{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T19:00:42Z","timestamp":1768071642981,"version":"3.49.0"},"reference-count":70,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T00:00:00Z","timestamp":1591660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Meas. Anal. Comput. Syst."],"published-print":{"date-parts":[[2020,6,9]]},"abstract":"<jats:p>While location data is extremely valuable for various applications, disclosing it prompts serious threats to individuals' privacy. To limit such concerns, organizations often provide analysts with aggregate time-series that indicate, e.g., how many people are in a location at a time interval, rather than raw individual traces. In this paper, we perform a measurement study to understand Membership Inference Attacks (MIAs) on aggregate location time-series, where an adversary tries to infer whether a specific user contributed to the aggregates. We find that the volume of contributed data, as well as the regularity and particularity of users' mobility patterns, play a crucial role in the attack's success. We experiment with a wide range of defenses based on generalization, hiding, and perturbation, and evaluate their ability to thwart the attack vis-\u00e0-vis the utility loss they introduce for various mobility analytics tasks. Our results show that some defenses fail across the board, while others work for specific tasks on aggregate location time-series. For instance, suppressing small counts can be used for ranking hotspots, data generalization for forecasting traffic, hotspot discovery, and map inference, while sampling is effective for location labeling and anomaly detection when the dataset is sparse. Differentially private techniques provide reasonable accuracy only in very specific settings, e.g., discovering hotspots and forecasting their traffic, and more so when using weaker privacy notions like crowd-blending privacy. Overall, our measurements show that there does not exist a unique generic defense that can preserve the utility of the analytics for arbitrary applications, and provide useful insights regarding the disclosure of sanitized aggregate location time-series.<\/jats:p>","DOI":"10.1145\/3392154","type":"journal-article","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T22:10:12Z","timestamp":1591740612000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Measuring Membership Privacy on Aggregate Location Time-Series"],"prefix":"10.1145","volume":"4","author":[{"given":"Apostolos","family":"Pyrgelis","sequence":"first","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"given":"Carmela","family":"Troncoso","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[{"name":"University College London &amp; Alan Turing Institute, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2020,6,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"John M Abowd. 2018. The US Census Bureau adopts differential privacy. In KDD .  John M Abowd. 2018. The US Census Bureau adopts differential privacy. In KDD .","DOI":"10.1145\/3219819.3226070"},{"key":"e_1_2_1_2_1","unstructured":"Gergely Acs and Claude Castelluccia. 2014. A case study: Privacy-preserving release of spatio-temporal density in Paris. In KDD.  Gergely Acs and Claude Castelluccia. 2014. A case study: Privacy-preserving release of spatio-temporal density in Paris. In KDD."},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Michael Backes Pascal Berrang Mathias Humbert and Praveen Manoharan. 2016. Membership privacy in MicroRNA-based studies. In CCS .  Michael Backes Pascal Berrang Mathias Humbert and Praveen Manoharan. 2016. Membership privacy in MicroRNA-based studies. In CCS .","DOI":"10.1145\/2976749.2978355"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Vincent Bindschaedler and Reza Shokri. 