pith. machine review for the scientific record. sign in

arxiv: 2604.19653 · v2 · submitted 2026-04-21 · 💻 cs.AI

Recognition: unknown

A Dual Perspective on Synthetic Trajectory Generators: Utility Framework and Privacy Vulnerabilities

Arnaud Legendre, Aya Cherigui, Florent Gu\'epin, Jean-Fran\c{c}ois Couchot

Authors on Pith no claims yet

Pith reviewed 2026-05-10 02:13 UTC · model grok-4.3

classification 💻 cs.AI
keywords synthetic trajectory generatorsgenerative modelsmembership inference attackprivacy vulnerabilitiesutility evaluation frameworkhuman mobility dataadversarial privacy evaluation
0
0 comments X

The pith

Generative models for synthetic human trajectories can leak membership information via a new inference attack, despite resisting user-linking, and a utility framework helps quantify their value.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The authors create a framework to measure the utility of synthetic trajectories generated by models and introduce a membership inference attack targeting models previously viewed as private. Human mobility data is sensitive, containing details that could reveal personal beliefs or affiliations, making effective privacy methods essential for applications in public health and planning. Traditional privacy techniques reduce utility too much, so generative models were adopted, but their privacy-utility balance was unclear. The paper shows that adversarial evaluation, like the proposed attack, is needed to properly assess privacy in line with regulations.

Core claim

We introduce and apply a new framework for evaluating the utility of synthetic trajectory generators. We also provide evidence that privacy evaluation for these generators requires adversarial methods and propose a new membership inference attack against a subcategory of generative models that were considered private due to their resistance to the trajectory user-linking problem.

What carries the argument

The membership inference attack on generative models for trajectories, which determines if a given trajectory was part of the training set, combined with the utility framework that assesses how faithfully synthetic data represents original mobility patterns.

Load-bearing premise

The proposed membership inference attack works in practice against the targeted generative models for trajectories.

What would settle it

Demonstrating through experiments that the membership inference attack cannot reliably distinguish training trajectories from non-training ones at rates above chance would falsify the vulnerability claim.

Figures

Figures reproduced from arXiv: 2604.19653 by Arnaud Legendre, Aya Cherigui, Florent Gu\'epin, Jean-Fran\c{c}ois Couchot.

Figure 1
Figure 1. Figure 1: Example of threshold computation, based on the [PITH_FULL_IMAGE:figures/full_fig_p010_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: Presentation of the two different methodology for [PITH_FULL_IMAGE:figures/full_fig_p015_2.png] view at source ↗
Figure 3
Figure 3. Figure 3: Representation of the different datasets, models [PITH_FULL_IMAGE:figures/full_fig_p016_3.png] view at source ↗
Figure 4
Figure 4. Figure 4: Validation loss curves for LSTM-TrajGAN, exGAN and TrajGDM models [PITH_FULL_IMAGE:figures/full_fig_p017_4.png] view at source ↗
read the original abstract

Human mobility data are used in numerous applications, ranging from public health to urban planning. Human mobility is inherently sensitive, as it can contain information such as religious beliefs and political affiliations. Historically, it has been proposed to modify the information using techniques such as aggregation, obfuscation, or noise addition, to adequately protect privacy and eliminate concerns. As these methods come at a great cost in utility, new methods leveraging development in generative models, were introduced. The extent to which such methods answer the privacy-utility trade-off remains an open problem. In this paper, we introduced a first step towards solving it, by the introduction and application of a new framework for utility evaluation. Furthermore, we provide evidence that privacy evaluation remains a great challenge to consider and that it should be tackled through adversarial evaluation in accordance with the current EU regulation. We propose a new membership inference attack against a subcategory of generative models, even though this subcategory was deemed private due to its resistance over the trajectory user-linking problem.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

0 major / 3 minor

Summary. The manuscript introduces a new framework for evaluating the utility of synthetic trajectory generators from human mobility data and proposes a membership inference attack targeting a subcategory of generative models previously deemed private due to resistance to the trajectory user-linking problem. It argues that privacy evaluation requires adversarial approaches in accordance with EU regulations and positions the work as a first step toward resolving the privacy-utility trade-off.

