology in mobile social networks. In: 2017 IEEE 2nd advanced information technology, electronic and automation control conference (IAEAC), IEEE, pp 73–76. https://doi.org/10.1109/IAEAC.2017.8053979.

  2. Krumm J (2009) A survey of computational location privacy. Personal Ubiquit Comput 13(6):391–399. https://doi.org/10.1007/s00779-008-0212-5

    Article  Google Scholar 

  3. Wernke M, Skvortsov P, Dürr F, Rothermel K (2014) A classification of location privacy attacks and approaches. Personal Ubiquit Comput 18(1):163–175. https://doi.org/10.1007/s00779-012-0633-z

    Article  Google Scholar 

  4. Chow C-Y, Mokbel MF, Aref WG (2009) Casper* query processing for location services without compromising privacy. ACM Trans Database Syst (TODS) 34(4):1–48. https://doi.org/10.1145/1620585.1620591

    Article  Google Scholar 

  5. Chow C-Y, Mokbel MF, Liu X (2011) Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2):351–380. https://doi.org/10.1007/s10707-009-0099-y

    Article  Google Scholar 

  6. Xu T, Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: IEEE INFOCOM 2008-The 27th conference on computer communications, pp 547–555. IEEE

  7. Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: International conference on pervasive computing, pp 152–170. https://doi.org/10.1007/11428572_10.Springer

  8. Mascetti S, Freni D, Bettini C, Wang XS, Jajodia S (2011) Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J 20(4):541–566. https://doi.org/10.1007/s00778-010-0213-7

    Article  Google Scholar 

  9. Chen R, Fung BC, Mohammed N, Desai BC, Wang K (2013) Privacy-preserving trajectory data publishing by local suppression. Inf Sci 231:83–97. https://doi.org/10.1016/j.ins.2011.07.035

    Article  MATH  Google Scholar 

  10. Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: The ninth international conference on mobile data management (mdm 2008), pp 65–72. Doi: https://doi.org/10.1109/MDM.2008.29.IEEE

  11. Ngo H, Kim J (2015) Location privacy via differential private perturbation of cloaking area. In: 2015 IEEE 28th computer security foundations symposium, pp. 63–74. IEEE

  12. Ou L, Qin Z, Liu Y, Yin H, Hu Y, Chen H (2016) Multi-user location correlation protection with differential privacy. In: 2016 IEEE 22nd international conference on parallel and distributed systems (ICPADS), pp 422–429. IEEE

  13. Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: ICPS’05 proceedings international conference on pervasive services, 2005., pp 88–97. IEEE

  14. You T-H, Peng W-C, Lee W-C (2007) Protecting moving trajectories with dummies. In: 2007 International conference on mobile data management, pp 278–282. IEEE

  15. Lei P-R, Peng W-C, Su I-J, Chang C-P et al (2012) Dummy-based schemes for protecting movement trajectories. J Inf Sci Eng 28(2):335–350

    MathSciNet  Google Scholar 

  16. Wu X, Sun G (2014) A novel dummy-based mechanism to protect privacy on trajectories. In: 2014 IEEE international conference on data mining workshop, pp 1120–1125. IEEE

  17. Niu B, Li Q, Zhu X, Cao G, Li H (2014) Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014-IEEE conference on computer communications, pp 754–762. IEEE

  18. Wu Q, Liu H, Zhang C, Fan Q, Li Z, Wang K (2019) Trajectory protection schemes based on a gravity mobility model in iot. Electronics 8(2):148. https://doi.org/10.3390/electronics8020148

    Article  Google Scholar 

  19. Kato R, Iwata M, Hara T, Suzuki A, Xie X, Arase Y, Nishio S (2012) A dummy-based anonymization method based on user trajectory with pauses. In: Proceedings of the 20th international conference on advances in geographic information systems, pp 249–258

  20. Pan J, Liu Y, Zhang W (2019) Detection of dummy trajectories using convolutional neural networks. Security Commun Netw. https://doi.org/10.1155/2019/8431074

  21. Pan J, Yang J, Liu Y (2019) Dummy trajectory generation scheme based on deep learning. In: International symposium on cyberspace safety and security, pp 511–523. Springer

  22. Rao J, Gao S, Kang Y, Huang Q (2020) Lstm-trajgan: a deep learning approach to trajectory privacy protection. arXiv preprint arXiv:2006.10521. https://doi.org/10.48550/arXiv.2006.10521

  23. Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Adv Neural Inf Process Syst 27

  24. De Brébisson A, Simon É, Auvolat A, Vincent P, Bengio Y (2015) Artificial neural networks applied to taxi destination prediction. arXiv preprint arXiv:1508.00021. Doi: https://doi.org/10.48550/arXiv.1508.00021

  25. LeCun Y, Bengio Y et al (1995) Convolutional networks for images, speech, and time series. Handbook Brain Theory Neural Netw 3361(10):1995

