Privacy Evaluation of Generative Models for Trajectory Generation
Pith reviewed 2026-05-19 16:17 UTC · model grok-4.3
The pith
Generative models do not guarantee privacy for synthetic trajectory data
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Although generative models for trajectory data are assumed to preserve privacy by producing synthetic outputs, this does not hold in practice as membership inference attacks can successfully determine membership of individual trajectories in the training set.
What carries the argument
Membership inference attacks used as an evaluation tool to measure privacy leakage in generative models trained on trajectory datasets.
If this is right
- Privacy evaluation using attacks should be included when developing generative trajectory models.
- Synthetic data from these models may still pose risks to individual privacy in mobility analysis.
- The generative nature alone is not sufficient to eliminate privacy concerns in trajectory generation.
Where Pith is reading between the lines
- Similar privacy evaluation approaches could be tested on generative models for other types of sensitive sequential data.
- Integrating privacy-preserving techniques like differential privacy with these generative models might address the identified risks.
- Urban planners relying on synthetic trajectories should verify privacy guarantees beyond the generation method itself.
Load-bearing premise
Standard membership inference attacks work effectively on trajectory data without special adjustments for its spatial and temporal characteristics.
What would settle it
A demonstration that membership inference attacks fail to outperform random guessing on these generative trajectory models would disprove the existence of privacy leakage.
read the original abstract
Trajectory data is fundamental to modern urban intelligence, yet its sensitivity raises significant privacy concerns. Generative models such as Generative Adversarial Networks, Variational Autoencoders, and Diffusion Models have been developed to generate realistic synthetic trajectory data by capturing underlying spatiotemporal distributions and mobility patterns. Although these models are often assumed to preserve privacy due to their generative nature, this assumption does not necessarily hold. In this work, we investigate the intersection of generative trajectory modeling and privacy evaluation. By identifying applicable empirical methods for assessing privacy preservation in trajectory generation tasks, we demonstrate a significant gap in the evaluation of privacy for generative trajectory models. Motivated by this gap, we implement Membership Inference Attacks against representative models, demonstrating the feasibility of using such empirical privacy evaluation methods and showing that their generative nature does not eliminate privacy risks.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper claims that generative models (GANs, VAEs, Diffusion Models) for synthetic trajectory data are often assumed to preserve privacy due to their generative nature, but this assumption does not hold. It identifies a gap in privacy evaluation methods for trajectory generation tasks and demonstrates the feasibility of Membership Inference Attacks (MIA) on representative models, concluding that generative modeling does not eliminate privacy risks.
Significance. If the reported MIA results hold after controlling for confounding factors, the work would be significant for challenging privacy assumptions in mobility data synthesis and for motivating empirical privacy audits in urban intelligence applications. It could help shift evaluation practices away from reliance on generative properties alone.
major comments (2)
- [Abstract] Abstract: The central claim of successful attacks and a demonstrated gap rests on feasibility of MIA, yet the abstract supplies no methodological details, quantitative results, baselines, or error analysis. This leaves the data unable to verify support for the claim that generative nature does not eliminate privacy risks.
- [Experimental section] Experimental section: The reported MIA success may reflect memorization, limited model capacity, small training sets, or trajectory-specific spatiotemporal autocorrelation rather than properties of the generative modeling process itself. Without ablations (e.g., comparison to non-generative baselines, shuffled-data controls, or capacity-matched models), the result does not establish a general privacy leakage risk across generative trajectory approaches.
minor comments (2)
- [Methodology] Clarify the exact MIA implementation details, including attack model architecture, training procedure, and success metrics (e.g., precision-recall or AUC), to allow reproducibility.
- [Introduction] Add explicit definitions or references for the 'representative models' chosen and the trajectory datasets used, including any preprocessing steps that might introduce correlations.
Simulated Author's Rebuttal
We thank the referee for the constructive feedback on our manuscript. We address each major comment below and have revised the paper to strengthen the presentation of our results and controls.
read point-by-point responses
-
Referee: [Abstract] Abstract: The central claim of successful attacks and a demonstrated gap rests on feasibility of MIA, yet the abstract supplies no methodological details, quantitative results, baselines, or error analysis. This leaves the data unable to verify support for the claim that generative nature does not eliminate privacy risks.