Significance. If the utility framework advances evaluation beyond prior metrics and the membership inference attack demonstrates practical effectiveness with appropriate controls, the work would meaningfully contribute to assessing synthetic data generators for sensitive mobility applications in public health and urban planning. The focus on adversarial privacy testing aligns with regulatory expectations and could inform better design of generative models.

minor comments (3)
  1. The abstract would benefit from a concise statement of the datasets, baselines, or quantitative outcomes supporting the utility framework and attack effectiveness.
  2. Ensure consistent terminology throughout, particularly around 'trajectory user-linking problem' and the exact subcategory of generative models addressed.
  3. Add explicit comparisons in the utility framework section to established metrics to clarify incremental value.

Simulated Author's Rebuttal

0 responses · 0 unresolved

We thank the referee for the positive assessment, recognition of the utility framework's advancement and the membership inference attack's practical relevance, and the recommendation for minor revision. We appreciate the alignment noted with regulatory expectations for adversarial privacy evaluation.

Circularity Check

0 steps flagged

No significant circularity identified

full rationale

The paper presents two main contributions—an empirical utility evaluation framework for synthetic trajectory generators and a new membership inference attack—as direct proposals without any visible derivation chain, equations, or self-referential reductions. The abstract and described full text frame these as incremental empirical advances rather than results forced by fitted parameters, self-citations, or ansatzes imported from prior author work. No load-bearing step reduces to its own inputs by construction, and the argument structure remains self-contained as standard empirical research.

Axiom & Free-Parameter Ledger

0 free parameters · 0 axioms · 0 invented entities

Abstract provides no equations, parameters, or technical details, so no free parameters, axioms, or invented entities can be identified.

pith-pipeline@v0.9.0 · 5483 in / 1016 out tokens · 25661 ms · 2026-05-10T02:13:44.640912+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. diffGHOST: Diffusion based Generative Hedged Oblivious Synthetic Trajectories

    cs.AI 2026-05 unverdicted novelty 5.0

    diffGHOST is a conditional diffusion model that segments learned latent space to identify and mitigate memorization of critical trajectory samples, aiming to deliver privacy guarantees alongside data utility.

Reference graph

Works this paper leans on

132 extracted references · 20 canonical work pages · cited by 1 Pith paper · 1 internal anchor

  1. [1]

    2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Direc- tive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance). 88 pages. http://data.europa.eu/eli/reg/2...

  2. [2]

    Osman Abul, Francesco Bonchi, and Mirco Nanni. 2008. Never walk alone: Uncertainty for anonymity in moving objects databases. In2008 IEEE 24th international conference on data engineering. Ieee, 376–385

  3. [3]

    Helmut Alt and Michael Godau. 1995. Computing the Fréchet distance between two polygonal curves.International Journal of Computational Geometry & Applications5, 01n02 (1995), 75–91

  4. [4]

    Meenatchi Sundaram Muthu Selva Annamalai, Andrea Gadotti, and Luc Rocher

  5. [5]

    In33rd USENIX Security Symposium (USENIX Security 24)

    A linear reconstruction approach for attribute inference attacks against synthetic data. In33rd USENIX Security Symposium (USENIX Security 24). 2351– 2368

  6. [6]

    Martin Arjovsky and Léon Bottou. 2017. Towards principled methods for training generative adversarial networks (2017).arXiv preprint arXiv:1701.04862 (2017)

  7. [7]

    Martin Arjovsky, Soumith Chintala, and Léon Bottou. 2017. Wasserstein gen- erative adversarial networks. InInternational conference on machine learning. PMLR, 214–223

  8. [8]

    Giuseppe Ateniese, Luigi V Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, and Giovanni Felici. 2015. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. International Journal of Security and Networks10, 3 (2015), 137–150

  9. [9]

