Recognition: unknown
A Dual Perspective on Synthetic Trajectory Generators: Utility Framework and Privacy Vulnerabilities
Pith reviewed 2026-05-10 02:13 UTC · model grok-4.3
The pith
Generative models for synthetic human trajectories can leak membership information via a new inference attack, despite resisting user-linking, and a utility framework helps quantify their value.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
We introduce and apply a new framework for evaluating the utility of synthetic trajectory generators. We also provide evidence that privacy evaluation for these generators requires adversarial methods and propose a new membership inference attack against a subcategory of generative models that were considered private due to their resistance to the trajectory user-linking problem.
What carries the argument
The membership inference attack on generative models for trajectories, which determines if a given trajectory was part of the training set, combined with the utility framework that assesses how faithfully synthetic data represents original mobility patterns.
Load-bearing premise
The proposed membership inference attack works in practice against the targeted generative models for trajectories.
What would settle it
Demonstrating through experiments that the membership inference attack cannot reliably distinguish training trajectories from non-training ones at rates above chance would falsify the vulnerability claim.
Figures
read the original abstract
Human mobility data are used in numerous applications, ranging from public health to urban planning. Human mobility is inherently sensitive, as it can contain information such as religious beliefs and political affiliations. Historically, it has been proposed to modify the information using techniques such as aggregation, obfuscation, or noise addition, to adequately protect privacy and eliminate concerns. As these methods come at a great cost in utility, new methods leveraging development in generative models, were introduced. The extent to which such methods answer the privacy-utility trade-off remains an open problem. In this paper, we introduced a first step towards solving it, by the introduction and application of a new framework for utility evaluation. Furthermore, we provide evidence that privacy evaluation remains a great challenge to consider and that it should be tackled through adversarial evaluation in accordance with the current EU regulation. We propose a new membership inference attack against a subcategory of generative models, even though this subcategory was deemed private due to its resistance over the trajectory user-linking problem.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript introduces a new framework for evaluating the utility of synthetic trajectory generators from human mobility data and proposes a membership inference attack targeting a subcategory of generative models previously deemed private due to resistance to the trajectory user-linking problem. It argues that privacy evaluation requires adversarial approaches in accordance with EU regulations and positions the work as a first step toward resolving the privacy-utility trade-off.
Significance. If the utility framework advances evaluation beyond prior metrics and the membership inference attack demonstrates practical effectiveness with appropriate controls, the work would meaningfully contribute to assessing synthetic data generators for sensitive mobility applications in public health and urban planning. The focus on adversarial privacy testing aligns with regulatory expectations and could inform better design of generative models.
minor comments (3)
- The abstract would benefit from a concise statement of the datasets, baselines, or quantitative outcomes supporting the utility framework and attack effectiveness.
- Ensure consistent terminology throughout, particularly around 'trajectory user-linking problem' and the exact subcategory of generative models addressed.
- Add explicit comparisons in the utility framework section to established metrics to clarify incremental value.
Simulated Author's Rebuttal
We thank the referee for the positive assessment, recognition of the utility framework's advancement and the membership inference attack's practical relevance, and the recommendation for minor revision. We appreciate the alignment noted with regulatory expectations for adversarial privacy evaluation.
Circularity Check
No significant circularity identified
full rationale
The paper presents two main contributions—an empirical utility evaluation framework for synthetic trajectory generators and a new membership inference attack—as direct proposals without any visible derivation chain, equations, or self-referential reductions. The abstract and described full text frame these as incremental empirical advances rather than results forced by fitted parameters, self-citations, or ansatzes imported from prior author work. No load-bearing step reduces to its own inputs by construction, and the argument structure remains self-contained as standard empirical research.
Axiom & Free-Parameter Ledger
Forward citations
Cited by 1 Pith paper
-
diffGHOST: Diffusion based Generative Hedged Oblivious Synthetic Trajectories
diffGHOST is a conditional diffusion model that segments learned latent space to identify and mitigate memorization of critical trajectory samples, aiming to deliver privacy guarantees alongside data utility.
