Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Track data anonymity removing method based on deep learning

A technology of trajectory data and deep learning, applied in neural learning methods, digital data protection, structured data retrieval, etc., can solve problems such as manual intervention, insufficient research, and neglect of impact, and achieve the effect of performance improvement

Active Publication Date: 2019-11-26
WUHAN UNIV OF TECH
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, existing research based on real data sets is insufficient, and relies too much on the discovery of feature engineering and classification rules, which usually requires manual intervention, and ignores the impact of time attributes on classification results.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Track data anonymity removing method based on deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0027] In the field of deep learning, the emergence of ResNet has solved the problem of gradient dispersion very well, so that deeper networks can be trained better. The network of the L layer is formed by the network of the L-1 layer through the H (including Conv, BN, ReLU , Pooling) transformation, on this basis, it is directly connected to the network of the previous layer, so that the gradient can be better propagated. The basic idea of ​​DenseNet proposed by "DenselyConnected Convolutional Networks" is consistent with ResNet, but it establishes a dense c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a track data anonymity removing method based on deep learning, which comprises the following steps: firstly, under preset division precision, dividing a space into a pluralityof subspaces similar to a grid shape; dividing the trajectory data into two groups, one group being a known user trajectory and the other group being an anonymous user trajectory; splitting the two groups of trajectories into trajectory segments, and mapping the trajectory segments into grid data to obtain a group of grid identification sequences corresponding to the trajectories; secondly, inputting the set of grid identification sequences in the previous step into an improved DenseNet model, taking a known user track as a training set, and taking an anonymous user track as a test set; finally, classifying the tracks through a model, enabling the anonymous data to correspond to data in a known user data set, and finding out real user information corresponding to the anonymous user track data. According to the invention, the de-anonymization of the private trajectory data is realized to verify the effectiveness of the attack, so that the privacy risk of the anonymous trajectory data isrevealed.

Description

technical field [0001] The invention belongs to the technical field of computer big data processing, and relates to a method for de-anonymizing trajectory data, in particular to a method for de-anonymizing trajectory data based on deep learning. Background technique [0002] The development of mobile terminals and positioning technology makes it possible to obtain the precise location of moving objects anytime and anywhere. Mobile trajectories usually contain rich spatio-temporal information, and valuable information can be obtained through reasonable mining and analysis. Internet service providers (ISPs) are increasingly collecting anonymous user movement trajectories. Detailed location tracking contains sensitive information about individual users (such as home and work locations, personal habits), and malicious attackers can use illegally obtained movement trajectories It is speculated that the user's personal privacy information, such as life cycle or sensitive location...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F16/29G06K9/62G06N3/04G06N3/08
CPCG06F21/6254G06F16/29G06N3/08G06N3/044G06N3/045G06F18/241
Inventor 张蕊向阳谢鹏
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products