Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
139 tokens/sec
GPT-4o
47 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

HRNet: Differentially Private Hierarchical and Multi-Resolution Network for Human Mobility Data Synthesization (2405.08043v2)

Published 13 May 2024 in cs.CR and cs.LG

Abstract: Human mobility data offers valuable insights for many applications such as urban planning and pandemic response, but its use also raises privacy concerns. In this paper, we introduce the Hierarchical and Multi-Resolution Network (HRNet), a novel deep generative model specifically designed to synthesize realistic human mobility data while guaranteeing differential privacy. We first identify the key difficulties inherent in learning human mobility data under differential privacy. In response to these challenges, HRNet integrates three components: a hierarchical location encoding mechanism, multi-task learning across multiple resolutions, and private pre-training. These elements collectively enhance the model's ability under the constraints of differential privacy. Through extensive comparative experiments utilizing a real-world dataset, HRNet demonstrates a marked improvement over existing methods in balancing the utility-privacy trade-off.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (70)
  1. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 308–318.
  2. Differentially-private next-location prediction with neural networks. In Advances in database technology.
  3. Public data-assisted mirror descent for private model training. In International Conference on Machine Learning. PMLR, 517–535.
  4. Stability of stochastic gradient descent on nonsmooth convex losses. Advances in Neural Information Processing Systems 33 (2020), 4381–4391.
  5. Private empirical risk minimization: Efficient algorithms and tight error bounds. In 2014 IEEE 55th annual symposium on foundations of computer science. IEEE, 464–473.
  6. Claire McKay Bowen and Fang Liu. 2021. Comparative study of differentially private data synthesis methods. Journal of Pivacy and Confidentiality 11-1 (2021), 280–307.
  7. SoK: Can Trajectory Generation Combine Privacy and Utility? The 24th Privacy Enhancing Technologies Symposium Issue 3 (2024).
  8. USC Bureau. 2020. On the map: Longitudinal employer-household dynamics, https://lehd.ces.census.gov/applications/help/onthemap.html#confidentiality _protection.
  9. A trajectory released scheme for the Internet of Vehicles based on differential privacy. IEEE Transactions on Intelligent Transportation Systems 23, 9 (2021), 16534–16547.
  10. Mobility network models of COVID-19 explain inequities and inform reopening. Nature 589, 7840 (2021), 82–87.
  11. Differentially private sequential data publication via variable-length n-grams. In Proceedings of the 2012 ACM conference on Computer and communications security. 638–649.
  12. Privacy-preserving trajectory data publishing by local suppression. Information Sciences 231 (2013), 83–97.
  13. Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Alessandro Moschitti, Bo Pang, and Walter Daelemans (Eds.). Association for Computational Linguistics, Doha, Qatar, 1724–1734. https://doi.org/10.3115/v1/D14-1179
  14. DF Crouse. 2016. On implementing 2D rectangular assignment algorithms. Transactions on Aerospace and Electronic Systems 52, 4 (2016), 1679–1696.
  15. Collecting telemetry data privately. In Advances in Neural Information Processing Systems. 3571–3580.
  16. Differentially private diffusion models. arXiv preprint arXiv:2210.09929 (2022).
  17. Cynthia Dwork. 2006. Differential privacy. In Proceedings of the 33rd international conference on Automata, Languages and Programming-Volume Part II. Springer-Verlag, 1–12.
  18. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265–284.
  19. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science 9, 3-4 (2014), 211–407.
  20. Rappor: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. 1054–1067.
  21. Deepmove: Predicting human mobility with attentional recurrent networks. In Proceedings of the 2018 world wide web conference. 1459–1468.
  22. GANs for Privacy-Aware Mobility Modeling. IEEE Access 11 (2023), 29250–29262.
  23. Differentially private and utility preserving publication of trajectory data. IEEE Transactions on Mobile Computing 18, 10 (2018), 2315–2329.
  24. DPT: differentially private trajectory synthesis using hierarchical reference systems. Proceedings of the VLDB Endowment 8, 11 (2015), 1154–1165.
  25. Context-aware multi-head self-attentional neural network model for next location prediction. Transportation Research Part C: Emerging Technologies 156 (2023), 104315.
  26. Differentially private publication of general time-serial trajectory data. In 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE, 549–557.
  27. Towards practical differential privacy for SQL queries. Proceedings of the VLDB Endowment 11, 5 (2018), 526–539.
  28. (Nearly) Dimension Independent Private ERM with AdaGrad Rates via Publicly Estimated Subspaces. In Conference on Learning Theory. PMLR, 2717–2746.
  29. The composition theorem for differential privacy. In International conference on machine learning. PMLR, 1376–1385.
  30. Computing tight differential privacy guarantees using fft. In International Conference on Artificial Intelligence and Statistics. PMLR, 2560–2569.
  31. Achieving differential privacy of trajectory data publishing in participatory sensing. Information Sciences 400 (2017), 1–13.
  32. DPSyn: Experiences in the NIST Differential Privacy Data Synthesis Challenges. Journal of Privacy and Confidentiality 11-2 (2021).
