{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T12:40:21Z","timestamp":1760445621252,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3748777.3748786","type":"proceedings-article","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T11:53:38Z","timestamp":1760442818000},"page":"171-180","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Private Next Location Prediction using Transformers: Enhancing Accuracy under Differential Privacy Constraints"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6707-406X","authenticated-orcid":false,"given":"Andrei","family":"Ouatu","sequence":"first","affiliation":[{"name":"National University of Science and Technology POLITEHNICA, Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8372-3006","authenticated-orcid":false,"given":"Gabriel","family":"Ghinita","sequence":"additional","affiliation":[{"name":"College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2794-280X","authenticated-orcid":false,"given":"Razvan","family":"Rughinis","sequence":"additional","affiliation":[{"name":"National University of Science and Technology POLITEHNICA, Bucharest, Romania"}]}],"member":"320","published-online":{"date-parts":[[2025,10,14]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Herv\u00e9 Abdi and Lynne\u00a0J Williams. 2010. Principal component analysis. Wiley interdisciplinary reviews: computational statistics 2 4 (2010) 433\u2013459.","DOI":"10.1002\/wics.101"},{"key":"e_1_3_3_1_4_2","unstructured":"Galen Andrew Om Thakkar Brendan McMahan and Swaroop Ramaswamy. 2021. Differentially private learning with adaptive clipping. Advances in Neural Information Processing Systems 34 (2021) 17455\u201317466."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Albrecht B\u00f6ttcher and David Wenzel. 2008. The Frobenius norm and the commutator. Linear algebra and its applications 429 8-9 (2008) 1864\u20131885.","DOI":"10.1016\/j.laa.2008.05.020"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Rasmus Bro and Age\u00a0K Smilde. 2014. Principal component analysis. Analytical methods 6 9 (2014) 2812\u20132831.","DOI":"10.1039\/C3AY41907J"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591877"},{"key":"e_1_3_3_1_9_2","first-page":"230","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","author":"Chanyaswad Thee","year":"2018","unstructured":"Thee Chanyaswad, Alex Dytso, H\u00a0Vincent Poor, and Prateek Mittal. 2018. Mvg mechanism: Differential privacy under matrix-valued query. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 230\u2013246."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","first-page":"1011","DOI":"10.1109\/BigData50022.2020.9378011","volume-title":"2020 IEEE International Conference on Big Data (Big Data)","author":"Chen Chen","year":"2020","unstructured":"Chen Chen and Jaewoo Lee. 2020. Stochastic adaptive line search for differentially private optimization. In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 1011\u20131020."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"John\u00a0T Chen and Arjun\u00a0K Gupta. 2005. Matrix variate skew normal distributions. Statistics 39 3 (2005) 247\u2013253.","DOI":"10.1080\/02331880500108593"},{"key":"e_1_3_3_1_12_2","unstructured":"Yunfei Chu Jin Xu Xiaohuan Zhou Qian Yang Shiliang Zhang Zhijie Yan Chang Zhou and Jingren Zhou. 2023. Qwen-audio: Advancing universal audio understanding via unified large-scale audio-language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2311.07919 (2023)."},{"key":"e_1_3_3_1_13_2","unstructured":"Youlong Ding Xueyang Wu Yining Meng Yonggang Luo Hao Wang and Weike Pan. 2024. Delving into differentially private transformer. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2405.18194 (2024)."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583512"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616592"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth et\u00a0al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3\u20134 (2014) 211\u2013407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"AK Gupta and T Varga. 1992. Characterization of matrix variate normal distributions. Journal of Multivariate Analysis 41 1 (1992) 80\u201388.","DOI":"10.1016\/0047-259X(92)90058-N"},{"key":"e_1_3_3_1_19_2","first-page":"1","volume-title":"Proceedings of the 30th International Conference on Advances in Geographic Information Systems","author":"Hong Ye","year":"2022","unstructured":"Ye Hong, Henry Martin, and Martin Raubal. 2022. How do you go where? improving next location prediction by learning travel mode information using transformers. In Proceedings of the 30th International Conference on Advances in Geographic Information Systems. 1\u201310."},{"key":"e_1_3_3_1_20_2","unstructured":"Edward\u00a0J Hu Yelong Shen Phillip Wallis Zeyuan Allen-Zhu Yuanzhi Li Shean Wang Lu Wang Weizhu Chen et\u00a0al. 2022. Lora: Low-rank adaptation of large language models. ICLR 1 2 (2022) 3."},{"key":"e_1_3_3_1_21_2","unstructured":"Shaohan Huang Li Dong Wenhui Wang Yaru Hao Saksham Singhal Shuming Ma Tengchao Lv Lei Cui Owais\u00a0Khan Mohammed Barun Patra et\u00a0al. 2023. Language is not all you need: Aligning perception with language models. Advances in Neural Information Processing Systems 36 (2023) 72096\u201372109."},{"key":"e_1_3_3_1_22_2","unstructured":"Diederik\u00a0P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1412.6980 (2014)."},{"key":"e_1_3_3_1_23_2","unstructured":"Jing\u00a0Yu Koh Daniel Fried and Russ\u00a0R Salakhutdinov. 