{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T07:58:09Z","timestamp":1772006289348,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsac67867.2025.00099","type":"proceedings-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T20:54:58Z","timestamp":1771966498000},"page":"1272-1287","source":"Crossref","is-referenced-by-count":0,"title":["Big Broker is Tracking You! A Privacy Assessment of Large-Scale Location Trace Datasets"],"prefix":"10.1109","author":[{"given":"Kevin De","family":"Boeck","sequence":"first","affiliation":[{"name":"DistriNet, KU Leuven,Ghent,Belgium,9000"}]},{"given":"Jenno","family":"Verdonck","sequence":"additional","affiliation":[{"name":"DistriNet, KU Leuven,Ghent,Belgium,9000"}]},{"given":"Michiel","family":"Willocx","sequence":"additional","affiliation":[{"name":"DistriNet, KU Leuven,Ghent,Belgium,9000"}]},{"given":"Vincent","family":"Naessens","sequence":"additional","affiliation":[{"name":"DistriNet, KU Leuven,Ghent,Belgium,9000"}]}],"member":"263","reference":[{"key":"ref1","first-page":"01","article-title":"Location (data) is everything for retailers opening stores","author":"Wall","year":"2024","journal-title":"The Wall Street Journal"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/app9102054"},{"key":"ref3","first-page":"8121034","article-title":"Anonymous","volume":"21","year":"2021","journal-title":"Mobile phone gps data and prevalence of covid-19 infections"},{"key":"ref4","first-page":"01","article-title":"The Markup","year":"2021","journal-title":"There\u2019s a multibillion-dollar market for your phone\u2019s location data"},{"key":"ref5","first-page":"2025","article-title":"Candy crush, tinder, myfitnesspal:See the thousands of apps hijacked to spy on your location","author":"Greenberg","year":"2025","journal-title":"WIRED"},{"key":"ref6","first-page":"2025","volume-title":"Location tracking company Unacast tells Norway its data was hacked, broadcaster says","year":"2025"},{"key":"ref7","first-page":"2025","author":"Data","year":"2023","journal-title":"Edpb provides clarity on tracking techniques covered by the eprivacy directive"},{"key":"ref8","first-page":"2025","author":"Smalley","year":"2024","journal-title":"Fcc fines carriers 196 million for selling customer location data"},{"key":"ref9","first-page":"01","article-title":"Associated Press","year":"2025","journal-title":"Ftc bans gm from sharing driving data to settle claims that the automaker sold data without consent"},{"key":"ref10","first-page":"01","article-title":"Apple Inc","year":"2021","journal-title":"Data privacy day at apple: Improving transparency and empowering users"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1006155107"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133972"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020575"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465301"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3274895.3274908"},{"key":"ref18","first-page":"497","article-title":"Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide?","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Hassan"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560616"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3538974"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517842"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.04.024"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3144457.3144494"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2006.01.013"},{"key":"ref26","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","volume":"96","author":"Ester","year":"1996","journal-title":"kdd"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3486637.3489487"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1201.0490"},{"issue":"2","key":"ref29","first-page":"159","article-title":"Virtues of the haversine","volume":"68","author":"Sinnott","year":"1984","journal-title":"Sky and Telescope"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0140589"},{"key":"ref31","article-title":"OpenStreetMap contributors","volume-title":"Planet dump retrieved from","year":"2024"},{"key":"ref32","article-title":"Apple Inc","volume-title":"A Day in the Life of Your Data","year":"2021"},{"key":"ref33","article-title":"Google Inc","volume-title":"Android Security Paper 2023","year":"2023"},{"key":"ref34","article-title":"US Federal rade Commission","volume-title":"FTC Finalizes Order Prohibiting Gravy Analytics, Venntel from Selling Sensitive Location Data","year":"2025"},{"key":"ref35","article-title":"European Commission","volume-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"2016"},{"key":"ref36","first-page":"603","article-title":"50 ways to leak your data: An exploration of apps\u2019 circumvention of the android permissions system","volume-title":"28th USENIX security symposium (USENIX security 19)","author":"Reardon"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW59978.2023.00051"}],"event":{"name":"2025 IEEE Annual Computer Security Applications Conference (ACSAC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["2025 IEEE Annual Computer Security Applications Conference (ACSAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11391636\/11391706\/11392034.pdf?arnumber=11392034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T07:01:16Z","timestamp":1772002876000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11392034\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/acsac67867.2025.00099","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}