2016. Synthesizing plausible privacy-preserving location traces. In S&P .  Vincent Bindschaedler and Reza Shokri. 2016. Synthesizing plausible privacy-preserving location traces. In S&P .","DOI":"10.1109\/SP.2016.39"},{"key":"e_1_2_1_5_1","unstructured":"Spyros Boukoros Mathias Humbert Stefan Katzenbeisser and Carmela Troncoso. 2019. On (the Lack of) Location Privacy in Crowdsourcing Applications. In Usenix Security .  Spyros Boukoros Mathias Humbert Stefan Katzenbeisser and Carmela Troncoso. 2019. On (the Lack of) Location Privacy in Crowdsourcing Applications. In Usenix Security ."},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"N. Buscher S. Boukoros S. Bauregger and S. Katzenbeisser. 2017. Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering. In PoPETS.  N. Buscher S. Boukoros S. Bauregger and S. Katzenbeisser. 2017. Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering. In PoPETS.","DOI":"10.1515\/popets-2017-0045"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Xiang Cai Rishab Nithyanand Tao Wang Rob Johnson and Ian Goldberg. 2014. A systematic approach to developing and evaluating website fingerprinting defenses. In CCS .  Xiang Cai Rishab Nithyanand Tao Wang Rob Johnson and Ian Goldberg. 2014. A systematic approach to developing and evaluating website fingerprinting defenses. In CCS .","DOI":"10.1145\/2660267.2660362"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Luca Canzian and Mirco Musolesi. 2015. Trajectories of depression: unobtrusive monitoring of depressive states by means of smartphone mobility traces analysis. In Ubicomp .  Luca Canzian and Mirco Musolesi. 2015. Trajectories of depression: unobtrusive monitoring of depressive states by means of smartphone mobility traces analysis. In Ubicomp .","DOI":"10.1145\/2750858.2805845"},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Richard Chow and Philippe Golle. 2009. Faking Contextual Data for Fun Profit and Privacy. In WPES .  Richard Chow and Philippe Golle. 2009. Faking Contextual Data for Fun Profit and Privacy. In WPES .","DOI":"10.1145\/1655188.1655204"},{"key":"e_1_2_1_10_1","unstructured":"Consumer Financial Protection Bureau. 2017. Consumer Protection Principles: Consumer-Authorized Financial Data Sharing and Aggregation . https:\/\/files.consumerfinance.gov\/f\/documents\/cfpb_consumer-protection-principles_data-aggregation.pdf .  Consumer Financial Protection Bureau. 2017. Consumer Protection Principles: Consumer-Authorized Financial Data Sharing and Aggregation . https:\/\/files.consumerfinance.gov\/f\/documents\/cfpb_consumer-protection-principles_data-aggregation.pdf ."},{"key":"e_1_2_1_11_1","volume-title":"Unique in the Crowd: The privacy bounds of human mobility . SREP","author":"de Montjoye Yves-Alexandre","year":"2013","unstructured":"Yves-Alexandre de Montjoye , C\u00e9sar A Hidalgo , Michel Verleysen , and Vincent D Blondel . 2013. Unique in the Crowd: The privacy bounds of human mobility . SREP ( 2013 ). Yves-Alexandre de Montjoye, C\u00e9sar A Hidalgo, Michel Verleysen, and Vincent D Blondel. 2013. Unique in the Crowd: The privacy bounds of human mobility . SREP (2013)."},{"key":"e_1_2_1_12_1","unstructured":"Cynthia Dwork. 2008. Differential privacy: A survey of results. In TAMC.  Cynthia Dwork. 2008. Differential privacy: A survey of results. In TAMC."},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Moni Naor Toniann Pitassi and Guy N Rothblum. 2010. Differential privacy under continual observation. In STOC .  Cynthia Dwork Moni Naor Toniann Pitassi and Guy N Rothblum. 2010. Differential privacy under continual observation. In STOC .","DOI":"10.1145\/1806689.1806787"},{"key":"e_1_2_1_14_1","unstructured":"Energy Networks Association (ENA). 