{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:21:25Z","timestamp":1774945285750,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Australian Research Council","doi-asserted-by":"publisher","award":["FT210100624,DP240101108"],"award-info":[{"award-number":["FT210100624,DP240101108"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645410","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"3379-3387","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Physical Trajectory Inference Attack and Defense in Decentralized POI Recommendation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0848-2158","authenticated-orcid":false,"given":"Jing","family":"Long","sequence":"first","affiliation":[{"name":"The University of Queensland, Brisbane, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7269-146X","authenticated-orcid":false,"given":"Tong","family":"Chen","sequence":"additional","affiliation":[{"name":"The University of Queensland, Brisbane, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1683-1875","authenticated-orcid":false,"given":"Guanhua","family":"Ye","sequence":"additional","affiliation":[{"name":"Deep Neural Computing Company Limited, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0217-3998","authenticated-orcid":false,"given":"Kai","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9687-1315","authenticated-orcid":false,"given":"Quoc Viet Hung","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Griffith University, Gold Coast, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1395-261X","authenticated-orcid":false,"given":"Hongzhi","family":"Yin","sequence":"additional","affiliation":[{"name":"The University of Queensland, Brisbane, QLD, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2015.071829"},{"key":"e_1_3_2_2_2_1","volume-title":"Content-Aware Hierarchical Point-of-Interest Embedding Model for Successive POI Recommendation. In Twenty-Seventh International Joint Conference on Artificial Intelligence IJCAI-19","author":"Chang B.","unstructured":"B. Chang, Y. Park, D. Park, S. Kim, and J. Kang. 2018. Content-Aware Hierarchical Point-of-Interest Embedding Model for Successive POI Recommendation. In Twenty-Seventh International Joint Conference on Artificial Intelligence IJCAI-19."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00035"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00125"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401042"},{"key":"e_1_3_2_2_6_1","volume-title":"International Joint Conference on Artificial Intelligence.","author":"Cheng C.","unstructured":"C. Cheng, H. Yang, M. R. Lyu, and I. King. 2013. Where You Like to Go Next: Successive Point-of-Interest Recommendation.. In International Joint Conference on Artificial Intelligence."},{"key":"e_1_3_2_2_7_1","volume-title":"23rd USENIX security symposium (USENIX Security 14). 17--32.","author":"Fredrikson Matthew","unstructured":"Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. 2014. Privacy in pharmacogenetics: An $$End-to-End$$ case study of personalized warfarin dosing. In 23rd USENIX security symposium (USENIX Security 14). 17--32."},{"key":"e_1_3_2_2_8_1","volume-title":"Chris JM Yoon, and Ivan Beschastnikh","author":"Fung Clement","year":"2018","unstructured":"Clement Fung, Chris JM Yoon, and Ivan Beschastnikh. 2018. Mitigating sybils in federated learning poisoning. arXiv preprint arXiv:1808.04866 (2018)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108833"},{"key":"e_1_3_2_2_10_1","unstructured":"Xinyi Gao Wentao Zhang Tong Chen Junliang Yu Hung Quoc Viet Nguyen and Hongzhi Yin. 2023 b. Semantic-aware Node Synthesis for Imbalanced Heterogeneous Information Networks. arxiv: 2302.14061 [cs.LG]"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"A. Giantomassi F. Ferracuti S. Iarlori G. Ippoliti and S. Longhi. 2014. Electric Motor Fault Detection and Diagnosis by Kernel Density Estimation and Kullback-Leibler Divergence based on Stator Current Measurements. IEEE Transactions on Industrial Electronics (2014).","DOI":"10.1109\/TIE.2014.2370936"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494970"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"e_1_3_2_2_14_1","volume-title":"DeepMove: Predicting Human Mobility with Attentional Recurrent Networks. In the 2018 World Wide Web Conference.","author":"Jie F.","unstructured":"F. Jie, L. Yong, Z. Chao, F. Sun, and D. Jin. 2018. DeepMove: Predicting Human Mobility with Attentional Recurrent Networks. In the 2018 World Wide Web Conference."},{"key":"e_1_3_2_2_15_1","volume-title":"Next Point-of-Interest Recommendation with Temporal and Multi-level Context Attention. 2018 IEEE International Conference on Data Mining (ICDM)","author":"Li Ranzhen","year":"2018","unstructured":"Ranzhen Li, Yanyan Shen, and Yanmin Zhu. 2018. Next Point-of-Interest Recommendation with Temporal and Multi-level Context Attention. 2018 IEEE International Conference on Data Mining (ICDM) (2018), 1110--1115."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Yang Li Tong Chen Yadan Luo Hongzhi Yin and Zi Huang. 2021. Discovering collaborative signals for next POI recommendation with iterative Seq2Graph augmentation. In IJCAI. 1491--1497.","DOI":"10.24963\/ijcai.2021\/206"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"D. Lian C. Zhao X. Xie G. Sun E. Chen and Y. Rui. 2014. GeoMF: joint geographical modeling and matrix factorization for point-of-interest recommendation. ACM.","DOI":"10.1145\/2623330.2623638"},{"key":"e_1_3_2_2_18_1","volume-title":"Acm International Conference on Conference on Information & Knowledge Management.","author":"Liu X.","unstructured":"X. Liu, Y. Liu, K. Aberer, and C. Miao. 2013. Personalized point-of-interest recommendation by mining users' preference transition. In Acm International Conference on Conference on Information & Knowledge Management."},{"key":"e_1_3_2_2_19_1","volume-title":"Nq Viet Hung, and H. Yin","author":"Long J.","year":"2022","unstructured":"J. Long, T. Chen, Nq Viet Hung, and H. Yin. 2022. Decentralized Collaborative Learning Framework for Next POI Recommendation. TOIS (2022)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591733"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00023"},{"key":"e_1_3_2_2_22_1","volume-title":"STAN: Spatio-Temporal Attention Network for Next Location Recommendation.","author":"Luo Y.","year":"2021","unstructured":"Y. Luo, Q. Liu, and Z. Liu. 2021a. STAN: Spatio-Temporal Attention Network for Next Location Recommendation."},{"key":"e_1_3_2_2_23_1","volume-title":"Proc. Symp. Math. Statist. and Probability, 5th","volume":"1","author":"Macqueen J.","year":"1967","unstructured":"J. Macqueen. 1967. Some methods for classification and analysis of multivariate observations. Proc. Symp. Math. Statist. and Probability, 5th , Vol. 1 (1967)."},{"key":"e_1_3_2_2_24_1","volume-title":"On the privacy of decentralized machine learning. arXiv preprint arXiv:2205.08443","author":"Pasquini Dario","year":"2022","unstructured":"Dario Pasquini, Mathilde Raynal, and Carmela Troncoso. 2022. On the privacy of decentralized machine learning. arXiv preprint arXiv:2205.08443 (2022)."},{"key":"e_1_3_2_2_25_1","volume-title":"E M S Rochman, and B D Satoto","author":"Syakur M A","year":"2018","unstructured":"M A Syakur, B K Khotimah, E M S Rochman, and B D Satoto. 2018. Integration K-Means Clustering Method and Elbow Method For Identification of The Best Customer Profile Cluster. 012017--."},{"key":"e_1_3_2_2_26_1","volume-title":"ESORICS 2020, Guildford, UK, September 14--18, 2020, Proceedings, Part I 25","author":"Tolpegin Vale","year":"2020","unstructured":"Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, and Ling Liu. 2020. Data poisoning attacks against federated learning systems. In Computer Security--ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14--18, 2020, Proceedings, Part I 25. Springer, 480--501."