{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:50Z","timestamp":1772039510464,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T00:00:00Z","timestamp":1510012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,7]]},"DOI":"10.1145\/3144457.3144494","type":"proceedings-article","created":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T12:22:08Z","timestamp":1534854128000},"page":"48-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["AP-Attack"],"prefix":"10.1145","author":[{"given":"Mohamed","family":"Maouche","sequence":"first","affiliation":[{"name":"Universite de Lyon, CNRS, INSA Lyon, LIRIS, France"}]},{"given":"Sonia Ben","family":"Mokhtar","sequence":"additional","affiliation":[{"name":"Universite de Lyon, CNRS, INSA Lyon, LIRIS, France"}]},{"given":"Sara","family":"Bouchenak","sequence":"additional","affiliation":[{"name":"Universite de Lyon, CNRS, INSA Lyon, LIRIS, France"}]}],"member":"320","published-online":{"date-parts":[[2017,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.05.003"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11552338_13"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517842"},{"key":"e_1_3_2_1_6_1","volume-title":"Sonia Ben Mokhtar, and Vincent Primault","author":"Boutet Antoine","year":"2016","unstructured":"Antoine Boutet , Sonia Ben Mokhtar, and Vincent Primault . 2016 . Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets . (2016). Antoine Boutet, Sonia Ben Mokhtar, and Vincent Primault. 2016. Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets. (2016)."},{"key":"e_1_3_2_1_7_1","first-page":"300","article-title":"Comprehensive Survey on Distance \/ Similarity Measures between Probability Density Functions","volume":"1","year":"2007","unstructured":"Sung-hyuk Cha. 2007 . Comprehensive Survey on Distance \/ Similarity Measures between Probability Density Functions . International Journal of Mathematical Models and Methods in Applied Sciences 1 , 4 (2007), 300 -- 307 . Sung-hyuk Cha. 2007. Comprehensive Survey on Distance \/ Similarity Measures between Probability Density Functions. International Journal of Mathematical Models and Methods in Applied Sciences 1, 4 (2007), 300--307.","journal-title":"International Journal of Mathematical Models and Methods in Applied Sciences"},{"key":"e_1_3_2_1_8_1","unstructured":"Data team (UK's Cabinet Office). 2017. Open data in UK. (2017). https:\/\/data.gov.uk\/  Data team (UK's Cabinet Office). 2017. Open data in UK. (2017). https:\/\/data.gov.uk\/"},{"key":"e_1_3_2_1_9_1","volume-title":"Blondel","author":"de Montjoye Yves-Alexandre","year":"2013","unstructured":"Yves-Alexandre de Montjoye , C\u00e9sar A. Hidalgo , Michel Verleysen , and Vincent D . Blondel . 2013 . Unique in the Crowd : The privacy bounds of human mobility. Scientific reports 3 (2013), 1376. Yves-Alexandre de Montjoye, C\u00e9sar A. Hidalgo, Michel Verleysen, and Vincent D. Blondel. 2013. Unique in the Crowd: The privacy bounds of human mobility. Scientific reports 3 (2013), 1376."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_11_1","volume-title":"Differential Privacy: A Survey of Results","author":"Dwork Cynthia","year":"2008","unstructured":"Cynthia Dwork . 2008 . Differential Privacy: A Survey of Results . Springer Berlin Heidelberg , Berlin, Heidelberg , 1--19. Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. Springer Berlin Heidelberg, Berlin, Heidelberg, 1--19."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"M Farenzena L Bazzani A Perina V Murino and M Cristani. 2010. Person re-identification by symmetry-driven accumulation of local features. (2010) 2360--2367 pages.  M Farenzena L Bazzani A Perina V Murino and M Cristani. 2010. Person re-identification by symmetry-driven accumulation of local features. (2010) 2360--2367 pages.","DOI":"10.1109\/CVPR.2010.5539926"},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/www.swarmapp.com","year":"2017","unstructured":"Foursquare-Labs. 2017. Swarm. ( 2017 ). https:\/\/www.swarmapp.com Foursquare-Labs. 2017. Swarm. (2017). https:\/\/www.swarmapp.com"},{"key":"e_1_3_2_1_14_1","unstructured":"L. Franceschi-Bicchierai. 