    Google Scholar 

  26. Mirza M, Osindero S (2014) Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784. https://doi.org/10.48550/arXiv.1411.1784

  27. Liu L, Zhang H, Xu X, Zhang Z, Yan S (2020) Collocating clothes with generative adversarial networks cosupervised by categories and attributes: a multidiscriminator framework. IEEE Trans Neural Netw Learn Syst 31(9):3540–3554. https://doi.org/10.1109/TNNLS.2019.2944979

    Article  MathSciNet  Google Scholar 

  28. Hinton GE, Zemel RS (1994) Autoencoders, minimum description length, and helmholtz free energy. Adv Neural Inf Process Syst 6:3–10

    Google Scholar 

  29. Hong Q, Shi Z, Sun J, Du S (2021) Memristive self-learning logic circuit with application to encoder and decoder. Neural Comput Appl. https://doi.org/10.1007/s00521-020-05281-z

    Article  Google Scholar 

  30. Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Pereira F, Burges CJ, Bottou L, Weinberger KQ (eds) Adv Neural Inf Process Syst 25. Curran Associates, Inc. https://proceedings.neurips.cc/paper/2012/file/c399862d3b9d6b76c8436e924a68c45b-Paper.pdf

  31. Deng Y, Xie X (2022) Cnn-based architecture recognition and contour standardization based on aerial images. Neural Comput Appl. https://doi.org/10.1007/s00521-022-07288-0

    Article  Google Scholar 

  32. Nair V, Hinton GE (2010) Rectified linear units improve restricted boltzmann machines. In: ICML, pp 807–814. https://icml.cc/Conferences/2010/papers/432.pdf

  33. Ioffe S, Szegedy C (2015) Batch normalization: Accelerating deep network training by reducing internal covariate shift. In: International conference on machine learning, pp 448–456. PMLR

  34. Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735

    Article  Google Scholar 

  35. Guo Q, Guo Y (2022) Lexicon enhanced chinese named entity recognition with pointer network. Neural Comput Appl. https://doi.org/10.1007/s00521-022-07287-1

    Article  Google Scholar 

  36. Alahi A, Goel K, Ramanathan V, Robicquet A, Fei-Fei L, Savarese S (2016) Social lstm: Human trajectory prediction in crowded spaces. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 961–971

  37. Gupta A, Johnson J, Fei-Fei L, Savarese S, Alahi A (2018) Social gan: Socially acceptable trajectories with generative adversarial networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2255–2264

  38. Han J, Moraga C (1995) The influence of the sigmoid function parameters on the speed of backpropagation learning. In: International workshop on artificial neural networks, Berlin, Heidelberg, pp 195–201. Springer

  39. Redmon J, Farhadi A (2017) Yolo9000: better, faster, stronger. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 7263–7271

  40. Maas AL, Hannun AY, Ng AY et al (2013) Rectifier nonlinearities improve neural network acoustic models. In: Proceedings of the Icml, vol 30, p 3. Citeseer

  41. Yan H, Zhang H, Liu L, Zhou D, Xu X, Zhang Z, Yan S (2022) Toward intelligent design: An ai-based fashion designer using generative adversarial networks aided by sketch and rendering generators. IEEE Trans Multimedia, pp 1–1. Doi: https://doi.org/10.1109/TMM.2022.3146010

  42. Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980. https://doi.org/10.48550/arXiv.1412.6980

  43. Heusel M, Ramsauer H, Unterthiner T, Nessler B, Hochreiter S (2017) Gans trained by a two time-scale update rule converge to a local nash equilibrium. Adv Neural Inf Process Syst 30. Doi: https://doi.org/10.48550/arXiv.1706.08500

  44. Zheng Y, Xie X, Ma W-Y et al (2010) Geolife: a collaborative social networking service among user, location and trajectory. IEEE Data Eng Bull 33(2):32–39

    Google Scholar 

  45. Yuan J, Zheng Y, Zhang C, Xie W, Xie X, Sun G, Huang Y (2010) T-drive: driving directions based on taxi trajectories. In: Proceedings of the 18th SIGSPATIAL international conference on advances in geographic information systems, pp 99–108

  46. Wang Z, Ye T, Lu M, Yuan X, Qu H, Yuan J, Wu Q (2014) Visual exploration of sparse traffic trajectory data. IEEE Trans Vis Comput Graph 20(12):1813–1822. https://doi.org/10.1109/TVCG.2014.2346746

    Article  Google Scholar 

Download references

Funding

This work is supported in part by the National Natural Science Foundation of China (62072133) and in part by the Key Projects of Guangxi Natural Science Foundation (2018GXNSFDA281040).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yining Liu.

Ethics declarations

Conflict of interest

The authors have no competing interests to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, J., Yu, X., Meng, W. et al. Dummy trajectory generation scheme based on generative adversarial networks. Neural Comput & Applic 35, 8453–8469 (2023). https://doi.org/10.1007/s00521-022-08121-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-022-08121-4

Keywords