2017. Smart Meter Aggregation Assessment Final Report . https:\/\/bit.ly\/2LHqAg3 .  Energy Networks Association (ENA). 2017. Smart Meter Aggregation Assessment Final Report . https:\/\/bit.ly\/2LHqAg3 ."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Johannes Gehrke Michael Hay Edward Lui and Rafael Pass. 2012. Crowd-blending privacy. In CRYPTO .  Johannes Gehrke Michael Hay Edward Lui and Rafael Pass. 2012. Crowd-blending privacy. In CRYPTO .","DOI":"10.1007\/978-3-642-32009-5_28"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Johannes Gehrke Edward Lui and Rafael Pass. 2011. Towards privacy for social networks: A zero-knowledge based definition of privacy. In TCC .  Johannes Gehrke Edward Lui and Rafael Pass. 2011. Towards privacy for social networks: A zero-knowledge based definition of privacy. In TCC .","DOI":"10.1007\/978-3-642-19571-6_26"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Philippe Golle and Kurt Partridge. 2009. On the Anonymity of Home\/Work Location Pairs. In Pervasive Computing .  Philippe Golle and Kurt Partridge. 2009. On the Anonymity of Home\/Work Location Pairs. In Pervasive Computing .","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Marco Gruteser and Dirk Grunwald. 2003. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In MobiSys .  Marco Gruteser and Dirk Grunwald. 2003. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In MobiSys .","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Mehmet Emre Gursoy Ling Liu Stacey Truex Lei Yu and Wenqi Wei. 2018. Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces. In CCS .  Mehmet Emre Gursoy Ling Liu Stacey Truex Lei Yu and Wenqi Wei. 2018. Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces. In CCS .","DOI":"10.1145\/3243734.3243741"},{"key":"e_1_2_1_21_1","volume-title":"LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks. In PoPETS.","author":"Hayes Jamie","year":"2019","unstructured":"Jamie Hayes , Luca Melis , George Danezis , and Emiliano De Cristofaro . 2019 . LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks. In PoPETS. Jamie Hayes, Luca Melis, George Danezis, and Emiliano De Cristofaro. 2019. LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks. In PoPETS."},{"key":"e_1_2_1_22_1","volume-title":"DPT: differentially private trajectory synthesis using hierarchical reference systems. VLDB","author":"He Xi","year":"2015","unstructured":"Xi He , Graham Cormode , Ashwin Machanavajjhala , Cecilia M Procopiuc , and Divesh Srivastava . 2015. DPT: differentially private trajectory synthesis using hierarchical reference systems. VLDB ( 2015 ). Xi He, Graham Cormode, Ashwin Machanavajjhala, Cecilia M Procopiuc, and Divesh Srivastava. 2015. DPT: differentially private trajectory synthesis using hierarchical reference systems. VLDB (2015)."},{"key":"e_1_2_1_23_1","unstructured":"Minh X Hoang Yu Zheng and Ambuj K Singh. 2016. Forecasting Citywide Crowd Flows based on Big Data. In SIGSPATIAL .  Minh X Hoang Yu Zheng and Ambuj K Singh. 2016. Forecasting Citywide Crowd Flows based on Big Data. In SIGSPATIAL ."},{"key":"e_1_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Baik Hoh Marco Gruteser Hui Xiong and Ansaf Alrabady. 2007. Preserving privacy in GPS traces via uncertainty-aware path cloaking. In CCS .  Baik Hoh Marco Gruteser Hui Xiong and Ansaf Alrabady. 2007. Preserving privacy in GPS traces via uncertainty-aware path cloaking. In CCS .","DOI":"10.1145\/1315245.1315266"},{"key":"e_1_2_1_25_1","volume-title":"Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays . PLoS Genetics","author":"Homer Nils","year":"2008","unstructured":"Nils Homer , Szabolcs Szelinger , Margot Redman , David Duggan , Waibhav Tembe , Jill Muehling , John V Pearson , Dietrich A Stephan , Stanley F Nelson , and David W Craig . 