Adversarial Reconstruction of Trajectories: Privacy Risks and Attack Models in Trajectory Embedding
Abstract
References
Index Terms
- Adversarial Reconstruction of Trajectories: Privacy Risks and Attack Models in Trajectory Embedding
Recommendations
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferenceLocation trajectories collected by smartphones and other devices represent a valuable data source for applications such as location-based services. Likewise, trajectories have the potential to reveal sensitive information about individuals, e.g., ...
Embedding geographic information for anomalous trajectory detection
AbstractAnomalous trajectory detection is a crucial task in trajectory mining fields. Traditional anomalous trajectory detection methods mainly focus on the differences of a new trajectory and the historical trajectory with density and isolation ...
Trajectory Privacy Preserving for LBS in P2P Environment
ICBDC '18: Proceedings of the 3rd International Conference on Big Data and ComputingThis paper presents a trajectory similarity measurement method based on user's local anonymous area. This method can protect the location privacy among users between each other in an anonymous group. Based on the trajectory similarity and real user's ...
Comments
Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 58Total Downloads
- Downloads (Last 12 months)58
- Downloads (Last 6 weeks)11
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in