Authors: We agree that the abstract would be strengthened by including key quantitative results and methodological highlights. In the revised version we have updated the abstract to report representative MIA success rates (with standard deviations), the specific attack methodology employed, and the main baseline comparisons used in the experiments. revision: yes
-
Referee: [Experimental section] Experimental section: The reported MIA success may reflect memorization, limited model capacity, small training sets, or trajectory-specific spatiotemporal autocorrelation rather than properties of the generative modeling process itself. Without ablations (e.g., comparison to non-generative baselines, shuffled-data controls, or capacity-matched models), the result does not establish a general privacy leakage risk across generative trajectory approaches.
Authors: The referee correctly notes that additional controls are needed to isolate effects of the generative process. While our original experiments already used standard-capacity models and realistic dataset sizes drawn from the literature, we acknowledge the value of explicit ablations. The revised manuscript now includes (i) comparisons against non-generative baselines, (ii) shuffled-trajectory controls to assess autocorrelation, and (iii) capacity-matched model variants. These additions support that the observed leakage is not solely attributable to the factors listed. revision: yes
Circularity Check
No significant circularity in empirical MIA evaluation of trajectory generators
full rationale
The paper conducts an empirical study by applying standard Membership Inference Attacks to representative generative models (GANs, VAEs, Diffusion) for trajectory data. The central claim—that generative nature does not eliminate privacy risks—is supported directly by reported attack success rates on chosen models rather than by any derivation, equation, or self-referential construction. No load-bearing steps reduce to fitted parameters, self-citations, or ansatzes; the work identifies a gap in prior evaluation and fills it with experiments. This is a self-contained empirical demonstration against external benchmarks with no circular reduction.
Axiom & Free-Parameter Ledger
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We implement Membership Inference Attacks against representative models... discriminator-based MIA on GAN-based Trajectory Models... loss-based MIA on Diffusion-based Trajectory Models
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
AUC-ROC measures the probability that the attack assigns a higher membership score...
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
Unique in the crowd: The privacy bounds of human mobility,
Y .-A. De Montjoye, C. A. Hidalgo, M. Verleysen, and V . D. Blondel, “Unique in the crowd: The privacy bounds of human mobility,”Scientific reports, vol. 3, no. 1, p. 1376, 2013
work page 2013
-
[2]
Trajectory generation: a survey on methods and techniques,
X. Chen, C. Huang, C. Wang, and L. Chen, “Trajectory generation: a survey on methods and techniques,”GeoInformatica, vol. 29, no. 3, pp. 351–376, 2025
work page 2025
-
[3]
The secret sharer: Evaluating and testing unintended memorization in neural net- works,
N. Carlini, C. Liu, Ú. Erlingsson, J. Kos, and D. Song, “The secret sharer: Evaluating and testing unintended memorization in neural net- works,” in28th USENIX security symposium (USENIX security 19), 2019, pp. 267–284
work page 2019
-
[4]
Sok: Can trajectory generation combine privacy and utility?