2008. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays . PLoS Genetics ( 2008 ). Nils Homer, Szabolcs Szelinger, Margot Redman, David Duggan, Waibhav Tembe, Jill Muehling, John V Pearson, Dietrich A Stephan, Stanley F Nelson, and David W Craig. 2008. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays . PLoS Genetics (2008)."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00414-002-0321-z"},{"key":"e_1_2_1_27_1","unstructured":"Bargav Jayaraman and David Evans. 2019. Evaluating Differentially Private Machine Learning in Practice. In USENIX Security .  Bargav Jayaraman and David Evans. 2019. Evaluating Differentially Private Machine Learning in Practice. In USENIX Security ."},{"key":"e_1_2_1_28_1","volume-title":"Jing Selena He, and Raheem Beyah","author":"Ji Shouling","year":"2016","unstructured":"Shouling Ji , Weiqing Li , Mudhakar Srivatsa , Jing Selena He, and Raheem Beyah . 2016 . General graph data de-anonymization: From mobility traces to social networks. TISSEC ( 2016). Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah. 2016. General graph data de-anonymization: From mobility traces to social networks. TISSEC (2016)."},{"key":"e_1_2_1_29_1","volume-title":"Deep ROI-Based Modeling for Urban Human Mobility Prediction . IMWUT","author":"Jiang Renhe","year":"2018","unstructured":"Renhe Jiang , Xuan Song , Zipei Fan , Tianqi Xia , Quanjun Chen , Qi Chen , and Ryosuke Shibasaki . 2018. Deep ROI-Based Modeling for Urban Human Mobility Prediction . IMWUT ( 2018 ). Renhe Jiang, Xuan Song, Zipei Fan, Tianqi Xia, Quanjun Chen, Qi Chen, and Ryosuke Shibasaki. 2018. Deep ROI-Based Modeling for Urban Human Mobility Prediction . IMWUT (2018)."},{"key":"e_1_2_1_30_1","volume-title":"Principal Component Analysis","author":"Jolliffe Ian","unstructured":"Ian Jolliffe . 2002. Principal Component Analysis . Wiley & Sons . Ian Jolliffe. 2002. Principal Component Analysis .Wiley & Sons ."},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Dmytro Karamshuk Anastasios Noulas Salvatore Scellato Vincenzo Nicosia and Cecilia Mascolo. 2013. Geo-spotting: mining online location-based services for optimal retail store placement. In KDD .  Dmytro Karamshuk Anastasios Noulas Salvatore Scellato Vincenzo Nicosia and Cecilia Mascolo. 2013. Geo-spotting: mining online location-based services for optimal retail store placement. In KDD .","DOI":"10.1145\/2487575.2487616"},{"key":"e_1_2_1_32_1","volume-title":"The treatment of ties in ranking problems. Biometrika","author":"Kendall Maurice G","year":"1945","unstructured":"Maurice G Kendall . 1945. The treatment of ties in ranking problems. Biometrika ( 1945 ). Maurice G Kendall. 1945. The treatment of ties in ranking problems. Biometrika (1945)."},{"key":"e_1_2_1_33_1","unstructured":"John Krumm. 2007. Inference attacks on location tracks. In PerCom .  John Krumm. 2007. Inference attacks on location tracks. In PerCom ."},{"key":"e_1_2_1_34_1","unstructured":"Ninghui Li Wahbeh Qardaji and Dong Su. 2012. On Sampling Anonymization and Differential Privacy or K-anonymization Meets Differential Privacy. In ASIACCS .  Ninghui Li Wahbeh Qardaji and Dong Su. 2012. On Sampling Anonymization and Differential Privacy or K-anonymization Meets Differential Privacy. In ASIACCS ."},{"key":"e_1_2_1_35_1","unstructured":"Xuemei Liu James Biagioni Jakob Eriksson Yin Wang George Forman and Yanmin Zhu. 2012. Mining large-scale sparse GPS traces for map inference: comparison of approaches. In KDD .  Xuemei Liu James Biagioni Jakob Eriksson Yin Wang George Forman and Yanmin Zhu. 2012. Mining large-scale sparse GPS traces for map inference: comparison of approaches. In KDD ."