erik-buchholz / RAoPTLinks
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms
☆16Updated 8 months ago
Alternatives and similar repositories for RAoPT
Users that are interested in RAoPT are comparing it to the libraries listed below
Sorting:
- TKDE'23: A Survey and Experimental Study on Privacy-Preserving Trajectory Data Publishing☆12Updated 2 years ago
- ☆20Updated 2 years ago
- Source code for LDPTrace: Locally Differentially Private Trajectory Synthesis. VLDB 2023.☆27Updated last year
- Artifacts for SoK: Can Trajectory Generation Combine Privacy and Utility?☆11Updated 11 months ago
- Utility-aware synthesis of differentially private and attack-resilient location traces☆24Updated 6 years ago
- Source codes of KDD2021 paper "Generating Mobility Trajectories with Retained Data Utility"☆25Updated 3 years ago
- LSTM-TrajGAN: A Deep Learning Approach to Trajectory Privacy Protection☆79Updated 9 months ago
- ☆15Updated last year
- Secure and utility-aware data collection with condensed local differential privacy☆17Updated 5 years ago
- A Two-Stage Gan architecture to generate trajectory conditioned on maps information.☆44Updated 2 years ago
- ☆17Updated last year
- Source code for the paper "MARC: a robust method for multiple-aspect trajectory classification via space, time, and semantic embeddings"☆22Updated 4 years ago
- code for 'Differential Location Privacy for Sparse Mobile Crowdsensing' at ICDM'16☆46Updated 8 years ago
- [KDD 2020 (AI for COVID-19)] Learning to Simulate Human Mobility☆49Updated 3 years ago
- 本项目实现自《差分隐私下满足一致性的轨迹流量发布方法》,作者蔡剑平☆12Updated 5 years ago
- De-anonymization algorithm of mobility trajectories☆32Updated 7 years ago
- FL-TP: Federated Learning-based Vehicle Trajectory Prediction Algorithm against Cyberattacks☆24Updated last year
- Continuous Trajectory Generation Based on Two-Stage GAN, AAAI 2023.☆42Updated 2 years ago
- ☆13Updated last year
- ☆24Updated 3 years ago
- Thanks to the proliferation of smart devices, such as smartphones and wearables, which are equipped with computation, communication and s…☆45Updated 4 years ago
- LSTM network to verify trajector prediction on the NGSIM dataset based on IoV-SFDL framework☆46Updated 2 years ago
- GFIM: An novel algorithm of frequent item mining with local differential privacy☆12Updated 5 years ago
- Official PyTorch implementation of "Cross-Node Federated Graph Neural Network for Spatio-Temporal Modeling".☆67Updated 3 years ago
- PyTorch implementation of a number of mechanisms in local differential privacy☆17Updated 3 years ago
- The codes of paper "TrafficGAN: Off-Deployment Traffic Estimation with Traffic Generative Adversarial Networks".☆14Updated 4 years ago
- Map-Constrained Trajectory Recovery (KDD'21)☆56Updated 3 years ago
- 毕设 实验☆12Updated 6 years ago
- The implementation of ControlTraj: Controllable Trajectory Generation with Topology-Constrained Diffusion Model☆27Updated 4 months ago
- The official implementation of "Activity Trajectory Generation via Modeling Spatiotemporal Dynamics"☆32Updated last year