},{"key":"e_1_3_2_2_27_1","volume-title":"Ephraim Zimmer, Tim Grube, Kristian Kersting, and Max M\u00fchlh\"auser.","author":"Wainakh Aidmar","year":"2021","unstructured":"Aidmar Wainakh, Fabrizio Ventola, Till M\u00fc\u00dfig, Jens Keim, Carlos Garcia Cordero, Ephraim Zimmer, Tim Grube, Kristian Kersting, and Max M\u00fchlh\"auser. 2021. User label leakage from gradients in federated learning. arXiv preprint arXiv:2105.09369 (2021)."},{"key":"e_1_3_2_2_28_1","volume-title":"Next Point-of-Interest Recommendation on Resource-Constrained Mobile Devices. In WWW '20: The Web Conference","author":"Wang Q.","year":"2020","unstructured":"Q. Wang, H. Yin, T. Chen, Z. Huang, and Nqv Hung. 2020. Next Point-of-Interest Recommendation on Resource-Constrained Mobile Devices. In WWW '20: The Web Conference 2020."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Qinyong Wang Hongzhi Yin Tong Chen Junliang Yu Alexander Zhou and Xiangliang Zhang. 2021. Fast-adapting and Privacy-preserving Federated Recommender System. (2021).","DOI":"10.1007\/s00778-021-00700-6"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"e_1_3_2_2_31_1","unstructured":"M. Weimer A. Karatzoglou Q. V. Le and A. J. Smola. 2007. CoFiRank - Maximum Margin Matrix Factorization for Collaborative Ranking. In Neural Information Processing Systems."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3012952"},{"key":"e_1_3_2_2_33_1","unstructured":"Cong Xie Oluwasanmi Koyejo and Indranil Gupta. 2020. Fall of empires: Breaking byzantine-tolerant sgd by inner product manipulation. In Uncertainty in Artificial Intelligence. PMLR 261--270."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Dingqi Yang Bingqing Qu Jie Yang and Philippe Cudre-Mauroux. 2019. Revisiting user mobility and social relationships in lbsns: a hypergraph embedding approach. In The world wide web conference. 2147--2157.","DOI":"10.1145\/3308558.3313635"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531983"},{"key":"e_1_3_2_2_36_1","volume-title":"Spatio-temporal recommendation in social media","author":"Yin Hongzhi","unstructured":"Hongzhi Yin and Bin Cui. 2016. Spatio-temporal recommendation in social media. Springer."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806339"},{"key":"e_1_3_2_2_38_1","unstructured":"Hongzhi Yin Liang Qu Tong Chen Wei Yuan Ruiqi Zheng Jing Long Xin Xia Yuhui Shi and Chengqi Zhang. 2024. On-Device Recommender Systems: A Comprehensive Survey. arxiv: 2401.11441 [cs.IR]"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487608"},{"key":"e_1_3_2_2_40_1","volume-title":"Lizhen Cui, Tieke He, and Hongzhi Yin. 2023 a. Interaction-level membership inference attack against federated recommender systems. arXiv preprint arXiv:2301.10964","author":"Yuan Wei","year":"2023","unstructured":"Wei Yuan, Chaoqun Yang, Quoc Viet Hung Nguyen, Lizhen Cui, Tieke He, and Hongzhi Yin. 2023 a. Interaction-level membership inference attack against federated recommender systems. arXiv preprint arXiv:2301.10964 (2023)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570463"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449813"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3295601"},{"key":"e_1_3_2_2_44_1","volume-title":"Go Next: A Spatio-Temporal Gated Network for Next POI Recommendation. 5877--5884.","author":"Zhao P.","year":"2019","unstructured":"P. Zhao, H. Zhu, Y. Liu, J. Xu, and X. Zhou. 2019. Where to Go Next: A Spatio-Temporal Gated Network for Next POI Recommendation. 5877--5884."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498297"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645410","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:24:53Z","timestamp":1755822293000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":45,"alternative-id":["10.1145\/3589334.3645410","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645410","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}