TULAM: trajectory-user linking via attention mechanism

被引:3
作者
Li, Hao [1 ]
Cao, Shuyu [1 ,2 ]
Chen, Yaqing [1 ,2 ]
Zhang, Min [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Trusted Comp & Informat Assurance Lab, Inst Software, Beijing 100190, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
基金
国家重点研发计划;
关键词
information security; data security and privacy; trajectory-user linking; deep learning; recurrent neural network; attention mechanism;
D O I
10.1007/s11432-021-3673-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the application of location-based services (LBS) has become a prevalent means to provide convenience in customers' everyday lives. However, because massive volumes of location information are collected by LBS applications, users may suffer from serious privacy issues. Prior studies have shown that the identities of users can be inferred from historical anonymous trajectories, which is formulated as the trajectory-user linking (TUL) task. Although some recurrent neural network (RNN)-based models have been proposed to capture implicit movement patterns among trajectories to improve TUL performance, they cannot learn the sequential and contextual semantics within any individual trajectory completely, leaving the advantages of RNNs underutilized. We therefore propose an RNN model with an attention mechanism called TULAM to improve the accuracy of the TUL task. TULAM learns sequential relationships within individual trajectories via RNN and captures contextual semantics from trajectories via a multi-head attention mechanism. Additionally, we propose a novel location encoding method called approximate one-hot to solve the corpus shortage problem of trajectory datasets. Evaluations were conducted on real datasets from the Gowalla and Foursquare LBS platforms. The experimental results indicate that TULAM is a practical solution that achieves significant improvements over existing methods with satisfactory model complexity and convergence.
引用
收藏
页数:18
相关论文
共 37 条
[1]  
[Anonymous], 2010, Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, DOI DOI 10.1145/1869790.1869857
[2]  
Bahdanau D, 2016, Arxiv, DOI [arXiv:1409.0473, DOI 10.48550/ARXIV.1409.0473]
[3]  
Chen L, 2004, P 30 INT C VER LARG, V30, P792, DOI DOI 10.1016/B978-012088469-8.50070-X
[4]  
Chen W, 2022, P 31 INT JOINT C ART
[5]   The De-anonymization Method Based on User Spatio-Temporal Mobility Trace [J].
Chen, Zhenyu ;
Fu, Yanyan ;
Zhang, Min ;
Zhang, Zhenfeng ;
Li, Hao .
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 :459-471
[6]  
Cho E., 2011, P 17 ACM SIGKDD INT, P1082
[7]  
Das G, 1997, LECT NOTES ARTIF INT, V1263, P88
[8]   Unique in the Crowd: The privacy bounds of human mobility [J].
de Montjoye, Yves-Alexandre ;
Hidalgo, Cesar A. ;
Verleysen, Michel ;
Blondel, Vincent D. .
SCIENTIFIC REPORTS, 2013, 3
[9]   Reality mining: sensing complex social systems [J].
Eagle, Nathan ;
Pentland, Alex .
PERSONAL AND UBIQUITOUS COMPUTING, 2006, 10 (04) :255-268
[10]  
Freudiger J, 2012, LECT NOTES COMPUT SC, V7035, P31