    Stefan Atev, Grant Miller, and Nikolaos P Papanikolopoulos. 2010. Clustering of vehicle trajectories.IEEE transactions on intelligent transportation systems11, 3 (2010), 647–657

  10. [10]

    Randall Balestriero, Jerome Pesenti, and Yann LeCun. 2021. Learning in high dimension always amounts to extrapolation.arXiv preprint arXiv:2110.09485 (2021)

  11. [11]

    Borja Balle, Giovanni Cherubin, and Jamie Hayes. 2022. Reconstructing training data with informed adversaries. In2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1138–1156

  12. [12]

    Donald J Berndt and James Clifford. 1994. Using dynamic time warping to find patterns in time series. InProceedings of the 3rd international conference on knowledge discovery and data mining. 359–370

  13. [13]

    James Biagioni and Jakob Eriksson. 2012. Inferring road maps from global positioning system traces: Survey and comparative evaluation.Transportation research record2291, 1 (2012), 61–71

  14. [14]

    Jiang Bian, Dayong Tian, Yuanyan Tang, and Dacheng Tao. 2018. A survey on trajectory clustering analysis.arXiv preprint arXiv:1802.06971(2018)

  15. [15]

    Vincent Bindschaedler and Reza Shokri. 2016. Synthesizing plausible privacy- preserving location traces. In2016 IEEE symposium on security and privacy (SP). IEEE, 546–563

  16. [16]

    2021.Utility Metrics for Differential Privacy: No One-Size- Fits-All

    Claire McKay Bowen. 2021.Utility Metrics for Differential Privacy: No One-Size- Fits-All. https://www.nist.gov/blogs/cybersecurity-insights/utility-metrics- differential-privacy-no-one-size-fits-all

  17. [17]

    Dirk Brockmann, Lars Hufnagel, and Theo Geisel. 2006. The scaling laws of human travel.Nature439, 7075 (2006), 462–465

  18. [18]

    Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, and Salil S. Kanhere

  19. [19]

    SoK: Can Trajectory Generation Combine Privacy and Utility?Proc. Priv. Enhancing Technol.2024, 3 (2024), 75–93. doi:10.56553/POPETS-2024-0068

  20. [20]

    Ricardo JGB Campello, Davoud Moulavi, and Jörg Sander. 2013. Density-based clustering based on hierarchical density estimates. InPacific-Asia conference on knowledge discovery and data mining. Springer, 160–172

  21. [21]

    Chu Cao and Mo Li. 2021. Generating Mobility Trajectories with Retained Data Utility. InKDD ’21: The 27th ACM SIGKDD Conference on Knowledge Discov- ery and Data Mining, Virtual Event, Singapore, August 14-18, 2021, Feida Zhu, Beng Chin Ooi, and Chunyan Miao (Eds.). ACM, 2610–2620. doi:10.1145/3447548. 3467158 Source code available at: https://github.com/...

  22. [22]

    Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, and Florian Tramer. 2022. Membership inference attacks from first principles. In 2022 IEEE symposium on security and privacy (SP). IEEE, 1897–1914

  23. [23]

    Xinyu Chen, Jiajie Xu, Rui Zhou, Wei Chen, Junhua Fang, and Chengfei Liu

  24. [24]

    Trajvae: A variational autoencoder model for trajectory generation.Neu- rocomputing428 (2021), 332–339

  25. [25]

    Chen Chu, Hengcai Zhang, Peixiao Wang, and Feng Lu. 2024. Simulating human mobility with a trajectory generation framework based on diffusion model.International Journal of Geographical Information Science38, 5 (2024), 847–878. Source code available at: https://github.com/chuchen2017/TrajGDM

  26. [26]

    2015.Statistics for spatial data

    Noel Cressie. 2015.Statistics for spatial data. John Wiley & Sons

  27. [27]

    Ge Cui, Jun Luo, and Xin Wang. 2018. Personalized travel route recommendation using collaborative filtering based on GPS trajectories.International journal of digital earth11, 3 (2018), 284–307

  28. [28]