  33. Mining User Similarity Based on Location History. In Proceedings of the 16th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (Irvine, California) (GIS ’08). Association for Computing Machinery, New York, NY, USA, Article 34, 10 pages. https://doi.org/10.1145/1463434.1463477
  34. Geography-aware sequential location recommendation. In Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining. 2009–2019.
  35. Learning and inferring transportation routines. Artificial intelligence 171, 5-6 (2007), 311–331.
  36. Hierarchical multi-task graph recurrent network for next poi recommendation. In Proceedings of the 45th international ACM SIGIR conference on Research and development in Information Retrieval. 1133–1143.
  37. STP-UDGAT: Spatial-temporal-preference user dimensional graph attention network for next POI recommendation. In Proceedings of the 29th ACM International conference on information & knowledge management. 845–854.
  38. Deepstn+: Context-aware spatial-temporal neural network for crowd flow prediction in metropolis. In Proceedings of the AAAI conference on artificial intelligence, Vol. 33. 1020–1027.
  39. Spatio-temporal GRU for trajectory classification. In 2019 IEEE International Conference on Data Mining (ICDM). IEEE, 1228–1233.
  40. Differentially private and utility-aware publication of trajectory data. Expert Systems with Applications 180 (2021), 115120.
  41. Fully convolutional networks for semantic segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition. 3431–3440.
  42. A Survey on Deep Learning for Human Mobility. ACM Comput. Surv. 55, 2 (2023), 7:1–7:44. https://doi.org/10.1145/3485125
  43. STAN: Spatio-Temporal Attention Network for next Point-of-Interest Recommendation. WWW. 2177ś2185 (2021).
  44. Privacy: Theory meets practice on the map. In 2008 IEEE 24th international conference on data engineering. IEEE, 277–286.
  45. Trackintel: An open-source Python library for human mobility analysis. Computers, Environment and Urban Systems 101 (2023), 101938. https://doi.org/10.1016/j.compenvurbsys.2023.101938
  46. SoK: Differentially private publication of trajectory data. Proceedings on Privacy Enhancing Technologies (2023).
  47. Balancing privacy and utility of spatio-temporal data for taxi-demand prediction. In 2023 24th IEEE International Conference on Mobile Data Management (MDM). IEEE, 215–220.
  48. Analyzing privacy risk in human mobility data. In Software Technologies: Applications and Foundations: STAF 2018 Collocated Workshops, Toulouse, France, June 25-29, 2018, Revised Selected Papers. Springer, 114–129.
  49. PFlow: Reconstructing People Flow Recycling Large-Scale Social Survey Data. IEEE Pervasive Computing 10, 4 (2011), 27–35. https://doi.org/10.1109/MPRV.2011.43
  50. Privacy loss classes: The central limit theorem in differential privacy. Cryptology ePrint Archive (2018).
  51. Except-Condition Generative Adversarial Network for Generating Trajectory Data. In International Conference on Database and Expert Systems Applications. Springer, 289–294.
  52. Synthetic data–anonymisation groundhog day. In 31st USENIX Security Symposium (USENIX Security 22). 1451–1468.
  53. A. D. P. Team. 2017. Learning with privacy at scale.
  54. Waldo R Tobler. 1970. A computer movie simulating urban growth in the Detroit region. Economic geography 46, sup1 (1970), 234–240.
  55. A new privacy breach: User trajectory recovery from aggregated mobility data. IEEE/ACM Transactions on Networking 26, 3 (2018), 1446–1459.
  56. Salil Vadhan. 2017. The complexity of differential privacy. In Tutorials on the Foundations of Cryptography. Springer, 347–450.
  57. Attention is all you need. Advances in neural information processing systems 30 (2017).
  58. PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model. In USENIX Security Symposium 2023.
  59. Deep learning for spatio-temporal data mining: A survey. IEEE transactions on knowledge and data engineering 34, 8 (2020), 3681–3700.
  60. A Deep Generative Model for Trajectory Modeling and Utilization. Proceedings of the VLDB Endowment 16, 4 (2022), 973–985.
  61. Identifying different transportation modes from trajectory data using tree-based ensemble classifiers. ISPRS International Journal of Geo-Information 6, 2 (2017), 57.
  62. Spatio-Temporal Hypergraph Learning for Next POI Recommendation. In Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval. 403–412.
  63. Location prediction over sparse user mobility traces using rnns. In Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence. 2184–2190.
  64. Predicting next location using a variable order Markov model. In Proceedings of the 5th ACM SIGSPATIAL International Workshop on GeoStreaming. 37–42.
  65. Privbayes: Private data release via bayesian networks. ACM Transactions on Database Systems (TODS) 42, 4 (2017), 25.
  66. Privtree: A differentially private algorithm for hierarchical decompositions. In Proceedings of the 2016 international conference on management of data. 155–170.
  67. CSGAN: Modality-Aware Trajectory Generation via Clustering-based Sequence GAN. In 2023 24th IEEE International Conference on Mobile Data Management (MDM). IEEE, 148–157.
  68. Understanding transportation modes based on GPS data for web applications. ACM Transactions on the Web (TWEB) 4, 1 (2010), 1–36.
  69. Mining interesting locations and travel sequences from GPS trajectories. In Proceedings of the 18th international conference on World wide web. 791–800.
  70. Bypassing the Ambient Dimension: Private SGD with Gradient Subspace Identification. ICLR abs/2007.03813 (2021). https://api.semanticscholar.org/CorpusID:220404588

Summary

We haven't generated a summary for this paper yet.