Computer Science ›› 2022, Vol. 49 ›› Issue (3): 308-312.doi: 10.11896/jsjkx.210300231

• Information Security • Previous Articles     Next Articles

User Trajectory Identification Model via Attention Mechanism

LI Hao, CAO Shu-yu, CHEN Ya-qing, ZHANG Min   

  1. Department of TCA,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China
  • Received:2021-03-24 Revised:2021-06-07 Online:2022-03-15 Published:2022-03-15
  • About author:LI Hao,born in 1983,Ph.D,associate professor,master’s supervisor,is a member of China Computer Federation and Youth Innovation Promotion Association.His main research interests include data privacy and access control.
  • Supported by:
    National Key R & D Program of China(2018YFC0809300) and Youth Innovation Promotion Association CAS(2019113).

Abstract: Recently the application of location-based services has gradually become popular.It provides convenience in people’s daily life,and also brings a great threat to personal privacy.The existing research shows that,with a large amount of historical trajectory data,attackers can identify the user who generates the trajectory from the anonymous trajectory dataset.In these rela-ted studies,both data sparsity and poor data quality are faced.Data sparsity refers to the fact that trajectories are often distributed only in a few local areas,and there is no large corpus contrast to the natural language processing field.The poor data quality refers to the low sampling rate and existing noise of the location points in a trajectory.To address these two problems,this paper proposes a user trajectory identification model based on attention mechanism,including the location embedding module,the attention-based transitional feature encoder and trajectory-user identification module.The location embedding module is used to embed the spatial relation of the trajectory points into the location vector;the attention-based transitional feature encoder is used to extract the sequential dependencies from a single trajectory;and the trajectory-user identification module is used to predict the user identity of the trajectory based on the outputs of the transitional feature encoder.Finally,the experimental verification is carried out on Gowalla and Geolife datasets.The experimental results show that the proposed model in this paper can effectively alleviate the problem of data sparsity and poor data quality,and can achieve better accuracy than existing methods.

Key words: Attention mechanism, Deep learning, Recurrent neural network, Trajectory privacy, Trajectory-user identification

CLC Number: 

  • TP309
[1]FENG D G.Big data security and privacy preservation[M].Tsinghua University Press,2018.
[2]ZANG H,BOLOT J.Anonymization of location data does notwork:A large-scale measurement study[C]//Proceedings of the 17th Annual International Conference on Mobile Computing and Networking.New York:ACM,2011:145-156.
[3]FREUDIGER J,SHOKRI R,HUBAUX J P.Evaluating the privacy risk of location-based services[C]//Proceedings of the 2011 International Conference on Financial Cryptography and Data Security.Berlin:Springer,2011:31-46.
[4]LUO X,GAO Q,ZHOU F,et al.Identifying Human Mobilityvia Trajectory Embeddings[C]//IJCAI.2017:1689-1695.
[5]WANG G,LIAO D,LI J.Complete User Mobility via User and Trajectory Embeddings[J].IEEE Access,2018,6:72125-72136.
[6]ZHOU F,GAO Q,TRAJCEVSKI G,et al.Trajectory-UserLinking via Variational AutoEncoder[C]//IJCAI.2018:3212-3218.
[7]YI B K,JAGADISH H V,FALOUTSOS C.Efficient Retrieval of Similar Time Sequences under Time Warping[C]//Fourteenth International Conference on Data Engineering.IEEE Computer Society,1998.
[8]CHEN L,NG R.On the Marriage of Edit Distance and LpNorms[C]//Very Large Data Bases.2004.
[9]WANG R,ZHANG M,FENG D,et al.A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal In-fluences[C]//Proceedings of the 2015 International Conference on Information and Communications Security.Cham:Springer,2015:478-484.
[10]CHEN Z,FU Y,ZHANG M,et al.The De-anonymizationMethod Based on User Spatio-Temporal Mobility Trace[C]//Proceedings of the 2017 International Conference on Information and Communications Security.Cham:Springer,2017:459-471.
[11]QUAN B,YANG B C,HU K Q,et al.Prediction Model of Ship Trajectory Based on LSTM[J].Computer Science,2018,45(z2):126-131.
[12]MIKOLOV T,CHEN K,CORRADO G,et al.Efficient Estimation of Word Representations in Vector Space[C]//Internatio-nal Conference on Learning Representations:Workshops Track.Computer Science,2013.
[13]GowallaData[EB/OL].[2020-01-29].http://snap.stanford.edu/data/loc-gowalla.html.
[14]GeoLifeData[EB/OL].[2020-01-29].http://research.microsoft.com/enus/downloads/b16d359d-d164-469e-9fd4-daa38f2b2e13/default.asp.
[15]LIU Q,WU S,WANG L,et al.Predicting the Next Location:A Recurrent Model with Spatial and Temporal Contexts[C]//Thirtieth AAAI Conference on Artificial Intelligence.AAAI Press,2016.
[16]DAS G,GUNOPULOS D,MANNILA H.Finding Similar Time Series[C]//Proceedings of the First European Symposium on Principles of Data Mining and Knowledge Discovery.1997:88-100.
[17]CORTES C,VAPNIK V.Support-Vector Networks[J].Ma-chine Learning,1995,20(3):273-297.
[1] RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207.
[2] TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305.
[3] ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63.
[4] DAI Yu, XU Lin-feng. Cross-image Text Reading Method Based on Text Line Matching [J]. Computer Science, 2022, 49(9): 139-145.
[5] ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161.
[6] XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171.
[7] XIONG Li-qin, CAO Lei, LAI Jun, CHEN Xi-liang. Overview of Multi-agent Deep Reinforcement Learning Based on Value Factorization [J]. Computer Science, 2022, 49(9): 172-182.
[8] WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293.
[9] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[10] JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335.
[11] ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119.
[12] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[13] YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236.
[14] WANG Ming, PENG Jian, HUANG Fei-hu. Multi-time Scale Spatial-Temporal Graph Neural Network for Traffic Flow Prediction [J]. Computer Science, 2022, 49(8): 40-48.
[15] HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!