RE-Trace: Re-identification of Modified GPS Trajectories

被引:0
|
作者
Schestakov, Stefan [1 ]
Gottschalk, Simon [1 ]
Funke, Thorben [1 ]
Demidova, Elena [2 ]
机构
[1] Leibniz Univ Hannover, Res Ctr L3S, Hannover, Germany
[2] Univ Bonn, Data Sci & Intelligent Syst Grp DSIS, Lamarr Inst Machine Learning & Artificial Intellig, Bonn, Germany
关键词
GPS trajectories; data privacy; contrastive learning; spatio-temporal data; personal data;
D O I
10.1145/3643680
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
GPS trajectories are a critical asset for building spatio-temporal predictive models in urban regions in the context of road safety monitoring, traffic management, and mobility services. Currently, reliable and efficient data misuse detection methods for such personal, spatio-temporal data, particularly in data breach cases, are missing. This article addresses an essential aspect of data misuse detection, namely, the re-identification of leaked and potentially modified GPS trajectories. We present RE-Trace-a contrastive learning-based model that facilitates reliable and efficient re-identification of GPS trajectories and resists specific trajectory transformation attacks aimed to obscure a trajectory's origin. RE-Trace utilizes contrastive learning with a transformer-based trajectory encoder to create trajectory representations, robust to various trajectory modifications. We present a comprehensive threat model for GPS trajectory modifications and demonstrate the effectiveness and efficiency of the RE-Trace re-identification approach on three real-world datasets. Our evaluation results demonstrate that RE-Trace significantly outperforms state-of-the-art baselines on all datasets and identifies modified GPS trajectories effectively and efficiently.
引用
收藏
页数:28
相关论文
共 50 条
  • [31] People Re-Identification in Service Robots
    Pinto, Vicente
    Bettencourt, Rui
    Ventura, Rodrigo
    2023 IEEE INTERNATIONAL CONFERENCE ON AUTONOMOUS ROBOT SYSTEMS AND COMPETITIONS, ICARSC, 2023, : 44 - 49
  • [32] Weakly Supervised Person Re-Identification
    Meng, Jingke
    Wu, Sheng
    Zheng, Wei-Shi
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 760 - 769
  • [33] Data Re-Identification: Prioritize Privacy
    Gutmann, Amy
    SCIENCE, 2013, 339 (6123) : 1032 - 1032
  • [34] Low illumination person re-identification
    Ma, Fei
    Zhu, Xiaoke
    Zhang, Xinyu
    Yang, Liang
    Zuo, Mei
    Jing, Xiao-Yuan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (01) : 337 - 362
  • [35] An Improved Method for Person Re-identification
    Jiang, Han
    Yang, Xinmei
    Li, Yaobin
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON GRAPHICS AND SIGNAL PROCESSING (ICGSP 2018), 2018, : 46 - 50
  • [36] A Super Baseline for Pedestrian Re-Identification
    Zhang, Jiwei
    Wu, Haiyuan
    2021 IEEE INTERNATIONAL CONFERENCE ON MECHATRONICS AND AUTOMATION (IEEE ICMA 2021), 2021, : 259 - 263
  • [37] Review of person re-identification techniques
    Saghafi, Mohammad Ali
    Hussain, Aini
    Zaman, Halimah Badioze
    Saad, Mohamad Hanif Md
    IET COMPUTER VISION, 2014, 8 (06) : 455 - 474
  • [38] Identity Adaptation for Person Re-Identification
    Ke, Qiuhong
    Bennamoun, Mohammed
    Rahmani, Hossein
    An, Senjian
    Sohel, Ferdous
    Boussaid, Farid
    IEEE ACCESS, 2018, 6 : 48147 - 48155
  • [39] Background Segmentation for Vehicle Re-identification
    Wu, Mingjie
    Zhang, Yongfei
    Zhang, Tianyu
    Zhang, Wenqi
    MULTIMEDIA MODELING (MMM 2020), PT II, 2020, 11962 : 88 - 99
  • [40] Unsupervised Tracklet Person Re-Identification
    Li, Minxian
    Zhu, Xiatian
    Gong, Shaogang
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2020, 42 (07) : 1770 - 1782