Reference graph
Works this paper leans on
-
[1]
2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Direc- tive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance). 88 pages. http://data.europa.eu/eli/reg/2...
2016
-
[2]
Osman Abul, Francesco Bonchi, and Mirco Nanni. 2008. Never walk alone: Uncertainty for anonymity in moving objects databases. In2008 IEEE 24th international conference on data engineering. Ieee, 376–385
2008
-
[3]
Helmut Alt and Michael Godau. 1995. Computing the Fréchet distance between two polygonal curves.International Journal of Computational Geometry & Applications5, 01n02 (1995), 75–91
1995
-
[4]
Meenatchi Sundaram Muthu Selva Annamalai, Andrea Gadotti, and Luc Rocher
-
[5]
In33rd USENIX Security Symposium (USENIX Security 24)
A linear reconstruction approach for attribute inference attacks against synthetic data. In33rd USENIX Security Symposium (USENIX Security 24). 2351– 2368
-
[6]
Martin Arjovsky and Léon Bottou. 2017. Towards principled methods for training generative adversarial networks (2017).arXiv preprint arXiv:1701.04862 (2017)
work page Pith review arXiv 2017
-
[7]
Martin Arjovsky, Soumith Chintala, and Léon Bottou. 2017. Wasserstein gen- erative adversarial networks. InInternational conference on machine learning. PMLR, 214–223
2017
-
[8]
Giuseppe Ateniese, Luigi V Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, and Giovanni Felici. 2015. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. International Journal of Security and Networks10, 3 (2015), 137–150
2015
-
[9]
Stefan Atev, Grant Miller, and Nikolaos P Papanikolopoulos. 2010. Clustering of vehicle trajectories.IEEE transactions on intelligent transportation systems11, 3 (2010), 647–657
2010
- [10]
-
[11]
Borja Balle, Giovanni Cherubin, and Jamie Hayes. 2022. Reconstructing training data with informed adversaries. In2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1138–1156
2022
-
[12]
Donald J Berndt and James Clifford. 1994. Using dynamic time warping to find patterns in time series. InProceedings of the 3rd international conference on knowledge discovery and data mining. 359–370
1994
-
[13]
James Biagioni and Jakob Eriksson. 2012. Inferring road maps from global positioning system traces: Survey and comparative evaluation.Transportation research record2291, 1 (2012), 61–71
2012
- [14]
-
[15]
Vincent Bindschaedler and Reza Shokri. 2016. Synthesizing plausible privacy- preserving location traces. In2016 IEEE symposium on security and privacy (SP). IEEE, 546–563
2016
-
[16]
2021.Utility Metrics for Differential Privacy: No One-Size- Fits-All
Claire McKay Bowen. 2021.Utility Metrics for Differential Privacy: No One-Size- Fits-All. https://www.nist.gov/blogs/cybersecurity-insights/utility-metrics- differential-privacy-no-one-size-fits-all
2021
-
[17]
Dirk Brockmann, Lars Hufnagel, and Theo Geisel. 2006. The scaling laws of human travel.Nature439, 7075 (2006), 462–465
2006
-
[18]
Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, and Salil S. Kanhere
-
[19]
SoK: Can Trajectory Generation Combine Privacy and Utility?Proc. Priv. Enhancing Technol.2024, 3 (2024), 75–93. doi:10.56553/POPETS-2024-0068
-
[20]
Ricardo JGB Campello, Davoud Moulavi, and Jörg Sander. 2013. Density-based clustering based on hierarchical density estimates. InPacific-Asia conference on knowledge discovery and data mining. Springer, 160–172
2013
-
[21]
Chu Cao and Mo Li. 2021. Generating Mobility Trajectories with Retained Data Utility. InKDD ’21: The 27th ACM SIGKDD Conference on Knowledge Discov- ery and Data Mining, Virtual Event, Singapore, August 14-18, 2021, Feida Zhu, Beng Chin Ooi, and Chunyan Miao (Eds.). ACM, 2610–2620. doi:10.1145/3447548. 3467158 Source code available at: https://github.com/...