2015. Redditor cracks anonymous data trove to pinpoint muslim cab drivers. (2015). http:\/\/mashable.com\/  L. Franceschi-Bicchierai. 2015. Redditor cracks anonymous data trove to pinpoint muslim cab drivers. (2015). http:\/\/mashable.com\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.96"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2019316.2019320"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660367"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242623"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"e_1_3_2_1_21_1","unstructured":"Google. 2017. Google maps. (2017). https:\/\/maps.google.com  Google. 2017. Google maps. (2017). https:\/\/maps.google.com"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836111"},{"key":"e_1_3_2_1_23_1","volume-title":"Project Lachesis: Parsing and Modeling Location Histories. In Geographic Information Science: Third International Conference, GIScience","author":"Hariharan Ramaswamy","year":"2004","unstructured":"Ramaswamy Hariharan and Kentaro Toyama . 2004 . Project Lachesis: Parsing and Modeling Location Histories. In Geographic Information Science: Third International Conference, GIScience 2004, Adelphi, MD , USA, October 20-23, 2004. Proceedings, Max J Egenhofer, Christian Freksa, and Harvey J Miller (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 106--124. Ramaswamy Hariharan and Kentaro Toyama. 2004. Project Lachesis: Parsing and Modeling Location Histories. In Geographic Information Science: Third International Conference, GIScience 2004, Adelphi, MD, USA, October 20-23, 2004. Proceedings, Max J Egenhofer, Christian Freksa, and Harvey J Miller (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 106--124."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"B Henne C Kater M Smith and M Brenner. 2013. Selective cloaking: Need-to-know for location-based apps. (2013) 19--26 pages.  B Henne C Kater M Smith and M Brenner. 2013. Selective cloaking: Need-to-know for location-based apps. (2013) 19--26 pages.","DOI":"10.1109\/PST.2013.6596032"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03511-1_2"},{"key":"e_1_3_2_1_26_1","volume-title":"Pervasive","author":"Krumm John","year":"2007","unstructured":"John Krumm . 2007. Inference Attacks on Location Tracks. Pervasive Computing 10 , Pervasive ( 2007 ), 127--143. John Krumm. 2007. Inference Attacks on Location Tracks. Pervasive Computing 10, Pervasive (2007), 127--143."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493504"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"J K Laurila Daniel Gatica-Perez I Aad Blom J. Olivier Bornet Trinh-Minh-Tri Do O Dousse J Eberle and M Miettinen. 2012. The Mobile Data Challenge: Big Data for Mobile Computing Research. In Pervasive Computing.  J K Laurila Daniel Gatica-Perez I Aad Blom J. Olivier Bornet Trinh-Minh-Tri Do O Dousse J Eberle and M Miettinen. 2012. The Mobile Data Challenge: Big Data for Mobile Computing Research. In Pervasive Computing.","DOI":"10.1016\/j.pmcj.2013.10.001"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2208983"},{"key":"e_1_3_2_1_31_1","volume-title":"https:\/\/github.com\/mmaouche-insa\/SFERA\/","author":"Maouche Mohamed","year":"2017","unstructured":"Mohamed Maouche . 2017. SFERA. ( 2017 ). https:\/\/github.com\/mmaouche-insa\/SFERA\/ Mohamed Maouche. 2017. SFERA. (2017). https:\/\/github.com\/mmaouche-insa\/SFERA\/"},{"key":"e_1_3_2_1_32_1","volume-title":"An Empirical Study of Location Truncation on Android. Most'13","author":"Micinski Kristopher","year":"2013","unstructured":"Kristopher Micinski , Philip Phelps , and Jeffrey S Foster . 2013. An Empirical Study of Location Truncation on Android. Most'13 ( 2013 ). http:\/\/www.mostconf.org\/2013\/papers\/19.pdf Kristopher Micinski, Philip Phelps, and Jeffrey S Foster. 