},{"key":"e_1_2_1_36_1","volume-title":"Understanding membership inferences on well-generalized learning models. arXiv preprint arXiv:1802.04889","author":"Long Yunhui","year":"2018","unstructured":"Yunhui Long , Vincent Bindschaedler , Lei Wang , Diyue Bu , Xiaofeng Wang , Haixu Tang , Carl A Gunter , and Kai Chen . 2018. Understanding membership inferences on well-generalized learning models. arXiv preprint arXiv:1802.04889 ( 2018 ). Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A Gunter, and Kai Chen. 2018. Understanding membership inferences on well-generalized learning models. arXiv preprint arXiv:1802.04889 (2018)."},{"key":"e_1_2_1_37_1","volume-title":"Privacy: Theory meets practice on the map. In ICDE.","author":"Machanavajjhala Ashwin","year":"2008","unstructured":"Ashwin Machanavajjhala , Daniel Kifer , John Abowd , Johannes Gehrke , and Lars Vilhuber . 2008 . Privacy: Theory meets practice on the map. In ICDE. Ashwin Machanavajjhala, Daniel Kifer, John Abowd, Johannes Gehrke, and Lars Vilhuber. 2008. Privacy: Theory meets practice on the map. In ICDE."},{"key":"e_1_2_1_38_1","volume-title":"Emiliano De Cristofaro, and Vitaly Shmatikov","author":"Melis Luca","year":"2019","unstructured":"Luca Melis , Congzheng Song , Emiliano De Cristofaro, and Vitaly Shmatikov . 2019 . Inference Attacks Against Collaborative Learning. In S &P. Luca Melis, Congzheng Song, Emiliano De Cristofaro, and Vitaly Shmatikov. 2019. Inference Attacks Against Collaborative Learning. In S&P."},{"key":"e_1_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Joseph Meyerowitz and Romit Roy Choudhury. 2009. Hiding Stars with Fireworks: Location Privacy Through Camouflage. In MobiCom .  Joseph Meyerowitz and Romit Roy Choudhury. 2009. Hiding Stars with Fireworks: Location Privacy Through Camouflage. In MobiCom .","DOI":"10.1145\/1614320.1614358"},{"key":"e_1_2_1_40_1","volume-title":"Dp-where: Differentially private modeling of human mobility. In BigData .","author":"Mir Darakhshan J","year":"2013","unstructured":"Darakhshan J Mir , Sibren Isaacman , Ram\u00f3n C\u00e1ceres , Margaret Martonosi , and Rebecca N Wright . 2013 . Dp-where: Differentially private modeling of human mobility. In BigData . Darakhshan J Mir, Sibren Isaacman, Ram\u00f3n C\u00e1ceres, Margaret Martonosi, and Rebecca N Wright. 2013. Dp-where: Differentially private modeling of human mobility. In BigData ."},{"key":"e_1_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Milad Nasr Reza Shokri and Amir Houmansadr. 2018. Machine learning with membership privacy using adversarial regularization. In CCS .  Milad Nasr Reza Shokri and Amir Houmansadr. 2018. Machine learning with membership privacy using adversarial regularization. In CCS .","DOI":"10.1145\/3243734.3243855"},{"key":"e_1_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Bei Pan Yu Zheng David Wilkie and Cyrus Shahabi. 2013. Crowd sensing of traffic anomalies based on human mobility and social media. In SIGSPATIAL .  Bei Pan Yu Zheng David Wilkie and Cyrus Shahabi. 2013. Crowd sensing of traffic anomalies based on human mobility and social media. In SIGSPATIAL .","DOI":"10.1145\/2525314.2525343"},{"key":"e_1_2_1_43_1","unstructured":"Michal Piorkowski Natasa Sarafijanovic-Djukic and Matthias Grossglauser. 2009. CRAWDAD EPFL\/Mobility Dataset . http:\/\/crawdad.org\/epfl\/mobility\/20090224 .  Michal Piorkowski Natasa Sarafijanovic-Djukic and Matthias Grossglauser. 2009. CRAWDAD EPFL\/Mobility Dataset . http:\/\/crawdad.org\/epfl\/mobility\/20090224 ."},{"key":"e_1_2_1_44_1","volume-title":"Emiliano De Cristofaro, and Gordon J Ross","author":"Pyrgelis Apostolos","year":"2016","unstructured":"Apostolos Pyrgelis , Emiliano De Cristofaro, and Gordon J Ross . 2016 . Privacy-friendly mobility analytics using aggregate location data. In SIGSPATIAL . Apostolos Pyrgelis, Emiliano De Cristofaro, and Gordon J Ross. 2016. Privacy-friendly mobility analytics using aggregate location data. In SIGSPATIAL ."},{"key":"e_1_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Apostolos Pyrgelis Nicolas Kourtellis Ilias Leontiadis Joan Serr\u00e0 and Claudio Soriente. 2018. There goes Wally: Anonymously sharing your location gives you away. In Big Data .  Apostolos Pyrgelis Nicolas Kourtellis Ilias Leontiadis Joan Serr\u00e0 and Claudio Soriente. 2018. There goes Wally: Anonymously sharing your location gives you away. In Big Data .","DOI":"10.1109\/BigData.2018.8622184"},{"key":"e_1_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Apostolos Pyrgelis Carmela Troncoso and Emiliano De Cristofaro. 2017. What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy. In PoPETS.  Apostolos Pyrgelis Carmela Troncoso and Emiliano De Cristofaro. 2017. What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy. In PoPETS.","DOI":"10.1515\/popets-2017-0043"},{"key":"e_1_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Apostolos Pyrgelis Carmela Troncoso and Emiliano De Cristofaro. 2018. Knock Knock Who's There? Membership Inference on Aggregate Location Data. In NDSS .  Apostolos Pyrgelis Carmela Troncoso and Emiliano De Cristofaro. 2018. Knock Knock Who's There? Membership Inference on Aggregate Location Data. In NDSS .","DOI":"10.14722\/ndss.2018.23183"},{"key":"e_1_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Daniele Quercia Ilias Leontiadis Liam McNamara Cecilia Mascolo and Jon Crowcroft. 2011. SpotMe if you can: Randomized responses for location obfuscation on mobile phones. In ICDCS .  Daniele Quercia Ilias Leontiadis Liam McNamara Cecilia Mascolo and Jon Crowcroft. 2011. SpotMe if you can: Randomized responses for location obfuscation on mobile phones. In ICDCS .","DOI":"10.1109\/ICDCS.2011.79"},{"key":"e_1_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Vibhor Rastogi and Suman Nath. 2010. Differentially private aggregation of distributed time-series with transformation and encryption. In SIGMOD.  Vibhor Rastogi and Suman Nath. 2010. Differentially private aggregation of distributed time-series with transformation and encryption. In SIGMOD.","DOI":"10.1145\/1807167.1807247"},{"key":"e_1_2_1_50_1","volume-title":"Spatio-temporal techniques for user identification by means of GPS mobility data . EPJ Data Science","author":"Rossi Luca","year":"2015","unstructured":"Luca Rossi , James Walker , and Mirco Musolesi . 2015. Spatio-temporal techniques for user identification by means of GPS mobility data . EPJ Data Science ( 2015 ). Luca Rossi, James Walker, and Mirco Musolesi. 2015. Spatio-temporal techniques for user identification by means of GPS mobility data . EPJ Data Science (2015)."},{"key":"e_1_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Ahmed Salem Yang Zhang Mathias Humbert Mario Fritz and Michael Backes. 2019. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In NDSS .  Ahmed Salem Yang Zhang Mathias Humbert Mario Fritz and Michael Backes. 2019. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In NDSS .","DOI":"10.14722\/ndss.2019.23119"},{"key":"e_1_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Reza Shokri Marco Stronati Congzheng Song and Vitaly Shmatikov. 2017. Membership inference attacks against machine learning models. In S&P .  Reza Shokri Marco Stronati Congzheng Song and Vitaly Shmatikov. 2017. Membership inference attacks against machine learning models. In S&P .","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux and Jean-Yves Le Boudec. 