no code implementations • 28 Oct 2023 • Kunlin Cai, Jinghuai Zhang, Will Shand, Zhiqing Hong, Guang Wang, Desheng Zhang, Jianfeng Chi, Yuan Tian
These attacks in our attack suite assume different adversary knowledge and aim to extract different types of sensitive information from mobility data, providing a holistic privacy risk assessment for POI recommendation models.
no code implementations • 10 Feb 2020 • Will Shand, Stephen Becker
We discuss the problem of performing similarity search over function spaces.