2013. An Empirical Study of Location Truncation on Android. Most'13 (2013). http:\/\/www.mostconf.org\/2013\/papers\/19.pdf"},{"key":"e_1_3_2_1_33_1","unstructured":"Microsoft. 2017. Bing maps. (2017). https:\/\/www.bing.com\/maps  Microsoft. 2017. Bing maps. (2017). https:\/\/www.bing.com\/maps"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2498131"},{"key":"e_1_3_2_1_35_1","volume-title":"Link prediction by deanonymization: How We Won the Kaggle Social Network Challenge. (2011)","author":"Narayanan A","year":"1825","unstructured":"A Narayanan , E Shi , and B I P Rubinstein . 2011. Link prediction by deanonymization: How We Won the Kaggle Social Network Challenge. (2011) , 1825 --1834 pages. A Narayanan, E Shi, and B I P Rubinstein. 2011. Link prediction by deanonymization: How We Won the Kaggle Social Network Challenge. (2011), 1825--1834 pages."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_37_1","unstructured":"Niantic. 2017. Pokemon Go. (2017). http:\/\/www.pokemongo.com  Niantic. 2017. Pokemon Go. (2017). http:\/\/www.pokemongo.com"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-016-0044-x"},{"key":"e_1_3_2_1_39_1","unstructured":"Michal Piorkowski Natasa Sarafijanovic-djukic and Matthias Grossglauser. 2009. CRAW- DAD data set epfl\/mobility (v. 2009--02-24). (2009). http:\/\/crawdad.cs.dartmouth.edu\/epfl\/mobility  Michal Piorkowski Natasa Sarafijanovic-djukic and Matthias Grossglauser. 2009. CRAW- DAD data set epfl\/mobility (v. 2009--02-24). (2009). http:\/\/crawdad.cs.dartmouth.edu\/epfl\/mobility"},{"key":"e_1_3_2_1_40_1","volume-title":"C\u00e9dric Lauradoux, and Lionel Brunie.","author":"Primault Vincent","year":"2014","unstructured":"Vincent Primault , Sonia Ben Mokhtar , C\u00e9dric Lauradoux, and Lionel Brunie. 2014 . Differentially Private Location Privacy in Practice. Most'14 October (2014). arXiv:1410.7744 Vincent Primault, Sonia Ben Mokhtar, C\u00e9dric Lauradoux, and Lionel Brunie. 2014. Differentially Private Location Privacy in Practice. Most'14 October (2014). arXiv:1410.7744"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.417"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2031331.2031334"},{"key":"e_1_3_2_1_46_1","unstructured":"U.S. General Services Administration. 2017. open data in USA. (2017). https:\/\/www.data.gov\/  U.S. General Services Administration. 2017. open data in USA. (2017). https:\/\/www.data.gov\/"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0633-z"},{"key":"e_1_3_2_1_48_1","volume-title":"GeoLife: A Collaborative Social Networking Service among User, location and trajectory","author":"Zheng Yu","year":"2010","unstructured":"Yu Zheng , Xing Xie , and Wei-Ying Ma. 2010. GeoLife: A Collaborative Social Networking Service among User, location and trajectory . IEEE Data(base) Engineering Bulletin ( 2010 ). Yu Zheng, Xing Xie, and Wei-Ying Ma. 2010. GeoLife: A Collaborative Social Networking Service among User, location and trajectory. IEEE Data(base) Engineering Bulletin (2010)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1032222.1032261"}],"event":{"name":"MobiQuitous 2017: Computing, Networking and Services","location":"Melbourne VIC Australia","acronym":"MobiQuitous 2017","sponsor":["EAI The European Alliance for Innovation","SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3144457.3144494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3144457.3144494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:22Z","timestamp":1750212682000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3144457.3144494"}},"subtitle":["A Novel User Re-identification Attack On Mobility Datasets"],"short-title":[],"issued":{"date-parts":[[2017,11,7]]},"references-count":49,"alternative-id":["10.1145\/3144457.3144494","10.1145\/3144457"],"URL":"https:\/\/doi.org\/10.1145\/3144457.3144494","relation":{},"subject":[],"published":{"date-parts":[[2017,11,7]]},"assertion":[{"value":"2017-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}