{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:27:37Z","timestamp":1766068057636,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100007185","name":"University of California, Los Angeles","doi-asserted-by":"publisher","award":["ITLP"],"award-info":[{"award-number":["ITLP"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100007185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1951890, 1952096, 2003874, 2047822, 2317184, 2325369, 2411151, 2411152, 241115"],"award-info":[{"award-number":["1951890, 1952096, 2003874, 2047822, 2317184, 2325369, 2411151, 2411152, 241115"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100004399","name":"Okawa Foundation for Information and Telecommunications","doi-asserted-by":"publisher","id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100004399","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,25]]},"DOI":"10.1145\/3637528.3671758","type":"proceedings-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:55:12Z","timestamp":1724561712000},"page":"175-186","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Where Have You Been? A Study of Privacy Risk for Point-of-Interest Recommendation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-7310-4631","authenticated-orcid":false,"given":"Kunlin","family":"Cai","sequence":"first","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1311-3392","authenticated-orcid":false,"given":"Jinghuai","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3682-4290","authenticated-orcid":false,"given":"Zhiqing","family":"Hong","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6525-7091","authenticated-orcid":false,"given":"William","family":"Shand","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7739-7945","authenticated-orcid":false,"given":"Guang","family":"Wang","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9307-8736","authenticated-orcid":false,"given":"Desheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1138-5009","authenticated-orcid":false,"given":"Jianfeng","family":"Chi","sequence":"additional","affiliation":[{"name":"Meta, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6435-564X","authenticated-orcid":false,"given":"Yuan","family":"Tian","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_2_3_1","volume-title":"International Conference on Neural Information Processing Systems.","author":"Bai Lei","year":"2020","unstructured":"Lei Bai, Lina Yao, Can Li, Xianzhi Wang, and Can Wang. 2020. Adaptive graph convolutional recurrent network for traffic forecasting. International Conference on Neural Information Processing Systems."},{"key":"e_1_3_2_2_4_1","unstructured":"Andrew J Blumberg and Peter Eckersley. 2009. On locational privacy and how to avoid losing it forever. (2009)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660345"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"e_1_3_2_2_7_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Carlini Nicolas","year":"2023","unstructured":"Nicolas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tramer, Borja Balle, Daphne Ippolito, and Eric Wallace. 2023. Extracting training data from diffusion models. 32nd USENIX Security Symposium (USENIX Security 23), 5253--5270."},{"key":"e_1_3_2_2_8_1","volume-title":"USENIX Security Symposium.","author":"Carlini Nicholas","year":"2019","unstructured":"Nicholas Carlini, Chang Liu, \u00dalfar Erlingsson, Jernej Kos, and Dawn Song. 2019. The Secret Sharer: Evaluating and testing unintended memorization in neural networks. USENIX Security Symposium."},{"key":"e_1_3_2_2_9_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert- Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, et al 2021. Extracting training data from large language models. 30th USENIX Security Symposium (USENIX Security 21), 2633--2650."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06605-9_16"},{"key":"e_1_3_2_2_11_1","volume-title":"International Joint Conference on Artificial Intelligence.","author":"Cheng Chen","year":"2013","unstructured":"Chen Cheng, Haiqin Yang, Michael R Lyu, and Irwin King. 2013. Where you like to go next: Successive point-of-interest recommendation. International Joint Conference on Artificial Intelligence."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3557915.3561021"},{"key":"e_1_3_2_2_14_1","volume-title":"et al","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork, Aaron Roth, et al 2014. The algorithmic foundations of differential privacy. (2014)."