network, or graph, with nodes representing places of significance which an individual visits, such as their home, work, places of social amenity, etc., and edge weights corresponding to probability estimates of movements between these places. Previous research has shown that individuals can be identified by a small number of geolocated nodes in their mobility network, rendering mobility trace anonymization a hard task. In this paper we build on prior work and demonstrate that even when all location and timestamp information is removed from nodes, the graph topology of an individual mobility network itself is often uniquely identifying. Further, we observe that a mobility network is often unique, even when only a small number of the most pop...
Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy ...
By eavesdropping on a user’s query in a sensor network, an adversary can deduce both the user’s curr...
Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy ...
Human mobility is often represented as a mobility network, or graph, with nodes representing places ...
The widespread adoption of handheld devices (e.g.,smartphones, tablets) makes mobility traces of use...
Location graphs are a compact representation of individual mobility that can be used as a mobility p...
With current technology, a number of entities have access to user mobility traces at different level...
We study fifteen months of human mobility data for one and a half million individuals and find that ...
We study the problem of privacy in human mobility data, i.e., the re-identification risk of individu...
Wireless networks and mobile devices, such as mobile phones and GPS receivers, sense and track the m...
Publisher Copyright: © 2021, The Author(s).The ability to share social network data at the level of ...
n this work we study mobile wireless networks by looking at mobility management and analysis of huma...
Mobility traces of people and vehicles have been collected and published to assist the design and ev...
Location and mobility patterns of individuals are important to environmental planning, societal resi...
Smart-phones, wearables and mobile devices in general are the sensors of our modern world. Their se...
Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy ...
By eavesdropping on a user’s query in a sensor network, an adversary can deduce both the user’s curr...
Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy ...
Human mobility is often represented as a mobility network, or graph, with nodes representing places ...
The widespread adoption of handheld devices (e.g.,smartphones, tablets) makes mobility traces of use...
Location graphs are a compact representation of individual mobility that can be used as a mobility p...
With current technology, a number of entities have access to user mobility traces at different level...
We study fifteen months of human mobility data for one and a half million individuals and find that ...
We study the problem of privacy in human mobility data, i.e., the re-identification risk of individu...
Wireless networks and mobile devices, such as mobile phones and GPS receivers, sense and track the m...
Publisher Copyright: © 2021, The Author(s).The ability to share social network data at the level of ...
n this work we study mobile wireless networks by looking at mobility management and analysis of huma...
Mobility traces of people and vehicles have been collected and published to assist the design and ev...
Location and mobility patterns of individuals are important to environmental planning, societal resi...
Smart-phones, wearables and mobile devices in general are the sensors of our modern world. Their se...
Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy ...
By eavesdropping on a user’s query in a sensor network, an adversary can deduce both the user’s curr...
Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy ...