Stefan Schestakov, Simon Gottschalk, Thorben Funke, Elena Demidova
{"title":"RE-Trace : 重新识别修改后的 GPS 轨迹","authors":"Stefan Schestakov, Simon Gottschalk, Thorben Funke, Elena Demidova","doi":"10.1145/3643680","DOIUrl":null,"url":null,"abstract":"\n GPS trajectories are a critical asset for building spatio-temporal predictive models in urban regions in the context of road safety monitoring, traffic management, and mobility services. Currently, reliable and efficient data misuse detection methods for such personal, spatio-temporal data, particularly in data breach cases, are missing. This article addresses an essential aspect of data misuse detection, namely the re-identification of leaked and potentially modified GPS trajectories. We present\n RE-Trace\n – a contrastive learning-based model that facilitates reliable and efficient re-identification of GPS trajectories and resists specific trajectory transformation attacks aimed to obscure a trajectory’s origin.\n RE-Trace\n utilizes contrastive learning with a transformer-based trajectory encoder to create trajectory representations, robust to various trajectory modifications. We present a comprehensive threat model for GPS trajectory modifications and demonstrate the effectiveness and efficiency of the\n RE-Trace\n re-identification approach on three real-world datasets. Our evaluation results demonstrate that\n RE-Trace\n significantly outperforms state-of-the-art baselines on all data sets and identifies modified GPS trajectories effectively and efficiently.\n","PeriodicalId":43641,"journal":{"name":"ACM Transactions on Spatial Algorithms and Systems","volume":null,"pages":null},"PeriodicalIF":1.2000,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"RE-Trace\\n : Re-Identification of Modified GPS Trajectories\",\"authors\":\"Stefan Schestakov, Simon Gottschalk, Thorben Funke, Elena Demidova\",\"doi\":\"10.1145/3643680\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n GPS trajectories are a critical asset for building spatio-temporal predictive models in urban regions in the context of road safety monitoring, traffic management, and mobility services. Currently, reliable and efficient data misuse detection methods for such personal, spatio-temporal data, particularly in data breach cases, are missing. This article addresses an essential aspect of data misuse detection, namely the re-identification of leaked and potentially modified GPS trajectories. We present\\n RE-Trace\\n – a contrastive learning-based model that facilitates reliable and efficient re-identification of GPS trajectories and resists specific trajectory transformation attacks aimed to obscure a trajectory’s origin.\\n RE-Trace\\n utilizes contrastive learning with a transformer-based trajectory encoder to create trajectory representations, robust to various trajectory modifications. We present a comprehensive threat model for GPS trajectory modifications and demonstrate the effectiveness and efficiency of the\\n RE-Trace\\n re-identification approach on three real-world datasets. Our evaluation results demonstrate that\\n RE-Trace\\n significantly outperforms state-of-the-art baselines on all data sets and identifies modified GPS trajectories effectively and efficiently.\\n\",\"PeriodicalId\":43641,\"journal\":{\"name\":\"ACM Transactions on Spatial Algorithms and Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2024-02-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Transactions on Spatial Algorithms and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3643680\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"REMOTE SENSING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Transactions on Spatial Algorithms and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3643680","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"REMOTE SENSING","Score":null,"Total":0}
RE-Trace
: Re-Identification of Modified GPS Trajectories
GPS trajectories are a critical asset for building spatio-temporal predictive models in urban regions in the context of road safety monitoring, traffic management, and mobility services. Currently, reliable and efficient data misuse detection methods for such personal, spatio-temporal data, particularly in data breach cases, are missing. This article addresses an essential aspect of data misuse detection, namely the re-identification of leaked and potentially modified GPS trajectories. We present
RE-Trace
– a contrastive learning-based model that facilitates reliable and efficient re-identification of GPS trajectories and resists specific trajectory transformation attacks aimed to obscure a trajectory’s origin.
RE-Trace
utilizes contrastive learning with a transformer-based trajectory encoder to create trajectory representations, robust to various trajectory modifications. We present a comprehensive threat model for GPS trajectory modifications and demonstrate the effectiveness and efficiency of the
RE-Trace
re-identification approach on three real-world datasets. Our evaluation results demonstrate that
RE-Trace
significantly outperforms state-of-the-art baselines on all data sets and identifies modified GPS trajectories effectively and efficiently.
期刊介绍:
ACM Transactions on Spatial Algorithms and Systems (TSAS) is a scholarly journal that publishes the highest quality papers on all aspects of spatial algorithms and systems and closely related disciplines. It has a multi-disciplinary perspective in that it spans a large number of areas where spatial data is manipulated or visualized (regardless of how it is specified - i.e., geometrically or textually) such as geography, geographic information systems (GIS), geospatial and spatiotemporal databases, spatial and metric indexing, location-based services, web-based spatial applications, geographic information retrieval (GIR), spatial reasoning and mining, security and privacy, as well as the related visual computing areas of computer graphics, computer vision, geometric modeling, and visualization where the spatial, geospatial, and spatiotemporal data is central.