Generative adversarial networks for spatio-temporal data: A survey

N Gao, H Xue, W Shao, S Zhao, KK Qin… - ACM Transactions on …, 2022 - dl.acm.org
Generative Adversarial Networks (GANs) have shown remarkable success in producing
realistic-looking images in the computer vision area. Recently, GAN-based techniques are …

Deep learning for trajectory data management and mining: A survey and beyond

W Chen, Y Liang, Y Zhu, Y Chang, K Luo… - arXiv preprint arXiv …, 2024 - arxiv.org
Trajectory computing is a pivotal domain encompassing trajectory data management and
mining, garnering widespread attention due to its crucial role in various practical …

[HTML][HTML] A survey on deep learning based Point-of-Interest (POI) recommendations

MA Islam, MM Mohammad, SSS Das, ME Ali - Neurocomputing, 2022 - Elsevier
Abstract Location-based Social Networks (LBSNs) enable users to socialize with friends and
acquaintances by sharing their check-ins, opinions, photos, and reviews. A huge volume of …

Mutual distillation learning network for trajectory-user linking

W Chen, S Li, C Huang, Y Yu, Y Jiang… - arXiv preprint arXiv …, 2022 - arxiv.org
Trajectory-User Linking (TUL), which links trajectories to users who generate them, has
been a challenging problem due to the sparsity in check-in mobility data. Existing methods …

Adversarial human trajectory learning for trip recommendation

Q Gao, F Zhou, K Zhang, F Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The problem of trip recommendation has been extensively studied in recent years, by both
researchers and practitioners. However, one of its key aspects—understanding human …

[HTML][HTML] User re-identification via human mobility trajectories with siamese transformer networks

B Wang, M Zhang, P Ding, T Yang, Y Jin, Y Xu - Applied Intelligence, 2024 - Springer
People are keen to share their geospatial locations to access social activities or services via
mobile internet, which provides a new perspective for us to understand human mobility …

Defense against machine learning based attacks in multi-UAV networks: A network coding based approach

YJ Chen, XC Chen, M Pan - IEEE Transactions on Network …, 2022 - ieeexplore.ieee.org
Thanks to the agility and mobility features, unmanned aerial vehicles (UAVs) have been
applied for a wide range of civil and military missions. To remotely control and monitor …

Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation

Y Korichi, J Desharnais, S Gambs, N Tawbi - European Symposium on …, 2024 - Springer
Trajectories, a specific type of mobility data, can be used for many useful data mining tasks.
However, these trajectories also raises important privacy concerns due to their strong …

Trajectory-user linking is easier than you think

A Najjar, K Mede - 2022 IEEE International Conference on Big …, 2022 - ieeexplore.ieee.org
Trajectory-User Linking (TUL) is a relatively new mobility classification task in which
anonymous trajectories are linked to the users who generated them. With applications …

Semi-supervised trajectory classification using convolutional auto-encoders

A Makris, I Kontopoulos, E Psomakelis… - Proceedings of the 1st …, 2021 - dl.acm.org
Massive volumes of high-frequency and high-volume data are constantly being generated
by the vast amount of available tracking sensors of moving objects. This phenomenon can …