{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T19:15:06Z","timestamp":1770491706448,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3564625.3564628","type":"proceedings-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T01:01:29Z","timestamp":1670029289000},"page":"279-292","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Reconstruction Attack on Differential Private Trajectory Protection Mechanisms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9962-5665","authenticated-orcid":false,"given":"Erik","family":"Buchholz","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of New South Wales, Australia and Cyber Security Cooperative Research Centre, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9695-7947","authenticated-orcid":false,"given":"Alsharif","family":"Abuadbba","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Australia and Cyber Security Cooperative Research Centre, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8938-2364","authenticated-orcid":false,"given":"Shuo","family":"Wang","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Australia and Cyber Security Cooperative Research Centre, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3289-6599","authenticated-orcid":false,"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Australia and Cyber Security Cooperative Research Centre, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1835-3475","authenticated-orcid":false,"given":"Salil Subhash","family":"Kanhere","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of New South Wales, Australia and Cyber Security Cooperative Research Centre, Australia"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Martin Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/  Martin Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.05.003"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2018.01.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2963312"},{"key":"e_1_3_2_1_6_1","volume-title":"Differentially Private Trajectory Data Publication. arXiv abs\/1112.2 (Dec","author":"Chen Rui","year":"2011","unstructured":"Rui Chen , Benjamin C.\u00a0M. Fung , and Bipin\u00a0 C. Desai . 2011. Differentially Private Trajectory Data Publication. arXiv abs\/1112.2 (Dec . 2011 ), 1\u201312. http:\/\/arxiv.org\/abs\/1112.2020 Rui Chen, Benjamin C.\u00a0M. Fung, and Bipin\u00a0C. Desai. 2011. Differentially Private Trajectory Data Publication. arXiv abs\/1112.2 (Dec. 2011), 1\u201312. http:\/\/arxiv.org\/abs\/1112.2020"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102736"},{"key":"e_1_3_2_1_8_1","unstructured":"Fran\u00e7ois Chollet 2015. Keras. https:\/\/keras.io  Fran\u00e7ois Chollet 2015. Keras. https:\/\/keras.io"},{"key":"e_1_3_2_1_9_1","unstructured":"OpenStreetMap Contributors. 2017. OpenStreetMap. https:\/\/www.openstreetmap.org\/  OpenStreetMap Contributors. 2017. OpenStreetMap. https:\/\/www.openstreetmap.org\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"e_1_3_2_1_11_1","unstructured":"Julien Deniau 2013. Haversine. https:\/\/github.com\/mapado\/haversine\/  Julien Deniau 2013. Haversine. https:\/\/github.com\/mapado\/haversine\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2014.2327053"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_17_1","unstructured":"Lorenzo Franceschi-Bicchierai. 2015. Redditor Cracks Anonymous Data Trove to Pinpoint Muslim Cab Drivers. https:\/\/mashable.com\/archive\/redditor-muslim-cab-drivers  Lorenzo Franceschi-Bicchierai. 2015. Redditor Cracks Anonymous Data Trove to Pinpoint Muslim Cab Drivers. https:\/\/mashable.com\/archive\/redditor-muslim-cab-drivers"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587319"},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2022. Google Maps. https:\/\/www.google.com\/maps  Google. 2022. Google Maps. https:\/\/www.google.com\/maps"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-2649-2"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218422"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484838.2484846"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117921"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1412.6980"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1503\/cmaj.200922"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11116-016-9719-1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.03.015"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00009"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115120"},{"key":"e_1_3_2_1_31_1","volume-title":"Locat. Priv. Secur. Workshop. github.io, 1\u20137.","author":"Liu Xi","year":"2018","unstructured":"Xi Liu , Hanzhou Chen , and Clio Andris . 2018 . trajGANs: Using Generative Adversarial Networks for Geo-Privacy Protection of Trajectory Data (Vision Paper) . In Locat. Priv. Secur. Workshop. github.io, 1\u20137. Xi Liu, Hanzhou Chen, and Clio Andris. 2018. trajGANs: Using Generative Adversarial Networks for Geo-Privacy Protection of Trajectory Data (Vision Paper). In Locat. Priv. Secur. Workshop. github.io, 1\u20137."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.19650\/j.cnki.cjsi.J1804413"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi10070454"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/13658816.2019.1707835"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2019316.2019319"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363449"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1503402.1503413"},{"key":"e_1_3_2_1_39_1","unstructured":"Niantic. 2022. Pokemon GO. https:\/\/pokemongolive.com\/  Niantic. 2022. Pokemon GO. https:\/\/pokemongolive.com\/"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3003997"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.6408044"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.3201\/eid2610.201315"},{"key":"e_1_3_2_1_44_1","first-page":"161","article-title":"La Cryptographie Militaire","volume":"9","author":"Petitcolas Fabien","year":"1883","unstructured":"Fabien Petitcolas . 1883 . La Cryptographie Militaire . J Sci Mil. 9 (1883), 161 \u2013 191 . Fabien Petitcolas. 1883. La Cryptographie Militaire. J Sci Mil. 9(1883), 161\u2013191.","journal-title":"J Sci Mil."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10729-021-09567-z"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.417"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873950"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2834-x"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.GIScience.2021.I.12"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.2307\/2309088"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2964658"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2972334"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICA52286.2021.9497903"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105524"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2877790"},{"key":"e_1_3_2_1_56_1","unstructured":"Waze Mobile. 2022. Waze. https:\/\/www.waze.com\/  Waze Mobile. 2022. Waze. https:\/\/www.waze.com\/"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.10.038"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.11.017"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869807"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526816"}],"event":{"name":"ACSAC: Annual Computer Security Applications Conference","location":"Austin TX USA","acronym":"ACSAC"},"container-title":["Proceedings of the 38th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3564628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564625.3564628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:11Z","timestamp":1750183751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3564628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":60,"alternative-id":["10.1145\/3564625.3564628","10.1145\/3564625"],"URL":"https:\/\/doi.org\/10.1145\/3564625.3564628","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}