{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T19:05:10Z","timestamp":1769022310818,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T00:00:00Z","timestamp":1288656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,11,2]]},"DOI":"10.1145\/1868470.1868479","type":"proceedings-article","created":{"date-parts":[[2010,11,3]],"date-time":"2010-11-03T14:04:01Z","timestamp":1288793041000},"page":"34-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":95,"title":["Show me how you move and I will tell you who you are"],"prefix":"10.1145","author":[{"given":"S\u00e9bastien","family":"Gambs","sequence":"first","affiliation":[{"name":"Universit\u00e9 de Rennes, Rennes Cedex, France"}]},{"given":"Marc-Olivier","family":"Killijian","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Toulouse"}]},{"given":"Miguel N\u00fa\u00f1ez","family":"del Prado Cortez","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Toulouse"}]}],"member":"320","published-online":{"date-parts":[[2010,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2010.170"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024733.1024748"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1177170"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature06958"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"e_1_3_2_1_7_1","volume-title":"I know what you did last summer: risks of location data leakage in mobile and social computing,\" Department of Computing Faculty of Mathematics","author":"Jedrzejczyk L.","year":"2009","unstructured":"L. Jedrzejczyk , B. A. Price , A. K. Bandara , and B. Nuseibeh , \" I know what you did last summer: risks of location data leakage in mobile and social computing,\" Department of Computing Faculty of Mathematics , Computing and Technology The Open University , November 2009 . L. Jedrzejczyk, B. A. Price, A. K. Bandara, and B. Nuseibeh, \"I know what you did last summer: risks of location data leakage in mobile and social computing,\" Department of Computing Faculty of Mathematics, Computing and Technology The Open University, November 2009."},{"key":"e_1_3_2_1_8_1","first-page":"101","volume-title":"Learning significant locations and predicting user movement with GPS,\" in Proceedings of the 6th IEEE International Symposium on Wearable Computers","author":"Ashbrook D.","year":"2002","unstructured":"D. Ashbrook and T. Starner , \" Learning significant locations and predicting user movement with GPS,\" in Proceedings of the 6th IEEE International Symposium on Wearable Computers , 2002 , pp. 101 -- 109 . D. Ashbrook and T. Starner, \"Learning significant locations and predicting user movement with GPS,\" in Proceedings of the 6th IEEE International Symposium on Wearable Computers, 2002, pp. 101--109."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.69"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1032222.1032261"},{"key":"e_1_3_2_1_11_1","first-page":"773","volume-title":"Location-based activity recognition using relational Markov networks,\" in Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI)","author":"Liao L.","year":"2005","unstructured":"L. Liao , D. Fox , and H. Kautz , \" Location-based activity recognition using relational Markov networks,\" in Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI) , 2005 , pp. 773 -- 778 . L. Liao, D. Fox, and H. Kautz, \"Location-based activity recognition using relational Markov networks,\" in Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI), 2005, pp. 773--778."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1979.1102177"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1758156.1758167"},{"key":"e_1_3_2_1_14_1","volume-title":"Anonymity, unlinkability, unobservability, pseudonymity, and identity management -- a consolidated proposal for terminology","author":"Pfitzmann A.","year":"2008","unstructured":"A. Pfitzmann and M. Hansen , \" Anonymity, unlinkability, unobservability, pseudonymity, and identity management -- a consolidated proposal for terminology ,\" February 2008 . A. Pfitzmann and M. Hansen, \"Anonymity, unlinkability, unobservability, pseudonymity, and identity management -- a consolidated proposal for terminology,\" February 2008."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0258(19990315)18:5<497::AID-SIM45>3.0.CO;2-#"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2007.58"},{"key":"e_1_3_2_1_19_1","volume-title":"Data Mining and Privacy Geographic Knowledge Discovery","author":"Giannotti F.","year":"2008","unstructured":"F. Giannotti and D. Pedreschi , Mobility , Data Mining and Privacy Geographic Knowledge Discovery , 2008 . F. Giannotti and D. Pedreschi, Mobility, Data Mining and Privacy Geographic Knowledge Discovery, 2008."},{"issue":"4","key":"e_1_3_2_1_20_1","first-page":"47","article-title":"A spatiotemporal model of obfuscation strategies and counter strategies for location privacy","volume":"4197","author":"Matt D.","year":"2006","unstructured":"D. Matt , K. Lars , and B. Athol , \" A spatiotemporal model of obfuscation strategies and counter strategies for location privacy ,\" Lectures Notes in Computer Science , vol. 4197 , no. 4 , pp. 47 -- 64 , 2006 . D. Matt, K. Lars, and B. Athol, \"A spatiotemporal model of obfuscation strategies and counter strategies for location privacy,\" Lectures Notes in Computer Science, vol. 4197, no. 4, pp. 47--64, 2006.","journal-title":"Lectures Notes in Computer Science"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.008"},{"key":"e_1_3_2_1_22_1","first-page":"106","volume-title":"Project lachesis: Parsing and modeling location histories,\" Lecture notes in computer science - Geographic information science","author":"Hariharan R.","year":"2004","unstructured":"R. Hariharan and K. Toyama , \" Project lachesis: Parsing and modeling location histories,\" Lecture notes in computer science - Geographic information science , vol. 3 , pp. 106 -- 124 , October 2004 . R. Hariharan and K. Toyama, \"Project lachesis: Parsing and modeling location histories,\" Lecture notes in computer science - Geographic information science, vol. 3, pp. 106--124, October 2004."}],"event":{"name":"GIS '10: 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems","location":"San Jose California","acronym":"GIS '10","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information"]},"container-title":["Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868470.1868479","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1868470.1868479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:51Z","timestamp":1750246791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868470.1868479"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,2]]},"references-count":22,"alternative-id":["10.1145\/1868470.1868479","10.1145\/1868470"],"URL":"https:\/\/doi.org\/10.1145\/1868470.1868479","relation":{},"subject":[],"published":{"date-parts":[[2010,11,2]]},"assertion":[{"value":"2010-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}