{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T21:04:17Z","timestamp":1770498257544,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T00:00:00Z","timestamp":1732233600000},"content-version":"vor","delay-in-days":24,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-23-2-0014"],"award-info":[{"award-number":["W911NF-23-2-0014"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"US NSF","award":["CNS-2136948"],"award-info":[{"award-number":["CNS-2136948"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,29]]},"DOI":"10.1145\/3678717.3691211","type":"proceedings-article","created":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T06:29:21Z","timestamp":1732256961000},"page":"29-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Protecting Vehicle Location Privacy with Contextually-Driven Synthetic Location Generation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6163-8935","authenticated-orcid":false,"given":"Sourabh","family":"Yadav","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of North Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6416-5742","authenticated-orcid":false,"given":"Chenyang","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of North Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6729-2879","authenticated-orcid":false,"given":"Xinpeng","family":"Xie","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of North Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0575-0156","authenticated-orcid":false,"given":"Yan","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of North Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3387-9758","authenticated-orcid":false,"given":"Chenxi","family":"Qiu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of North Texas, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"627","volume-title":"Proc. of ACM WWW","author":"Wang L.","year":"2017","unstructured":"L. Wang, D. Yang, X. Han, T. Wang, D. Zhang, and X. Ma. Location privacy-preserving task allocation for mobile crowdsensing with differential geoobfuscation. In Proc. of ACM WWW, pages 627--636, 2017."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3037911"},{"key":"e_1_3_2_1_3_1","article-title":"Differentially private location protection for worker datasets in spatial crowdsourcing","author":"To H.","year":"2017","unstructured":"H. To, G. Ghinita, L. Fan, and C. Shahabi. Differentially private location protection for worker datasets in spatial crowdsourcing. IEEE Transactions on Mobile Computing, pages 934--949, 2017.","journal-title":"IEEE Transactions on Mobile Computing, pages 934--949"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23241"},{"key":"e_1_3_2_1_5_1","first-page":"901","volume-title":"Proc. of ACM CCS","author":"Andr\u00e9s M. E.","year":"2013","unstructured":"M. E. Andr\u00e9s, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geoindistinguishability: Differential privacy for location-based systems. In Proc. of ACM CCS, pages 901--914, 2013."},{"key":"e_1_3_2_1_6_1","first-page":"251","volume-title":"Proc. of ACM CCS","author":"Bordenabe N. E.","year":"2014","unstructured":"N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Optimal geoindistinguishable mechanisms for location privacy. In Proc. of ACM CCS, pages 251--262, 2014."},{"key":"e_1_3_2_1_7_1","volume-title":"Generative adversarial privacy","author":"Huang Chong","year":"2018","unstructured":"Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, and Ram Rajagopal. Generative adversarial privacy, 2018."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2007.01.006"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052620"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.132"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.94"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463434.1463477"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4469-4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00153"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139958.3139973"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653771.1653807"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813640"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3557915.3560938"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069770"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2597160"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.018"},{"key":"e_1_3_2_1_22_1","volume-title":"A survey of transformers","author":"Lin Tianyang","year":"2021","unstructured":"Tianyang Lin, Yuxin Wang, Xiangyang Liu, and Xipeng Qiu. A survey of transformers, 2021."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00069"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_25_1","volume-title":"International Conference on Learning Representations","author":"Thomas","year":"2017","unstructured":"Thomas N. Kipf and Max Welling. Semi-supervised classification with graph convolutional networks. In International Conference on Learning Representations, 2017."},{"key":"e_1_3_2_1_26_1","volume-title":"July","author":"Bracciale Lorenzo","year":"2014","unstructured":"Lorenzo Bracciale, Marco Bonola, Pierpaolo Loreti, Giuseppe Bianchi, Raul Amici, and Antonello Rabuffi. CRAWDAD dataset roma\/taxi (v. 2014-07-17). Downloaded from https:\/\/crawdad.org\/roma\/taxi\/20140717, July 2014."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of ACM CIKM","author":"Qiu C.","year":"2020","unstructured":"C. Qiu, A. C. Squicciarini, Z. Li, C. Pang, and L. Yan. Time-efficient geoobfuscation to protect worker location privacy over road networks in spatial crowdsourcing. In Proc. of ACM CIKM, 2020."