    Teddy Cunningham, Graham Cormode, and Hakan Ferhatosmanoglu. 2021. Privacy-preserving synthetic location data in the real world. InProceedings of the 17th International Symposium on Spatial and Temporal Databases. 23–33

  29. [29]

    Yves-Alexandre de Montjoye, César A Hidalgo, Michel Verleysen, and Vincent D Blondel. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific reports3, 1 (2013), 1376

  30. [30]

    Josep Domingo-Ferrer and Rolando Trujillo-Rasua. 2012. Microaggregation-and permutation-based anonymization of movement data.Information Sciences208 (2012), 55–80

  31. [31]

    Bowen Du, Hao Peng, Senzhang Wang, Md Zakirul Alam Bhuiyan, Lihong Wang, Qiran Gong, Lin Liu, and Jing Li. 2019. Deep irregular convolutional residual LSTM for urban traffic passenger flows prediction.IEEE Transactions on Intelligent Transportation Systems21, 3 (2019), 972–985

  32. [32]

    Cristóbal Esteban, Stephanie L Hyland, and Gunnar Rätsch. 2017. Real-valued (medical) time series generation with recurrent conditional gans.arXiv preprint arXiv:1706.02633(2017)

  33. [33]

    Ali Farzanehfar, Florimond Houssiau, and Yves-Alexandre de Montjoye. 2021. The risk of re-identification remains high even in country-scale location datasets. Patterns2, 3 (2021)

  34. [34]

    Vitaly Feldman and Chiyuan Zhang. 2020. What neural networks memorize and why: Discovering the long tail via influence estimation.Advances in Neural Information Processing Systems33 (2020), 2881–2891

  35. [35]

    Jie Feng, Zeyu Yang, Fengli Xu, Haisu Yu, Mudan Wang, and Yong Li. 2020. Learning to Simulate Human Mobility. InKDD ’20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Virtual Event, CA, USA, August 23-27, 2020, Rajesh Gupta, Yan Liu, Jiliang Tang, and B. Aditya Prakash (Eds.). ACM, 3426–3433. doi:10.1145/3394486.3412862 Source cod...

  36. [36]

    Rémi Flamary, Nicolas Courty, Alexandre Gramfort, Mokhtar Z Alaya, Aurélie Boisbunon, Stanislas Chambon, Laetitia Chapel, Adrien Corenflos, Kilian Fatras, Nemo Fournier, et al. 2021. Pot: Python optimal transport.Journal of Machine Learning Research22, 78 (2021), 1–8

  37. [37]

    A Stewart Fotheringham and David WS Wong. 1991. The modifiable areal unit problem in multivariate statistical analysis.Environment and planning A23, 7 (1991), 1025–1044

  38. [38]

    Lorenzo Franceschi-Bicchierai. 2015. Redditor cracks anonymous data trove to pinpoint Muslim cab drivers. Available: https://mashable.com/archive/redditor- muslim-cab-drivers

  39. [39]

    M Maurice Fréchet. 1906. Sur quelques points du calcul fonctionnel.Rendiconti del Circolo Matematico di Palermo (1884-1940)22, 1 (1906), 1–72

  40. [40]

    Matt Fredrikson, Somesh Jha, and Thomas Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. InPro- ceedings of the 22nd ACM SIGSAC conference on computer and communications security. 1322–1333

  41. [41]

    Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. 2014. Privacy in pharmacogenetics: An {End-to-End} case study of personalized warfarin dosing. In23rd USENIX security symposium (USENIX Security 14). 17–32

  42. [43]

    InProceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS

    Show me how you move and I will tell you who you are. InProceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS. 34–41

  43. [44]

    Sébastien Gambs, Marc-Olivier Killijian, and Miguel Núñez del Prado Cortez

  44. [45]

    InProceedings of the first workshop on measurement, privacy, and mobility

    Next place prediction using mobility markov chains. InProceedings of the first workshop on measurement, privacy, and mobility. 1–6

  45. [46]