E. Buchholz, A. Abuadbba, S. Wang, S. Nepal, and S. S. Kanhere, “Sok: Can trajectory generation combine privacy and utility?”arXiv preprint arXiv:2403.07218, 2024
-
[5]
Mobility trajectory generation: a survey,
X. Kong, Q. Chen, M. Hou, H. Wang, and F. Xia, “Mobility trajectory generation: a survey,”Artificial Intelligence Review, vol. 56, no. Suppl 3, pp. 3057–3098, 2023
work page 2023
-
[6]
Auto-Encoding Variational Bayes
D. P. Kingma and M. Welling, “Auto-encoding variational bayes,”arXiv preprint arXiv:1312.6114, 2013
work page internal anchor Pith review Pith/arXiv arXiv 2013
-
[7]
Generative adversarial networks,
I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y . Bengio, “Generative adversarial networks,” Communications of the ACM, vol. 63, no. 11, pp. 139–144, 2020
work page 2020
-
[8]
Deep unsupervised learning using nonequilibrium thermodynamics,
J. Sohl-Dickstein, E. Weiss, N. Maheswaranathan, and S. Ganguli, “Deep unsupervised learning using nonequilibrium thermodynamics,” in International conference on machine learning. pmlr, 2015, pp. 2256– 2265
work page 2015
-
[9]
Denoising diffusion probabilistic models,
J. Ho, A. Jain, and P. Abbeel, “Denoising diffusion probabilistic models,” Advances in neural information processing systems, vol. 33, pp. 6840– 6851, 2020
work page 2020
-
[10]
Score-Based Generative Modeling through Stochastic Differential Equations
Y . Song, J. Sohl-Dickstein, D. P. Kingma, A. Kumar, S. Ermon, and B. Poole, “Score-based generative modeling through stochastic differ- ential equations,”arXiv preprint arXiv:2011.13456, 2020
work page internal anchor Pith review Pith/arXiv arXiv 2011
-
[11]
Denoising Diffusion Implicit Models
J. Song, C. Meng, and S. Ermon, “Denoising diffusion implicit models,” arXiv preprint arXiv:2010.02502, 2020
work page internal anchor Pith review Pith/arXiv arXiv 2010
-
[12]
A survey and experimental study on privacy-preserving trajectory data publishing,
F. Jin, W. Hua, M. Francia, P. Chao, M. E. Orlowska, and X. Zhou, “A survey and experimental study on privacy-preserving trajectory data publishing,”IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 6, pp. 5577–5596, 2022
work page 2022
-
[13]
À. Miranda-Pascual, P. Guerra-Balboa, J. Parra-Arnau, J. Forné, and T. Strufe, “An overview of proposals towards the privacy-preserving publication of trajectory data: À. miranda-pascual et al.”International journal of information security, pp. 1–37, 2024
work page 2024
-
[14]
A survey of privacy attacks in machine learning,
M. Rigaki and S. Garcia, “A survey of privacy attacks in machine learning,”ACM Computing Surveys, vol. 56, no. 4, pp. 1–34, 2023
work page 2023
-
[15]
Membership inference attacks against machine learning models,
R. Shokri, M. Stronati, C. Song, and V . Shmatikov, “Membership inference attacks against machine learning models,” in2017 IEEE symposium on security and privacy (SP). IEEE, 2017, pp. 3–18
work page 2017
-
[16]
Privacy in pharmacogenetics: An{End-to-End}case study of person- alized warfarin dosing,
M. Fredrikson, E. Lantz, S. Jha, S. Lin, D. Page, and T. Ristenpart, “Privacy in pharmacogenetics: An{End-to-End}case study of person- alized warfarin dosing,” in23rd USENIX security symposium (USENIX Security 14), 2014, pp. 17–32
work page 2014
-
[17]
Model inversion attacks that exploit confidence information and basic countermeasures,
M. Fredrikson, S. Jha, and T. Ristenpart, “Model inversion attacks that exploit confidence information and basic countermeasures,” in Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, 2015, pp. 1322–1333
work page 2015
-
[18]
G. Ateniese, L. V . Mancini, A. Spognardi, A. Villani, D. Vitali, and G. Felici, “Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers,”International Jour- nal of Security and Networks, vol. 10, no. 3, pp. 137–150, 2015
work page 2015
-
[19]
Stealing machine learning models via prediction{APIs},
F. Tramèr, F. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart, “Stealing machine learning models via prediction{APIs},” in25th USENIX security symposium (USENIX Security 16), 2016, pp. 601–618
