no code implementations • 21 Feb 2017 • Fengli Xu, Zhen Tu, Yong Li, Pengyu Zhang, Xiao-Ming Fu, Depeng Jin
By conducting experiments on two real-world datasets collected from both mobile application and cellular network, we reveal that the attack system is able to recover users' trajectories with accuracy about 73%~91% at the scale of tens of thousands to hundreds of thousands users, which indicates severe privacy leakage in such datasets.
Computers and Society Cryptography and Security