    Georgi Ganev and Emiliano De Cristofaro. 2026. Rethinking Anonymity Claims in Synthetic Data Generation: A Model-Centric Privacy Attack Perspective. arXiv preprint arXiv:2601.22434(2026)

  46. [47]

    Karan Ganju, Qi Wang, Wei Yang, Carl A Gunter, and Nikita Borisov. 2018. Prop- erty inference attacks on fully connected neural networks using permutation invariant representations. InProceedings of the 2018 ACM SIGSAC conference on computer and communications security. 619–633

  47. [48]

    Qiang Gao, Fan Zhou, Kunpeng Zhang, Goce Trajcevski, Xucheng Luo, and Fengli Zhang. 2017. Identifying Human Mobility via Trajectory Embeddings.. InIJCAI, Vol. 17. 1689–1695

  48. [49]

    Soheila Ghane, Lars Kulik, and Kotagiri Ramamohanarao. 2019. TGM: A gen- erative mechanism for publishing trajectories with differential privacy.IEEE Internet of Things Journal7, 4 (2019), 2611–2621

  49. [50]

    Tilmann Gneiting and Adrian E Raftery. 2007. Strictly proper scoring rules, prediction, and estimation.Journal of the American statistical Association102, 477 (2007), 359–378

  50. [51]

    Marta C Gonzalez, Cesar A Hidalgo, and Albert-Laszlo Barabasi. 2008. Under- standing individual human mobility patterns.nature453, 7196 (2008), 779–782

  51. [52]

    Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2020. Generative adversarial networks.Commun. ACM63, 11 (2020), 139–144

  52. [53]

    Ian J Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde- Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets.Advances in neural information processing systems27 (2014)

  53. [54]

    Vincent Guan, Florent Guépin, Ana-Maria Cretu, and Yves-Alexandre de Mon- tjoye. 2024. A zero auxiliary knowledge membership inference attack on aggre- gate location data.arXiv preprint arXiv:2406.18671(2024)

  54. [55]

    Florent Guépin, Matthieu Meeus, Ana-Maria Creţu, and Yves-Alexandre de Mon- tjoye. 2023. Synthetic is all you need: removing the auxiliary data assumption for 13 membership inference attacks against synthetic data. InEuropean Symposium on Research in Computer Security. Springer, 182–198

  55. [56]

    Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron C Courville. 2017. Improved training of wasserstein gans.Advances in neural information processing systems30 (2017)

  56. [57]

    Xi He, Graham Cormode, Ashwin Machanavajjhala, Cecilia Procopiuc, and Divesh Srivastava. 2015. DPT: differentially private trajectory synthesis using hierarchical reference systems.Proceedings of the VLDB Endowment8, 11 (2015), 1154–1165

  57. [58]

    Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation9, 8 (1997), 1735–1780

  58. [59]

    Florimond Houssiau, James Jordon, Samuel N Cohen, Owen Daniel, Andrew Elliott, James Geddes, Callum Mole, Camila Rangel-Smith, and Lukasz Szpruch

  59. [60]

    TAPAS: a toolbox for adversarial privacy auditing of synthetic data.arXiv preprint arXiv:2211.06550(2022)

  60. [61]

    Klanderman, and William J Rucklidge

    Daniel P Huttenlocher, Gregory A. Klanderman, and William J Rucklidge. 2002. Comparing images using the Hausdorff distance.IEEE Transactions on pattern analysis and machine intelligence15, 9 (2002), 850–863

  61. [62]

    Fengmei Jin, Wen Hua, Matteo Francia, Pingfu Chao, Maria E Orlowska, and Xiaofang Zhou. 2022. A survey and experimental study on privacy-preserving trajectory data publishing.IEEE Transactions on Knowledge and Data Engineering 35, 6 (2022), 5577–5596

  62. [63]

    James Jordon, Jinsung Yoon, and Mihaela Van Der Schaar. 2018. PATE-GAN: Generating synthetic data with differential privacy guarantees. InInternational conference on learning representations

  63. [64]

