Generative adversarial networks for spatio-temporal data: A survey
Generative Adversarial Networks (GANs) have shown remarkable success in producing
realistic-looking images in the computer vision area. Recently, GAN-based techniques are …
realistic-looking images in the computer vision area. Recently, GAN-based techniques are …
Deep learning for trajectory data management and mining: A survey and beyond
Trajectory computing is a pivotal domain encompassing trajectory data management and
mining, garnering widespread attention due to its crucial role in various practical …
mining, garnering widespread attention due to its crucial role in various practical …
[HTML][HTML] A survey on deep learning based Point-of-Interest (POI) recommendations
Abstract Location-based Social Networks (LBSNs) enable users to socialize with friends and
acquaintances by sharing their check-ins, opinions, photos, and reviews. A huge volume of …
acquaintances by sharing their check-ins, opinions, photos, and reviews. A huge volume of …
Mutual distillation learning network for trajectory-user linking
Trajectory-User Linking (TUL), which links trajectories to users who generate them, has
been a challenging problem due to the sparsity in check-in mobility data. Existing methods …
been a challenging problem due to the sparsity in check-in mobility data. Existing methods …
Adversarial human trajectory learning for trip recommendation
The problem of trip recommendation has been extensively studied in recent years, by both
researchers and practitioners. However, one of its key aspects—understanding human …
researchers and practitioners. However, one of its key aspects—understanding human …
[HTML][HTML] User re-identification via human mobility trajectories with siamese transformer networks
B Wang, M Zhang, P Ding, T Yang, Y Jin, Y Xu - Applied Intelligence, 2024 - Springer
People are keen to share their geospatial locations to access social activities or services via
mobile internet, which provides a new perspective for us to understand human mobility …
mobile internet, which provides a new perspective for us to understand human mobility …
Defense against machine learning based attacks in multi-UAV networks: A network coding based approach
Thanks to the agility and mobility features, unmanned aerial vehicles (UAVs) have been
applied for a wide range of civil and military missions. To remotely control and monitor …
applied for a wide range of civil and military missions. To remotely control and monitor …
Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation
Trajectories, a specific type of mobility data, can be used for many useful data mining tasks.
However, these trajectories also raises important privacy concerns due to their strong …
However, these trajectories also raises important privacy concerns due to their strong …
Trajectory-user linking is easier than you think
A Najjar, K Mede - 2022 IEEE International Conference on Big …, 2022 - ieeexplore.ieee.org
Trajectory-User Linking (TUL) is a relatively new mobility classification task in which
anonymous trajectories are linked to the users who generated them. With applications …
anonymous trajectories are linked to the users who generated them. With applications …
Semi-supervised trajectory classification using convolutional auto-encoders
Massive volumes of high-frequency and high-volume data are constantly being generated
by the vast amount of available tracking sensors of moving objects. This phenomenon can …
by the vast amount of available tracking sensors of moving objects. This phenomenon can …