},{"key":"e_1_3_2_2_15_1","unstructured":"EU. 2018. General data protection regulation. https:\/\/en.wikipedia.org\/wiki\/ General_Data_Protection_Regulation."},{"key":"e_1_3_2_2_16_1","unstructured":"Angela Fan Mike Lewis and Yann Dauphin. 2018. Hierarchical neural story generation. (2018)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17138-4_6"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"S\u00e9bastien Gambs Marc-Olivier Killijian and Miguel N\u00fa\u00f1ez del Prado Cortez. 2014. De-anonymization attack on geolocated data. (2014).","DOI":"10.1016\/j.jcss.2014.04.024"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"e_1_3_2_2_23_1","volume-title":"Membership Inference Attacks Against Temporally Corre lated Data in Deep Reinforcement Learning","author":"Gomrokchi Maziar","year":"2023","unstructured":"Maziar Gomrokchi, Susan Amin, Hossein Aboutalebi, Alexander Wong, and Doina Precup. 2023. Membership Inference Attacks Against Temporally Corre lated Data in Deep Reinforcement Learning, IEEE Access (2023)."},{"key":"e_1_3_2_2_24_1","volume-title":"USENIX Security Symposium.","author":"Hassan Wajih Ul","year":"2018","unstructured":"Wajih Ul Hassan, Saad Hussain, and Adam Bates. 2018. Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide? USENIX Security Symposium."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/255"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462113"},{"key":"e_1_3_2_2_27_1","volume-title":"Sarkar Snigdha Sarathi Das, and Mohammed Eunus Ali.","author":"Ashraful Islam Md.","year":"2020","unstructured":"Md. Ashraful Islam, Mir Mahathir Mohammad, Sarkar Snigdha Sarathi Das, and Mohammed Eunus Ali. 2020. A survey on deep learning based Point-Of-Interest (POI) recommendations. arXiv:cs.IR\/2011.10187"},{"key":"e_1_3_2_2_28_1","volume-title":"Auditing differentially private machine learning: How private is private SGD?","author":"Jagielski Matthew","year":"2020","unstructured":"Matthew Jagielski, Jonathan Ullman, and Alina Oprea. 2020. Auditing differentially private machine learning: How private is private SGD? (2020)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247689"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0095"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/324"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"e_1_3_2_2_34_1","volume-title":"International Conference on Machine Learning.","author":"Lan Shiyong","year":"2022","unstructured":"Shiyong Lan, Yitong Ma, Weikang Huang, Wenwu Wang, Hongyu Yang, and Pyang Li. 2022. Dstagnn: Dynamic spatial-temporal aware graph neural network for traffic flow forecasting. International Conference on Machine Learning."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403252"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623638"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.9971"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098168"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449998"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258062"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614358"},{"key":"e_1_3_2_2_42_1","unstructured":"Mike Boland. 2021. Foursquare's power play continues with relaunched places and new API. https:\/\/www.localogy.com\/2021\/03\/foursquares-power-play-continues-with-relaunched-places-and-new-api\/"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0065"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"Jovan Powar and Alastair R Beresford. 2023. SoK: Managing risks of linkage attacks on data privacy. (2023).","DOI":"10.56553\/popets-2023-0043"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Apostolos Pyrgelis Carmela Troncoso and Emiliano De Cristofaro. 2017. Knock knock who's there? Membership inference on aggregate location data. (2017).","DOI":"10.14722\/ndss.2018.23183"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392154"},{"key":"e_1_3_2_2_47_1","unstructured":"Jinmeng Rao Song Gao Yuhao Kang and Qunying Huang. 2020. LSTM-TrajGAN: A deep learning approach to trajectory privacy protection. arXiv preprint arXiv:2006.10521."},{"key":"e_1_3_2_2_48_1","unstructured":"Lingfei Ren Ruimin Hu Dengshi Li Zheng Wang Junhang Wu Xixi Li and Wenyi Hu. 2023. Who is your friend: inferring cross-regional friendship from mobility profiles. (2023)."},{"key":"e_1_3_2_2_49_1","volume-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models.","author":"Salem Ahmed","year":"2018","unstructured":"Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2018. Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. (2018)."},{"key":"e_1_3_2_2_50_1","unstructured":"Weiyan Shi Si Chen Chiyuan Zhang Ruoxi Jia and Zhou Yu. 2022. Just fine-tune twice: Selective differential privacy for large language models. (2022)."},{"key":"e_1_3_2_2_51_1","volume-title":"Selective Differential Privacy for Language Modeling. Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies.","author":"Shi Weiyan","year":"2022","unstructured":"Weiyan Shi, Aiqi Cui, Evan Li, Ruoxi Jia, and Zhou Yu. 2022. Selective Differential Privacy for Language Modeling. Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"volume-title":"IEEE Symposium on Security and Privacy.","author":"Shokri R.","key":"e_1_3_2_2_53_1","unstructured":"R. Shokri, M. Stronati, C. Song, and V. Shmatikov. 2017. Membership inference attacks against machine learning models. IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_54_1","unstructured":"Reza Shokri George Theodorakopoulos Panos Papadimitratos Ehsan Kazemi and Jean-Pierre Hubaux. 2013. Hiding in the mobile crowd: Location privacy through collaboration. (2013)."},{"key":"e_1_3_2_2_55_1","unstructured":"Shubham Sharma. 2022. How Foursquare helps enterprises drive positive results with geospatial technology. https:\/\/venturebeat.com\/data-infrastructure\/how-foursquare-helps-enterprises\/"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5353"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560554"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"crossref","unstructured":"Carmen Ruiz Vicente Dario Freni Claudio Bettini and Christian S Jensen. 2011. Location-related privacy in geo-social networks. (2011).","DOI":"10.1109\/MIC.2011.29"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"crossref","unstructured":"Nevena Vratonjic K\u00e9vin Huguenin Vincent Bindschaedler and Jean-Pierre Hubaux. 2014. A location-privacy threat stemming from the use of shared public IP addresses. (2014).","DOI":"10.1109\/TMC.2014.2309953"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26700"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474717.3483923"},{"key":"e_1_3_2_2_64_1","unstructured":"Zehui Wang Wolfram H\u00f6pken and Dietmar Jannach. 2023. A survey on Point-of-Interest recommendations leveraging heterogeneous data. arXiv:cs.IR\/2308.07426"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155290"},{"key":"e_1_3_2_2_66_1","unstructured":"Haoran Xin Xinjiang Lu Tong Xu Hao Liu Jingjing Gu Dejing Dou and Hui Xiong. 2021. Out-of-town recommendation with travel intention modeling. arXiv:cs.IR\/2101.12555"},{"key":"e_1_3_2_2_67_1","volume-title":"International Joint Conference on Artificial Intelligence.","author":"Yang Dingqi","year":"2020","unstructured":"Dingqi Yang, Benjamin Fankhauser, Paolo Rosso, and Philippe Cudre-Mauroux. 2020. Location prediction over sparse user mobility traces using rnns. International Joint Conference on Artificial Intelligence."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"crossref","unstructured":"Dingqi Yang Daqing Zhang Vincent W Zheng and Zhiyong Yu. 2014. Modeling user activity preference by leveraging user spatial temporal characteristics in LBSNs. (2014).","DOI":"10.1109\/TSMC.2014.2327053"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531983"},{"key":"e_1_3_2_2_70_1","volume-title":"Locmia: Membership inference attacks against aggregated location data.","author":"Zhang Guanglin","year":"2020","unstructured":"Guanglin Zhang, Anqi Zhang, and Ping Zhao. 2020. Locmia: Membership inference attacks against aggregated location data. (2020)."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666310.2666400"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.9986"}],"event":{"name":"KDD '24: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Barcelona Spain","acronym":"KDD '24"},"container-title":["Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671758","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637528.3671758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:01Z","timestamp":1750291561000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671758"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":72,"alternative-id":["10.1145\/3637528.3671758","10.1145\/3637528"],"URL":"https:\/\/doi.org\/10.1145\/3637528.3671758","relation":{},"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"2024-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}