},{"key":"e_1_3_2_1_29_1","volume-title":"Algorithms: Design and Analysis","author":"Bhasin Harsh","year":"2015","unstructured":"Harsh Bhasin. Algorithms: Design and Analysis. Oxford Univ Press, 2015."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2016.0208"},{"issue":"1","key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Employing opportunistic charging for electric taxicabs to reduce idle time","volume":"2","author":"Yan Li","year":"2018","unstructured":"Li Yan, Haiying Shen, Zhuozhao Li, Ankur Sarker, John A. Stankovic, Chenxi Qiu, Juanjuan Zhao, and Chengzhong Xu. Employing opportunistic charging for electric taxicabs to reduce idle time. ACM IMWUT, 2(1):47:1--47:25, March 2018.","journal-title":"ACM IMWUT"},{"key":"e_1_3_2_1_32_1","volume-title":"Bidirectional lstm-crf models for sequence tagging","author":"Huang Zhiheng","year":"2015","unstructured":"Zhiheng Huang, Wei Xu, and Kai Yu. Bidirectional lstm-crf models for sequence tagging, 2015."},{"key":"e_1_3_2_1_33_1","volume-title":"Advances in Neural Information Processing Systems","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. Distributed representations of words and phrases and their compositionality. In C.J. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K.Q. Weinberger, editors, Advances in Neural Information Processing Systems, volume 26. Curran Associates, Inc., 2013."},{"key":"e_1_3_2_1_34_1","volume-title":"https:\/\/ieee-dataport.org\/open-access\/crawdad-epflmobility","author":"San Francisco","year":"2023","unstructured":"San Francisco taxi trajectories. https:\/\/ieee-dataport.org\/open-access\/crawdad-epflmobility, 2023. Accessed in July 2023."},{"key":"e_1_3_2_1_35_1","volume-title":"https:\/\/www.openstreetmap.org\/","year":"2020","unstructured":"openstreetmap. https:\/\/www.openstreetmap.org\/, 2020. Accessed: 2020-04-07."},{"key":"e_1_3_2_1_36_1","volume-title":"automatic dynamic shape compilation, distributed checkpointing. https:\/\/pytorch.org\/blog\/pytorch-2-1\/2023. Accessed","author":"PyTorch","year":"2023","unstructured":"PyTorch 2.1: automatic dynamic shape compilation, distributed checkpointing. https:\/\/pytorch.org\/blog\/pytorch-2-1\/2023. Accessed in November 2023."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3121756"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1054010"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00109"},{"key":"e_1_3_2_1_42_1","volume-title":"Really useful synthetic data - a framework to evaluate the quality of differentially private synthetic data","author":"Arnold Christian","year":"2021","unstructured":"Christian Arnold and Marcel Neunhoeffer. Really useful synthetic data - a framework to evaluate the quality of differentially private synthetic data, 2021."},{"key":"e_1_3_2_1_43_1","volume-title":"Generating multi-label discrete patient records using generative adversarial networks","author":"Choi Edward","year":"2018","unstructured":"Edward Choi, Siddharth Biswal, Bradley Malin, Jon Duke, Walter F. Stewart, and Jimeng Sun. Generating multi-label discrete patient records using generative adversarial networks, 2018."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2010.ap09480"},{"key":"e_1_3_2_1_45_1","volume-title":"Accessed","author":"The","year":"2022","unstructured":"The open data institute. Accessed in June 2022."},{"key":"e_1_3_2_1_46_1","volume-title":"Accessed","author":"Uk","year":"2022","unstructured":"Uk government-defence science and technology laboratory. Accessed in October 2022."},{"key":"e_1_3_2_1_47_1","volume-title":"Modeling tabular data using conditional gan","author":"Xu Lei","year":"2019","unstructured":"Lei Xu, Maria Skoularidou, Alfredo Cuesta-Infante, and Kalyan Veeramachaneni. Modeling tabular data using conditional gan, 2019."},{"key":"e_1_3_2_1_48_1","volume-title":"Privacy preserving synthetic health data. F1000Research, 8","author":"Yale Andrew","year":"2019","unstructured":"Andrew Yale, Saloni Dash, Ritik Dutta, Isabelle M Guyon, Adrien Pavao, and Kristin P. Bennett. Privacy preserving synthetic health data. F1000Research, 8, 2019."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102990"},{"key":"e_1_3_2_1_50_1","volume-title":"Multimodal learning with transformers: A survey","author":"Xu Peng","year":"2023","unstructured":"Peng Xu, Xiatian Zhu, and David A. Clifton. Multimodal learning with transformers: A survey, 2023."}],"event":{"name":"SIGSPATIAL '24: The 32nd ACM International Conference on Advances in Geographic Information Systems","location":"Atlanta GA USA","acronym":"SIGSPATIAL '24","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information"]},"container-title":["Proceedings of the 32nd ACM International Conference on Advances in Geographic Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678717.3691211","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678717.3691211","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678717.3691211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T10:41:03Z","timestamp":1755859263000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678717.3691211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,29]]},"references-count":50,"alternative-id":["10.1145\/3678717.3691211","10.1145\/3678717"],"URL":"https:\/\/doi.org\/10.1145\/3678717.3691211","relation":{},"subject":[],"published":{"date-parts":[[2024,10,29]]},"assertion":[{"value":"2024-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}