-
[22]
Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, and Florian Tramer. 2022. Membership inference attacks from first principles. In 2022 IEEE symposium on security and privacy (SP). IEEE, 1897–1914
2022
-
[23]
Xinyu Chen, Jiajie Xu, Rui Zhou, Wei Chen, Junhua Fang, and Chengfei Liu
-
[24]
Trajvae: A variational autoencoder model for trajectory generation.Neu- rocomputing428 (2021), 332–339
2021
-
[25]
Chen Chu, Hengcai Zhang, Peixiao Wang, and Feng Lu. 2024. Simulating human mobility with a trajectory generation framework based on diffusion model.International Journal of Geographical Information Science38, 5 (2024), 847–878. Source code available at: https://github.com/chuchen2017/TrajGDM
2024
-
[26]
2015.Statistics for spatial data
Noel Cressie. 2015.Statistics for spatial data. John Wiley & Sons
2015
-
[27]
Ge Cui, Jun Luo, and Xin Wang. 2018. Personalized travel route recommendation using collaborative filtering based on GPS trajectories.International journal of digital earth11, 3 (2018), 284–307
2018
-
[28]
Teddy Cunningham, Graham Cormode, and Hakan Ferhatosmanoglu. 2021. Privacy-preserving synthetic location data in the real world. InProceedings of the 17th International Symposium on Spatial and Temporal Databases. 23–33
2021
-
[29]
Yves-Alexandre de Montjoye, César A Hidalgo, Michel Verleysen, and Vincent D Blondel. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific reports3, 1 (2013), 1376
2013
-
[30]
Josep Domingo-Ferrer and Rolando Trujillo-Rasua. 2012. Microaggregation-and permutation-based anonymization of movement data.Information Sciences208 (2012), 55–80
2012
-
[31]
Bowen Du, Hao Peng, Senzhang Wang, Md Zakirul Alam Bhuiyan, Lihong Wang, Qiran Gong, Lin Liu, and Jing Li. 2019. Deep irregular convolutional residual LSTM for urban traffic passenger flows prediction.IEEE Transactions on Intelligent Transportation Systems21, 3 (2019), 972–985
2019
- [32]
-
[33]
Ali Farzanehfar, Florimond Houssiau, and Yves-Alexandre de Montjoye. 2021. The risk of re-identification remains high even in country-scale location datasets. Patterns2, 3 (2021)
2021
-
[34]
Vitaly Feldman and Chiyuan Zhang. 2020. What neural networks memorize and why: Discovering the long tail via influence estimation.Advances in Neural Information Processing Systems33 (2020), 2881–2891
2020
-
[35]
Jie Feng, Zeyu Yang, Fengli Xu, Haisu Yu, Mudan Wang, and Yong Li. 2020. Learning to Simulate Human Mobility. InKDD ’20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Virtual Event, CA, USA, August 23-27, 2020, Rajesh Gupta, Yan Liu, Jiliang Tang, and B. Aditya Prakash (Eds.). ACM, 3426–3433. doi:10.1145/3394486.3412862 Source cod...