    Zihan Kan, Luliang Tang, Mei-Po Kwan, Chang Ren, Dong Liu, and Qingquan Li. 2019. Traffic congestion analysis at the turn level using Taxis’ GPS trajectory data.Computers, Environment and Urban Systems74 (2019), 229–243

  64. [65]

    Alexandra Kapp, Julia Hansmeyer, and Helena Mihaljević. 2023. Generative models for synthetic urban mobility data: A systematic literature review.Comput. Surveys56, 4 (2023), 1–37

  65. [66]

    Maurice G Kendall. 1938. A new measure of rank correlation.Biometrika30, 1-2 (1938), 81–93

  66. [67]

    Nishant Kishore. 2021. Mobility data as a proxy for epidemic measures.Nature Computational Science1, 9 (2021), 567–568

  67. [68]

    Akim Kotelnikov, Dmitry Baranchuk, Ivan Rubachev, and Artem Babenko. 2023. Tabddpm: Modelling tabular data with diffusion models. InInternational Con- ference on Machine Learning. PMLR, 17564–17579

  68. [69]

    Vaibhav Kulkarni, Natasa Tagasovska, Thibault Vatter, and Benoit Garbinato

  69. [70]

    Generative models for simulating mobility trajectories.arXiv preprint arXiv:1811.12801(2018)

  70. [71]

    Wei Li, Wei Tao, Junyang Qiu, Xin Liu, Xingyu Zhou, and Zhisong Pan. 2019. Densely connected convolutional networks with attention LSTM for crowd flows prediction.IEEE Access7 (2019), 140488–140498

  71. [72]

    Miao Lin, Wen-Jing Hsu, and Zhuo Qi Lee. 2012. Predictability of individuals’ mobility with high-resolution positioning data. InProceedings of the 2012 ACM conference on ubiquitous computing. 381–390

  72. [73]

    Jianmiao Liu, Junyi Li, Yong Chen, Song Lian, Jiaqi Zeng, Maosi Geng, Sijing Zheng, Yinan Dong, Yan He, Pei Huang, et al . 2023. Multi-scale urban pas- senger transportation CO2 emission calculation platform for smart mobility management.Applied Energy331 (2023), 120407

  73. [74]

    Xi Liu, Hanzhou Chen, and Clio Andris. 2018. trajGANs : Using generative adversarial networks for geo-privacy protection of trajectory data ( Vision paper ).Location privacy and security workshop. https://api.semanticscholar. org/CorpusID:201653132

  74. [75]

    Yang Liu, Xuedong Yan, Yun Wang, Zhuo Yang, and Jiawei Wu. 2017. Grid mapping for spatial pattern analyses of recurrent urban traffic congestion based on taxi GPS sensing data.Sustainability9, 4 (2017), 533

  75. [76]

    Yin Lou, Chengyang Zhang, Yu Zheng, Xing Xie, Wei Wang, and Yan Huang

  76. [77]

    InProceedings of the 17th ACM SIGSPATIAL international conference on advances in geographic information systems

    Map-matching for low-sampling-rate GPS trajectories. InProceedings of the 17th ACM SIGSPATIAL international conference on advances in geographic information systems. 352–361

  77. [78]

    Thomas Louail, Maxime Lenormand, Oliva G Cantu Ros, Miguel Picornell, Ricardo Herranz, Enrique Frias-Martinez, José J Ramasco, and Marc Barthelemy

  78. [79]

    From mobile phone data to the spatial structure of cities.Scientific reports 4, 1 (2014), 5276

  79. [80]

    Pei-Hsuan Lu, Pang-Chieh Wang, and Chia-Mu Yu. 2019. Empirical evaluation on synthetic data generation with generative adversarial network. InProceedings of the 9th International Conference on Web Intelligence, Mining and Semantics. 1–6

  80. [81]

    Xin Lu, Erik Wetter, Nita Bharti, Andrew J Tatem, and Linus Bengtsson. 2013. Approaching the limit of predictability in human mobility.Scientific reports3, 1 (2013), 2923

Showing first 80 references.