RE-Trace: Re-identification of Modified GPS Trajectories

被引:0
|
作者
Schestakov, Stefan [1 ]
Gottschalk, Simon [1 ]
Funke, Thorben [1 ]
Demidova, Elena [2 ]
机构
[1] Leibniz Univ Hannover, Res Ctr L3S, Hannover, Germany
[2] Univ Bonn, Data Sci & Intelligent Syst Grp DSIS, Lamarr Inst Machine Learning & Artificial Intellig, Bonn, Germany
关键词
GPS trajectories; data privacy; contrastive learning; spatio-temporal data; personal data;
D O I
10.1145/3643680
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
GPS trajectories are a critical asset for building spatio-temporal predictive models in urban regions in the context of road safety monitoring, traffic management, and mobility services. Currently, reliable and efficient data misuse detection methods for such personal, spatio-temporal data, particularly in data breach cases, are missing. This article addresses an essential aspect of data misuse detection, namely, the re-identification of leaked and potentially modified GPS trajectories. We present RE-Trace-a contrastive learning-based model that facilitates reliable and efficient re-identification of GPS trajectories and resists specific trajectory transformation attacks aimed to obscure a trajectory's origin. RE-Trace utilizes contrastive learning with a transformer-based trajectory encoder to create trajectory representations, robust to various trajectory modifications. We present a comprehensive threat model for GPS trajectory modifications and demonstrate the effectiveness and efficiency of the RE-Trace re-identification approach on three real-world datasets. Our evaluation results demonstrate that RE-Trace significantly outperforms state-of-the-art baselines on all datasets and identifies modified GPS trajectories effectively and efficiently.
引用
收藏
页数:28
相关论文
共 50 条
  • [41] Pose Transferrable Person Re-Identification
    Liu, Jinxian
    Ni, Bingbing
    Yan, Yichao
    Zhou, Peng
    Cheng, Shuo
    Hu, Jianguo
    2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 4099 - 4108
  • [42] Consistent Re-identification in a Camera Network
    Das, Abir
    Chakraborty, Anirban
    Roy-Chowdhury, Amit K.
    COMPUTER VISION - ECCV 2014, PT II, 2014, 8690 : 330 - 345
  • [43] Custom Pictorial Structures for Re-identification
    Cheng, Dong Seon
    Cristani, Marco
    Stoppa, Michele
    Bazzani, Loris
    Murino, Vittorio
    PROCEEDINGS OF THE BRITISH MACHINE VISION CONFERENCE 2011, 2011,
  • [44] Evaluating Features for Person Re-Identification
    Wang, Jiabao
    Li, Hang
    Li, Yang
    Xu, Yulong
    Miao, Zhuang
    2016 IEEE INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING (ICSIP), 2016, : 214 - 219
  • [45] Complementary networks for person re-identification
    Zhang, Guoqing
    Lin, Weisi
    Chandran, Arun Kumar
    Jing, Xuan
    INFORMATION SCIENCES, 2023, 633 : 70 - 84
  • [46] Re-identification of the anamorph of Leuconectria grandis
    Zhuang, Wen-Ying
    Luo, Jing
    MYCOTAXON, 2008, 106 : 409 - 412
  • [47] Data Re-Identification: Protect the Children
    Gurwitz, David
    SCIENCE, 2013, 339 (6123) : 1033 - 1033
  • [48] Trajectory Association for Person Re-identification
    Dongyang Li
    Ruimin Hu
    Wenxin Huang
    Dengshi Li
    Xiaochen Wang
    Chenhao Hu
    Neural Processing Letters, 2021, 53 : 3267 - 3285
  • [49] TAICHI DISTANCE FOR PERSON RE-IDENTIFICATION
    Wang, Zheng
    Hu, Ruimin
    Yu, Yi
    Liang, Chao
    Chen, Chen
    2017 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2017, : 2052 - 2056
  • [50] Re-identification methods for masked microdata
    Winkler, WE
    PRIVACY IN STATISTICAL DATABASES, PROCEEDINGS, 2004, 3050 : 216 - 230