2011a. Quantifying Location Privacy: The Case of Sporadic Location Exposure. In PoPETS .  Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux and Jean-Yves Le Boudec. 2011a. Quantifying Location Privacy: The Case of Sporadic Location Exposure. In PoPETS .","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_2_1_54_1","volume-title":"Jean-Yves Le Boudec, and Jean-Pierre Hubaux","author":"Shokri Reza","year":"2011","unstructured":"Reza Shokri , George Theodorakopoulos , Jean-Yves Le Boudec, and Jean-Pierre Hubaux . 2011 b. Quantifying location privacy. In S &P. Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, and Jean-Pierre Hubaux. 2011b. Quantifying location privacy. In S&P."},{"key":"e_1_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Reza Shokri Carmela Troncoso Claudia Diaz Julien Freudiger and Jean-Pierre Hubaux. 2010. Unraveling an old cloak: k-anonymity for location privacy. In WPES.  Reza Shokri Carmela Troncoso Claudia Diaz Julien Freudiger and Jean-Pierre Hubaux. 2010. Unraveling an old cloak: k-anonymity for location privacy. In WPES.","DOI":"10.1145\/1866919.1866936"},{"key":"e_1_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Mudhakar Srivatsa and Mike Hicks. 2012. Deanonymizing mobility traces: Using social network as a side-channel. In CCS .  Mudhakar Srivatsa and Mike Hicks. 2012. Deanonymizing mobility traces: Using social network as a side-channel. In CCS .","DOI":"10.1145\/2382196.2382262"},{"key":"e_1_2_1_57_1","unstructured":"Telefonica Smart Steps. 2019. https:\/\/www.business-solutions.telefonica.com\/en\/enterprise\/solutions\/smarter-selling\/big-data-insights\/.  Telefonica Smart Steps. 2019. https:\/\/www.business-solutions.telefonica.com\/en\/enterprise\/solutions\/smarter-selling\/big-data-insights\/."},{"key":"e_1_2_1_58_1","unstructured":"Hien To Kien Nguyen and Cyrus Shahabi. 2016. Differentially private publication of location entropy. In SIGSPATIAL.  Hien To Kien Nguyen and Cyrus Shahabi. 2016. Differentially private publication of location entropy. In SIGSPATIAL."},{"key":"e_1_2_1_59_1","volume-title":"Lei Yu, and Wenqi Wei.","author":"Truex Stacey","year":"2018","unstructured":"Stacey Truex , Ling Liu , Mehmet Emre Gursoy , Lei Yu, and Wenqi Wei. 2018 . Towards Demystifying Membership Inference Attacks . arXiv 1807.09173 (2018). Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu, and Wenqi Wei. 2018. Towards Demystifying Membership Inference Attacks . arXiv 1807.09173 (2018)."},{"key":"e_1_2_1_60_1","unstructured":"Uber Movement. 2019. https:\/\/movement.uber.com\/.  Uber Movement. 2019. https:\/\/movement.uber.com\/."},{"key":"e_1_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Giridhari Venkatadri Athanasios Andreou Yabing Liu Alan Mislove Krishna P Gummadi Patrick Loiseau and Oana Goga. 2018. Privacy Risks with Facebook's PII-based Targeting: Auditing a Data Broker's Advertising Interface. In S&P .  Giridhari Venkatadri Athanasios Andreou Yabing Liu Alan Mislove Krishna P Gummadi Patrick Loiseau and Oana Goga. 2018. Privacy Risks with Facebook's PII-based Targeting: Auditing a Data Broker's Advertising Interface. In S&P .","DOI":"10.1109\/SP.2018.00014"},{"key":"e_1_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Huandong Wang Chen Gao Yong Li Gang Wang Depeng Jin and Jingbo Sun. 2018. De-anonymization of mobility trajectories: Dissecting the gaps between theory and practice. In NDSS .  Huandong Wang Chen Gao Yong Li Gang Wang Depeng Jin and Jingbo Sun. 2018. De-anonymization of mobility trajectories: Dissecting the gaps between theory and practice. In NDSS .","DOI":"10.14722\/ndss.2018.23211"},{"key":"e_1_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Huandong Wang Chen Gao Yong Li Zhi-Li Zhang and Depeng Jin. 2017. From fingerprint to footprint: Revealing physical world privacy leakage by cyberspace cookie logs. In CIKM .  