Issue |
Security and Safety
Volume 4, 2025
Security and Safety of Data in Cloud Computing
|
|
---|---|---|
Article Number | 2024018 | |
Number of page(s) | 18 | |
Section | Software Engineering | |
DOI | https://doi.org/10.1051/sands/2024018 | |
Published online | 30 January 2025 |
Research Article
Trajectory-user linking via supervised encoding
1
Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing, 100190, China
2
CISPA Helmholtz Center for Information Security, Saarbrücken, 66123, Germany
* Corresponding author (email: lihao@iscas.ac.cn)
Received:
23
July
2024
Revised:
21
October
2024
Accepted:
24
October
2024
With the explosive growth of Location-Based Services (LBS), a substantial amount of geolocation data, containing end-user private information, is amassed, posing severe privacy risks. Trajectory-User Linking (TUL) is a trajectory mining task aimed at linking trajectories to their generators. Recent research has introduced deep learning-based TUL models. However, these models face challenges related to limited data quality and inadequate extraction of bidirectional and multi-topic semantic information from trajectories. In this study, we propose Trajectory-User Linking via Supervised Encoding (TULSE), centered on supervised encoding of location points and trajectories to address the TUL task. Specifically, TULSE extracts spatial and temporal information from location points through a novel method named Supervised Spatiotemporal Encoding. Additionally, TULSE employs a BiLSTM with multi-head attention to capture bidirectional and multi-topic semantics from trajectories. Furthermore, recognizing the limitations of current evaluation metrics, we introduce a novel metric named Hierarchical Privacy Loss (HPL). HPL offers a more detailed assessment of TUL solutions by statistically analyzing the distribution of prediction accuracy among users. We conduct extensive experiments on two benchmark datasets, and empirical results show that TULSE outperforms existing TUL methods.
Key words: Trajectory-user linking / Deep learning / Location embedding / Attention mechanism / Privacy risk measurement
Citation: Hu C, Li Z and Wu S et al. Trajectory-user linking via supervised encoding. Security and Safety 2025; 4: 2024018. https://doi.org/10.1051/sands/2024018
© The Author(s) 2025. Published by EDP Sciences and China Science Publishing & Media Ltd.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.