Cited By
View all- Han HYang SDing JFu LWang XZhou C(2024)Adversarial Reconstruction of Trajectories: Privacy Risks and Attack Models in Trajectory EmbeddingProceedings of the 32nd ACM International Conference on Advances in Geographic Information Systems10.1145/3678717.3691274(259-269)Online publication date: 29-Oct-2024
- Cai KZhang JHong ZShand WWang GZhang DChi JTian YBaeza-Yates RBonchi F(2024)Where Have You Been? A Study of Privacy Risk for Point-of-Interest RecommendationProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671758(175-186)Online publication date: 25-Aug-2024
- Cheng MZhou ZZhang BWang ZGan JRen ZFeng WLyu YZhang HDiao X(2024)Efflex: Efficient and Flexible Pipeline for Spatio-Temporal Trajectory Graph Modeling and Representation Learning2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)10.1109/CVPRW63382.2024.00261(2546-2555)Online publication date: 17-Jun-2024