Huandong Wang Chen Gao Yong Li Zhi-Li Zhang and Depeng Jin. 2017. From fingerprint to footprint: Revealing physical world privacy leakage by cyberspace cookie logs. In CIKM .","DOI":"10.1145\/3132847.3132998"},{"key":"e_1_2_1_64_1","volume-title":"XiaoFeng Wang, Haixu Tang, and Xiaoyong Zhou.","author":"Wang Rui","year":"2009","unstructured":"Rui Wang , Yong Fuga Li , XiaoFeng Wang, Haixu Tang, and Xiaoyong Zhou. 2009 . Learning your identity and disease from research papers: information leaks in genome wide association study. In CCS . Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang, and Xiaoyong Zhou. 2009. Learning your identity and disease from research papers: information leaks in genome wide association study. In CCS ."},{"key":"e_1_2_1_65_1","unstructured":"Waze. 2019. https:\/\/www.waze.com .  Waze. 2019. https:\/\/www.waze.com ."},{"key":"e_1_2_1_66_1","unstructured":"Fengli Xu Zhen Tu Yong Li Pengyu Zhang Xiaoming Fu and Depeng Jin. 2017. Trajectory Recovery From Ash: User Privacy Is NOT Preserved in Aggregated Mobility Data. In WWW.  Fengli Xu Zhen Tu Yong Li Pengyu Zhang Xiaoming Fu and Depeng Jin. 2017. Trajectory Recovery From Ash: User Privacy Is NOT Preserved in Aggregated Mobility Data. In WWW."},{"key":"e_1_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Mao Ye Dong Shou Wang-Chien Lee Peifeng Yin and Krzysztof Janowicz. 2011. On the semantic annotation of places in location-based social networks. In KDD .  Mao Ye Dong Shou Wang-Chien Lee Peifeng Yin and Krzysztof Janowicz. 2011. On the semantic annotation of places in location-based social networks. In KDD .","DOI":"10.1145\/2020408.2020491"},{"key":"e_1_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Samuel Yeom Irene Giacomelli Matt Fredrikson and Somesh Jha. 2018. Privacy risk in machine learning: Analyzing the connection to overfitting. In CSF .  Samuel Yeom Irene Giacomelli Matt Fredrikson and Somesh Jha. 2018. Privacy risk in machine learning: Analyzing the connection to overfitting. In CSF .","DOI":"10.1109\/CSF.2018.00027"},{"key":"e_1_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Hui Zang and Jean Bolot. 2011. Anonymization of location data does not work: A large-scale measurement study. In MobiCom .  Hui Zang and Jean Bolot. 2011. Anonymization of location data does not work: A large-scale measurement study. In MobiCom .","DOI":"10.1145\/2030613.2030630"},{"key":"e_1_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Yu Zheng Lizhu Zhang Xing Xie and Wei-Ying Ma. 2009. Mining interesting locations and travel sequences from GPS trajectories. In WWW .  Yu Zheng Lizhu Zhang Xing Xie and Wei-Ying Ma. 2009. Mining interesting locations and travel sequences from GPS trajectories. In WWW .","DOI":"10.1145\/1526709.1526816"}],"container-title":["Proceedings of the ACM on Measurement and Analysis of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3392154","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3392154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:49Z","timestamp":1750199929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3392154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,9]]},"references-count":70,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6,9]]}},"alternative-id":["10.1145\/3392154"],"URL":"https:\/\/doi.org\/10.1145\/3392154","relation":{},"ISSN":["2476-1249"],"issn-type":[{"value":"2476-1249","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,9]]},"assertion":[{"value":"2020-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}