-
[36]
Rémi Flamary, Nicolas Courty, Alexandre Gramfort, Mokhtar Z Alaya, Aurélie Boisbunon, Stanislas Chambon, Laetitia Chapel, Adrien Corenflos, Kilian Fatras, Nemo Fournier, et al. 2021. Pot: Python optimal transport.Journal of Machine Learning Research22, 78 (2021), 1–8
2021
-
[37]
A Stewart Fotheringham and David WS Wong. 1991. The modifiable areal unit problem in multivariate statistical analysis.Environment and planning A23, 7 (1991), 1025–1044
1991
-
[38]
Lorenzo Franceschi-Bicchierai. 2015. Redditor cracks anonymous data trove to pinpoint Muslim cab drivers. Available: https://mashable.com/archive/redditor- muslim-cab-drivers
2015
-
[39]
M Maurice Fréchet. 1906. Sur quelques points du calcul fonctionnel.Rendiconti del Circolo Matematico di Palermo (1884-1940)22, 1 (1906), 1–72
1906
-
[40]
Matt Fredrikson, Somesh Jha, and Thomas Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. InPro- ceedings of the 22nd ACM SIGSAC conference on computer and communications security. 1322–1333
2015
-
[41]
Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. 2014. Privacy in pharmacogenetics: An {End-to-End} case study of personalized warfarin dosing. In23rd USENIX security symposium (USENIX Security 14). 17–32
2014
-
[43]
InProceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Show me how you move and I will tell you who you are. InProceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS. 34–41
-
[44]
Sébastien Gambs, Marc-Olivier Killijian, and Miguel Núñez del Prado Cortez
-
[45]
InProceedings of the first workshop on measurement, privacy, and mobility
Next place prediction using mobility markov chains. InProceedings of the first workshop on measurement, privacy, and mobility. 1–6
- [46]
-
[47]
Karan Ganju, Qi Wang, Wei Yang, Carl A Gunter, and Nikita Borisov. 2018. Prop- erty inference attacks on fully connected neural networks using permutation invariant representations. InProceedings of the 2018 ACM SIGSAC conference on computer and communications security. 619–633
2018
-
[48]
Qiang Gao, Fan Zhou, Kunpeng Zhang, Goce Trajcevski, Xucheng Luo, and Fengli Zhang. 2017. Identifying Human Mobility via Trajectory Embeddings.. InIJCAI, Vol. 17. 1689–1695
2017
-
[49]
Soheila Ghane, Lars Kulik, and Kotagiri Ramamohanarao. 2019. TGM: A gen- erative mechanism for publishing trajectories with differential privacy.IEEE Internet of Things Journal7, 4 (2019), 2611–2621
2019
-
[50]
Tilmann Gneiting and Adrian E Raftery. 2007. Strictly proper scoring rules, prediction, and estimation.Journal of the American statistical Association102, 477 (2007), 359–378
2007
-
[51]
Marta C Gonzalez, Cesar A Hidalgo, and Albert-Laszlo Barabasi. 2008. Under- standing individual human mobility patterns.nature453, 7196 (2008), 779–782
2008
-
[52]
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2020. Generative adversarial networks.Commun. ACM63, 11 (2020), 139–144
2020
-
[53]
Ian J Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde- Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets.Advances in neural information processing systems27 (2014)
2014
- [54]
-
[55]
Florent Guépin, Matthieu Meeus, Ana-Maria Creţu, and Yves-Alexandre de Mon- tjoye. 2023. Synthetic is all you need: removing the auxiliary data assumption for 13 membership inference attacks against synthetic data. InEuropean Symposium on Research in Computer Security. Springer, 182–198
2023
-
[56]
Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron C Courville. 2017. Improved training of wasserstein gans.Advances in neural information processing systems30 (2017)
2017
-
[57]
Xi He, Graham Cormode, Ashwin Machanavajjhala, Cecilia Procopiuc, and Divesh Srivastava. 2015. DPT: differentially private trajectory synthesis using hierarchical reference systems.Proceedings of the VLDB Endowment8, 11 (2015), 1154–1165
2015
-
[58]
Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation9, 8 (1997), 1735–1780
1997
-
[59]
Florimond Houssiau, James Jordon, Samuel N Cohen, Owen Daniel, Andrew Elliott, James Geddes, Callum Mole, Camila Rangel-Smith, and Lukasz Szpruch
- [60]
-
[61]
Klanderman, and William J Rucklidge
Daniel P Huttenlocher, Gregory A. Klanderman, and William J Rucklidge. 2002. Comparing images using the Hausdorff distance.IEEE Transactions on pattern analysis and machine intelligence15, 9 (2002), 850–863
2002
-
[62]
Fengmei Jin, Wen Hua, Matteo Francia, Pingfu Chao, Maria E Orlowska, and Xiaofang Zhou. 2022. A survey and experimental study on privacy-preserving trajectory data publishing.IEEE Transactions on Knowledge and Data Engineering 35, 6 (2022), 5577–5596
2022
-
[63]
James Jordon, Jinsung Yoon, and Mihaela Van Der Schaar. 2018. PATE-GAN: Generating synthetic data with differential privacy guarantees. InInternational conference on learning representations
2018
-
[64]
Zihan Kan, Luliang Tang, Mei-Po Kwan, Chang Ren, Dong Liu, and Qingquan Li. 2019. Traffic congestion analysis at the turn level using Taxis’ GPS trajectory data.Computers, Environment and Urban Systems74 (2019), 229–243
2019
-
[65]
Alexandra Kapp, Julia Hansmeyer, and Helena Mihaljević. 2023. Generative models for synthetic urban mobility data: A systematic literature review.Comput. Surveys56, 4 (2023), 1–37
2023
-
[66]
Maurice G Kendall. 1938. A new measure of rank correlation.Biometrika30, 1-2 (1938), 81–93
1938
-
[67]
Nishant Kishore. 2021. Mobility data as a proxy for epidemic measures.Nature Computational Science1, 9 (2021), 567–568
2021
-
[68]
Akim Kotelnikov, Dmitry Baranchuk, Ivan Rubachev, and Artem Babenko. 2023. Tabddpm: Modelling tabular data with diffusion models. InInternational Con- ference on Machine Learning. PMLR, 17564–17579
2023
-
[69]
Vaibhav Kulkarni, Natasa Tagasovska, Thibault Vatter, and Benoit Garbinato
- [70]
-
[71]
Wei Li, Wei Tao, Junyang Qiu, Xin Liu, Xingyu Zhou, and Zhisong Pan. 2019. Densely connected convolutional networks with attention LSTM for crowd flows prediction.IEEE Access7 (2019), 140488–140498
2019
-
[72]
Miao Lin, Wen-Jing Hsu, and Zhuo Qi Lee. 2012. Predictability of individuals’ mobility with high-resolution positioning data. InProceedings of the 2012 ACM conference on ubiquitous computing. 381–390
2012
-
[73]
Jianmiao Liu, Junyi Li, Yong Chen, Song Lian, Jiaqi Zeng, Maosi Geng, Sijing Zheng, Yinan Dong, Yan He, Pei Huang, et al . 2023. Multi-scale urban pas- senger transportation CO2 emission calculation platform for smart mobility management.Applied Energy331 (2023), 120407
2023
-
[74]
Xi Liu, Hanzhou Chen, and Clio Andris. 2018. trajGANs : Using generative adversarial networks for geo-privacy protection of trajectory data ( Vision paper ).Location privacy and security workshop. https://api.semanticscholar. org/CorpusID:201653132
2018
-
[75]
Yang Liu, Xuedong Yan, Yun Wang, Zhuo Yang, and Jiawei Wu. 2017. Grid mapping for spatial pattern analyses of recurrent urban traffic congestion based on taxi GPS sensing data.Sustainability9, 4 (2017), 533
2017
-
[76]
Yin Lou, Chengyang Zhang, Yu Zheng, Xing Xie, Wei Wang, and Yan Huang
-
[77]
InProceedings of the 17th ACM SIGSPATIAL international conference on advances in geographic information systems
Map-matching for low-sampling-rate GPS trajectories. InProceedings of the 17th ACM SIGSPATIAL international conference on advances in geographic information systems. 352–361
-
[78]
Thomas Louail, Maxime Lenormand, Oliva G Cantu Ros, Miguel Picornell, Ricardo Herranz, Enrique Frias-Martinez, José J Ramasco, and Marc Barthelemy
-
[79]
From mobile phone data to the spatial structure of cities.Scientific reports 4, 1 (2014), 5276
2014
-
[80]
Pei-Hsuan Lu, Pang-Chieh Wang, and Chia-Mu Yu. 2019. Empirical evaluation on synthetic data generation with generative adversarial network. InProceedings of the 9th International Conference on Web Intelligence, Mining and Semantics. 1–6
2019
-
[81]
Xin Lu, Erik Wetter, Nita Bharti, Andrew J Tatem, and Linus Bengtsson. 2013. Approaching the limit of predictability in human mobility.Scientific reports3, 1 (2013), 2923
2013
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.