2023. Generating images with multimodal language models. Advances in Neural Information Processing Systems 36 (2023) 21487\u201321506."},{"key":"e_1_3_3_1_24_2","first-page":"2341","volume-title":"Ijcai","author":"Kong Dejiang","year":"2018","unstructured":"Dejiang Kong and Fei Wu. 2018. HST-LSTM: A hierarchical spatial-temporal long-short term memory network for location prediction.. In Ijcai , Vol.\u00a018. 2341\u20132347."},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Taku Kudo and John Richardson. 2018. Sentencepiece: A simple and language independent subword tokenizer and detokenizer for neural text processing. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1808.06226 (2018).","DOI":"10.18653\/v1\/D18-2012"},{"key":"e_1_3_3_1_26_2","unstructured":"Xuechen Li Florian Tramer Percy Liang and Tatsunori Hashimoto. 2021. Large language models can be strong differentially private learners. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2110.05679 (2021)."},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671578"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16548"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Jinbo Liu Yunliang Chen Xiaohui Huang Jianxin Li and Geyong Min. 2023. GNN-based long and short term preference modeling for next-location prediction. Information Sciences 629 (2023) 1\u201314.","DOI":"10.1016\/j.ins.2023.01.131"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.9971"},{"key":"e_1_3_3_1_31_2","first-page":"23803","volume-title":"International conference on Machine learning","author":"Mao Anqi","year":"2023","unstructured":"Anqi Mao, Mehryar Mohri, and Yutao Zhong. 2023. Cross-entropy loss functions: Theoretical analysis and applications. In International conference on Machine learning. PMLR, 23803\u201323828."},{"key":"e_1_3_3_1_32_2","first-page":"1273","volume-title":"Artificial intelligence and statistics","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise\u00a0Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR, 1273\u20131282."},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-acl.171"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Erich Schubert J\u00f6rg Sander Martin Ester Hans\u00a0Peter Kriegel and Xiaowei Xu. 2017. DBSCAN revisited revisited: why and how you should (still) use DBSCAN. ACM Transactions on Database Systems (TODS) 42 3 (2017) 1\u201321.","DOI":"10.1145\/3068335"},{"key":"e_1_3_3_1_35_2","unstructured":"Koen\u00a0Lennart van\u00a0der Veen Ruben Seggers Peter Bloem and Giorgio Patrini. 2018. Three tools for practical differential privacy. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1812.02890 (2018)."},{"key":"e_1_3_3_1_36_2","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan\u00a0N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"crossref","unstructured":"Peixiao Wang Hongen Wang Hengcai Zhang Feng Lu and Sheng Wu. 2019. A hybrid Markov and LSTM model for indoor location prediction. IEEE Access 7 (2019) 185928\u2013185940.","DOI":"10.1109\/ACCESS.2019.2961559"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"Svante Wold Kim Esbensen and Paul Geladi. 1987. Principal component analysis. Chemometrics and intelligent laboratory systems 2 1-3 (1987) 37\u201352.","DOI":"10.1016\/0169-7439(87)80084-9"},{"key":"e_1_3_3_1_39_2","unstructured":"Hao Xue Flora Salim Yongli Ren and Nuria Oliver. 2021. MobTCast: Leveraging auxiliary trajectory forecasting for human mobility prediction. Advances in Neural Information Processing Systems 34 (2021) 30380\u201330391."},{"key":"e_1_3_3_1_40_2","volume-title":"Forty-first International Conference on Machine Learning","author":"Yang Dongchao","year":"2024","unstructured":"Dongchao Yang, Jinchuan Tian, Xu Tan, Rongjie Huang, Songxiang Liu, Haohan Guo, Xuankai Chang, Jiatong Shi, Jiang Bian, Zhou Zhao, et\u00a0al. 2024. Uniaudio: Towards universal audio generation with large language models. In Forty-first International Conference on Machine Learning."},{"key":"e_1_3_3_1_41_2","unstructured":"Da Yu Saurabh Naik Arturs Backurs Sivakanth Gopi Huseyin\u00a0A. Inan Gautam Kamath Janardhan Kulkarni Yin\u00a0Tat Lee Andre Manoel Lukas Wutschitz Sergey Yekhanin and Huishuai Zhang. 2021. Differentially Private Fine-tuning of Language Models. CoRR abs\/2110.06500 (2021). https:\/\/arxiv.org\/abs\/2110.06500"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00637"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409677"},{"key":"e_1_3_3_1_44_2","unstructured":"Yu Zheng Xing Xie Wei-Ying Ma et\u00a0al. 2010. GeoLife: A collaborative social networking service among user location and trajectory. IEEE Data Eng. Bull. 33 2 (2010) 32\u201339."},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526816"}],"event":{"name":"SSTD '25: 19th International Symposium on Spatial and Temporal Data","acronym":"SSTD '25","location":"Osaka Japan"},"container-title":["Proceedings of the 19th International Symposium on Spatial and Temporal Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3748777.3748786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T11:58:44Z","timestamp":1760443124000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3748777.3748786"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,25]]},"references-count":44,"alternative-id":["10.1145\/3748777.3748786","10.1145\/3748777"],"URL":"https:\/\/doi.org\/10.1145\/3748777.3748786","relation":{},"subject":[],"published":{"date-parts":[[2025,8,25]]},"assertion":[{"value":"2025-10-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}