work page 2016
-
[20]
Calibrating noise to sensitivity in private data analysis,
C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” inTheory of cryptography conference. Springer, 2006, pp. 265–284
work page 2006
-
[21]
The algorithmic foundations of differential privacy,
C. Dwork and A. Roth, “The algorithmic foundations of differential privacy,”Foundations and trends® in theoretical computer science, vol. 9, no. 3-4, pp. 211–487, 2014
work page 2014
-
[22]
Deep learning with differential privacy,
M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, “Deep learning with differential privacy,” in Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, 2016, pp. 308–318
work page 2016
-
[23]
How to dp- fy ml: A practical guide to machine learning with differential privacy,
N. Ponomareva, H. Hazimeh, A. Kurakin, Z. Xu, C. Denison, H. B. McMahan, S. Vassilvitskii, S. Chien, and A. G. Thakurta, “How to dp- fy ml: A practical guide to machine learning with differential privacy,” Journal of Artificial Intelligence Research, vol. 77, pp. 1113–1201, 2023
work page 2023
-
[24]
Sok: Differentially private publication of trajectory data,
À. Miranda-Pascual, P. Guerra-Balboa, J. Parra-Arnau, J. Forné, and T. Strufe, “Sok: Differentially private publication of trajectory data,” Proceedings on privacy enhancing technologies, 2023
work page 2023
-
[25]
Re- construction attack on differential private trajectory protection mecha- nisms,
E. Buchholz, A. Abuadbba, S. Wang, S. Nepal, and S. S. Kanhere, “Re- construction attack on differential private trajectory protection mecha- nisms,” inProceedings of the 38th annual computer security applications conference, 2022, pp. 279–292
work page 2022
-
[26]
Publishing trajectories with differential privacy guarantees,
K. Jiang, D. Shao, S. Bressan, T. Kister, and K.-L. Tan, “Publishing trajectories with differential privacy guarantees,” inProceedings of the 25th International conference on scientific and statistical database management, 2013, pp. 1–12
work page 2013
-
[27]
Deep learning-based privacy-preserving framework for synthetic trajectory generation,
J. W. Kim and B. Jang, “Deep learning-based privacy-preserving framework for synthetic trajectory generation,”Journal of Network and Computer Applications, vol. 206, p. 103459, 2022
work page 2022
-
[28]
Geo-indistinguishability: Differential privacy for location-based sys- tems,
M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, “Geo-indistinguishability: Differential privacy for location-based sys- tems,” inProceedings of the 2013 ACM SIGSAC conference on Com- puter & communications security, 2013, pp. 901–914
work page 2013
-
[29]
Identifying human mobility via trajectory embeddings
Q. Gao, F. Zhou, K. Zhang, G. Trajcevski, X. Luo, and F. Zhang, “Identifying human mobility via trajectory embeddings.” inIjcai, vol. 17, 2017, pp. 1689–1695
work page 2017
-
[30]
Trajectory-based spatiotemporal entity linking,
F. Jin, W. Hua, T. Zhou, J. Xu, M. Francia, M. E. Orlowska, and X. Zhou, “Trajectory-based spatiotemporal entity linking,”IEEE Transactions on Knowledge and Data Engineering, vol. 34, no. 9, pp. 4499–4513, 2020
work page 2020
-
[31]
Structured sparsity model based trajectory tracking using private location data release,
M. Shao, J. Li, Q. Yan, F. Chen, H. Huang, and X. Chen, “Structured sparsity model based trajectory tracking using private location data release,”IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 6, pp. 2983–2995, 2020
work page 2020
-
[32]
R. Shokri, G. Theodorakopoulos, J.-Y . Le Boudec, and J.-P. Hubaux, “Quantifying location privacy,” in2011 IEEE symposium on security and privacy. IEEE, 2011, pp. 247–262
work page 2011
-
[33]
Dp-ltgan: Differentially private trajectory publishing via locally-aware transformer- based gan,
R. Zhang, W. Ni, N. Fu, L. Hou, D. Zhang, and Y . Zhang, “Dp-ltgan: Differentially private trajectory publishing via locally-aware transformer- based gan,”Future Generation Computer Systems, vol. 166, p. 107686, 2025
work page 2025
-
[34]
T. M. Cover,Elements of information theory. John Wiley & Sons, 1999
work page 1999
-
[35]
Lstm-trajgan: A deep learning approach to trajectory privacy protection,
J. Rao, S. Gao, Y . Kang, and Q. Huang, “Lstm-trajgan: A deep learning approach to trajectory privacy protection,”arXiv preprint arXiv:2006.10521, 2020
-
[36]
Lgan-dp: A novel differential private publication mechanism of trajectory data,
Z. Zhang, X. Xu, and F. Xiao, “Lgan-dp: A novel differential private publication mechanism of trajectory data,”Future Generation Computer Systems, vol. 141, pp. 692–703, 2023
work page 2023
-
[37]
Dp-trajgan: A privacy-aware trajectory generation model with differential privacy,
J. Zhang, Q. Huang, Y . Huang, Q. Ding, and P.-W. Tsai, “Dp-trajgan: A privacy-aware trajectory generation model with differential privacy,” Future Generation Computer Systems, vol. 142, pp. 25–40, 2023
work page 2023
-
[38]
Learning to simulate human mobility,
J. Feng, Z. Yang, F. Xu, H. Yu, M. Wang, and Y . Li, “Learning to simulate human mobility,” inProceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining, 2020, pp. 3426–3433
work page 2020
-
[39]
Difftraj: Generating gps trajectory with diffusion probabilistic model,
Y . Zhu, Y . Ye, S. Zhang, X. Zhao, and J. Yu, “Difftraj: Generating gps trajectory with diffusion probabilistic model,”Advances in Neural Information Processing Systems, vol. 36, pp. 65 168–65 188, 2023
work page 2023
-
[40]
Diff-rntraj: A structure-aware diffusion model for road network- constrained trajectory generation,
T. Wei, Y . Lin, S. Guo, Y . Lin, Y . Huang, C. Xiang, Y . Bai, and H. Wan, “Diff-rntraj: A structure-aware diffusion model for road network- constrained trajectory generation,”IEEE Transactions on Knowledge and Data Engineering, vol. 36, no. 12, pp. 7940–7953, 2024
work page 2024
-
[41]
Gan-leaks: A taxonomy of membership inference attacks against generative models,
D. Chen, N. Yu, Y . Zhang, and M. Fritz, “Gan-leaks: A taxonomy of membership inference attacks against generative models,” inPro- ceedings of the 2020 ACM SIGSAC conference on computer and communications security, 2020, pp. 343–362
work page 2020
-
[42]
Membership inference attacks from first principles,
N. Carlini, S. Chien, M. Nasr, S. Song, A. Terzis, and F. Tramer, “Membership inference attacks from first principles,” in2022 IEEE symposium on security and privacy (SP). IEEE, 2022, pp. 1897–1914
work page 2022
-
[43]
Privacy risk in machine learning: Analyzing the connection to overfitting,
S. Yeom, I. Giacomelli, M. Fredrikson, and S. Jha, “Privacy risk in machine learning: Analyzing the connection to overfitting,” in2018 IEEE 31st computer security foundations symposium (CSF). IEEE, 2018, pp. 268–282
work page 2018
-
[44]
Membership inference attacks against diffusion models,
T. Matsumoto, T. Miura, and N. Yanai, “Membership inference attacks against diffusion models,” in2023 IEEE Security and Privacy Workshops (SPW). IEEE, 2023, pp. 77–83
work page 2023
-
[45]
Membership inference of diffusion models,
H. Hu and J. Pang, “Membership inference of diffusion models,”arXiv preprint arXiv:2301.09956, 2023
-
[46]
Modeling user activity preference by leveraging user spatial temporal characteristics in lbsns,
D. Yang, D. Zhang, V . W. Zheng, and Z. Yu, “Modeling user activity preference by leveraging user spatial temporal characteristics in lbsns,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 45, no. 1, pp. 129–142, 2014
work page 2014
-
[47]
L. May Petry, C. Leite Da Silva, A. Esuli, C. Renso, and V . Bogorny, “Marc: a robust method for multiple-aspect trajectory classification via space, time, and semantic embeddings,”International Journal of Geographical Information Science, vol. 34, no. 7, pp. 1428–1450, 2020
work page 2020
-
[48]
Geolife: A collaborative social networking service among user, location and trajectory
Y . Zheng, X. Xie, W.-Y . Maet al., “Geolife: A collaborative social networking service among user, location and trajectory.”IEEE Data Eng. Bull., vol. 33, no. 2, pp. 32–39, 2010
work page 2010
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.