Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017 (2017), Article ID 3787089, 10 pages
https://doi.org/10.1155/2017/3787089
Research Article

Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence

1Beijing Key Laboratory of IOT Information Security, Institute of Information Engineering, CAS, Beijing 100093, China
2School of Cyber Security, University of Chinese Academy of Sciences, 19 A Yuquan Rd, Shijingshan District, Beijing 100049, China

Correspondence should be addressed to Hong Li

Received 25 July 2017; Accepted 2 October 2017; Published 31 October 2017

Academic Editor: Chaokun Wang

Copyright © 2017 Feng Yi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): a vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. E. Cho, S. A. Myers, and J. Leskovec, “Friendship and mobility: user movement in location-based social networks,” in Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1082–1090, ACM, August 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Narayanan and V. Shmatikov, “Robust de-anonymization of large sparse datasets,” in Proceedings of the IEEE Symposium on Security and Privacy (SP '08), pp. 111–125, IEEE, Oakland, Calif, USA, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  4. Narayanan Arvind and Shmatikov Vitaly, “De-anonymizing social networks,” in Proceedings of the In 30th IEEE Symposium on Security and Privacy (S&P 2009), pp. 173–187, Oakland , California, USA, 2009.
  5. M. Srivatsa and M. Hicks, “Deanonymizing mobility traces: Using social networks as a side-channel,” in Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 628–637, usa, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Su, A. Shukla, S. Goel, and A. Narayanan, “De-anonymizing Web Browsing Data with Social Networks,” in Proceedings of the the 26th International Conference, pp. 1261–1269, Perth, Australia, April 2017. View at Publisher · View at Google Scholar
  7. C. Dwork, “Differential privacy: a survey of results,” in Theory and Applications of Models of Computation: 5th International Conference, TAMC 2008, Xi'an, China, April 25–29, 2008. Proceedings, vol. 4978 of Lecture Notes in Computer Science, pp. 1–19, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  8. H. Pham, C. Shahabi, and Y. Liu, “EBM - An entropy-based model to infer social strength from spatiotemporal data,” in Proceedings of the 2013 ACM SIGMOD Conference on Management of Data, SIGMOD 2013, pp. 265–276, usa, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. J. Cranshaw, E. Toch, J. Hong, A. Kittur, and N. Sadeh, “Bridging the gap between physical location and online social networks,” in Proceedings of the 12th ACM International Conference on Ubiquitous Computing (UbiComp '10), pp. 119–128, ACM, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  10. N. Eagle, A. Pentland, and D. Lazer, “Inferring friendship network structure by using mobile phone data,” Proceedings of the National Acadamy of Sciences of the United States of America, vol. 106, no. 36, pp. 15274–15278, 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. E. Malmi, T. M. T. Do, and D. Gatica-Perez, “Checking in or checked in: Comparing large-scale manual and automatic location disclosure patterns,” in Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, MUM 2012, deu, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Itoh, D. Yokoyama, M. Toyoda, Y. Tomita, S. Kawamura, and M. Kitsuregawa, “Visual fusion of mega-city big data: An application to traffic and tweets data analysis of Metro passengers,” in Proceedings of the 2nd IEEE International Conference on Big Data, IEEE Big Data 2014, pp. 431–440, usa, October 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. R. Cucchiara, “Multimedia surveillance systems,” in Proceedings of the 3rd ACM International Workshop on Video Surveillance and Sensor Networks, VSSN 2005, pp. 3–10, sgp. View at Publisher · View at Google Scholar · View at Scopus
  14. M. C. González, C. A. Hidalgo, and A.-L. Barabási, “Understanding individual human mobility patterns,” Nature, vol. 453, no. 7196, pp. 779–782, 2008. View at Publisher · View at Google Scholar · View at Scopus
  15. D. J. Crandall, L. Backstrom, D. Cosley, S. Suri, D. Huttenlocher, and J. Kleinberg, “Inferring social ties from geographic coincidences,” Proceedings of the National Acadamy of Sciences of the United States of America, vol. 107, no. 52, pp. 22436–22441, 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. M. Yu, W. Si, G. Song, Z. Li, and J. Yen, “Who were you talking to - Mining interpersonal relationships from cellphone network data,” in Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2014, pp. 485–490, chn, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. H. Wang, Z. Li, and W.-C. Lee, “PGT: Measuring Mobility Relationship Using Personal, Global and Temporal Factors,” in Proceedings of the 14th IEEE International Conference on Data Mining, ICDM 2014, pp. 570–579, chn, December 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. N. Zhou, X. Zhang, and S. Wang, “Theme-aware social strength inference from spatiotemporal data,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 8485, pp. 498–509, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. C. Shahabi, L. Fan, L. Nocera, L. Xiong, and M. Li, “Privacy-preserving inference of social relationships from location data: A vision paper,” in Proceedings of the 23rd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2015, usa, November 2015. View at Publisher · View at Google Scholar · View at Scopus
  20. Santos Adelia, McGuckin Nancy, Yukiko Nakamoto Hikari, Danielle Gray, and Liss Susan, “Summary of travel trends: 2009 national household travel survey,” Federal Highway Administration, National Household Travel Survey, U.S. Department of Transportation, 2009, http://nhts.ornl.gov/2009/pub/stt.pdf. View at Google Scholar
  21. Yongyan Quan, Jifu Guo, Xian Li, and Gengchen Wang, “Beijing transport annual report,” The Beijing Transport, 2017, http://www.bjtrc.org.cn/JGJS.aspx?id=5.2Menu=GZCG. View at Google Scholar
  22. C. Yu, Y. Liu, D. Yao et al., “Modeling user activity patterns for next-place prediction,” IEEE Systems Journal, vol. PP, no. 99, 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. A. Likhyani, D. Padmanabhan, S. Bedathur, and S. Mehta, “Inferring and exploiting categories for next location prediction,” in Proceedings of the 24th International Conference on World Wide Web, WWW 2015, pp. 65-66, ita, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  24. J. Ye, Z. Zhu, and H. Cheng, “What's your next move: User activity prediction in location-based social networks,” in Proceedings of the 13th SIAM International Conference on Data Mining, SMD 2013, pp. 171–179, May 2013. View at Scopus
  25. S. Hasan, X. Zhan, and S. V. Ukkusuri, “Understanding urban human activity and mobility patterns using large-scale location-based data from online social media,” in Proceedings of the 2nd ACM SIGKDD International Workshop on Urban Computing (UrbComp ’13), pp. 6:1–6:8, ACM, August 2013. View at Publisher · View at Google Scholar · View at Scopus
  26. F. Yi, H. Li, H. Wang, H. Wen, and L. Sun, “Mobility Intention-Based Relationship Inference from Spatiotemporal Data,” in Wireless Algorithms, Systems, and Applications, vol. 10251 of Lecture Notes in Computer Science, pp. 871–876, Springer International Publishing, Cham, 2017. View at Publisher · View at Google Scholar
  27. Z. Fan, X. Song, and R. Shibasaki, “CitySpectrum: A non-negative tensor factorization approach,” in Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2014, pp. 213–233, usa, September 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. H. A. L. Kiers, “A three-step algorithm for CANDECOMP/PARAFAC analysis of large data sets with multicollinearity,” Journal of Chemometrics, vol. 12, no. 3, pp. 155–171, 1998. View at Publisher · View at Google Scholar · View at Scopus
  29. Y. Freund, R. Iyer, R. E. Schapire, and Y. Singer, “An efficient boosting algorithm for combining preferences,” Journal of Machine Learning Research (JMLR), vol. 4, no. 6, pp. 933–969, 2004. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus