{"id":"https://openalex.org/W3123323077","doi":"https://doi.org/10.1109/globecom42002.2020.9322357","title":"Adversity-Based Social Circles Inference via Context-Aware Mobility","display_name":"Adversity-Based Social Circles Inference via Context-Aware Mobility","publication_year":2020,"publication_date":"2020-12-01","ids":{"openalex":"https://openalex.org/W3123323077","doi":"https://doi.org/10.1109/globecom42002.2020.9322357","mag":"3123323077"},"language":"en","primary_location":{"id":"doi:10.1109/globecom42002.2020.9322357","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom42002.2020.9322357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2020 - 2020 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048618271","display_name":"Qiang Gao","orcid":"https://orcid.org/0000-0002-9621-5414"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiang Gao","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100403505","display_name":"Fan Zhou","orcid":"https://orcid.org/0000-0002-8038-8150"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhou","raw_affiliation_strings":["University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086447943","display_name":"Goce Trajcevski","orcid":"https://orcid.org/0000-0002-8839-6278"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Goce Trajcevski","raw_affiliation_strings":["Iowa State University, Ames, USA"],"affiliations":[{"raw_affiliation_string":"Iowa State University, Ames, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076831677","display_name":"Fengli Zhang","orcid":"https://orcid.org/0000-0003-2300-8817"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengli Zhang","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046991896","display_name":"Xucheng Luo","orcid":"https://orcid.org/0000-0002-3407-9242"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xucheng Luo","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, China","institution_ids":["https://openalex.org/I4210126530"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5048618271"],"corresponding_institution_ids":["https://openalex.org/I4210126530"],"apc_list":null,"apc_paid":null,"fwci":0.5126,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.77660846,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11980","display_name":"Human Mobility and Location-Based Analysis","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11980","display_name":"Human Mobility and Location-Based Analysis","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11344","display_name":"Traffic Prediction and Management Techniques","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/2215","display_name":"Building and Construction"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7872788906097412},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.7621479034423828},{"id":"https://openalex.org/keywords/trajectory","display_name":"Trajectory","score":0.7053543329238892},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5634419918060303},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5035099387168884},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.494718998670578},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47358280420303345},{"id":"https://openalex.org/keywords/mobility-model","display_name":"Mobility model","score":0.4624853730201721},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43904614448547363},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4334118366241455},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39934033155441284},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3518502414226532},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2819727659225464},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18907326459884644},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.11427918076515198}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7872788906097412},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.7621479034423828},{"id":"https://openalex.org/C13662910","wikidata":"https://www.wikidata.org/wiki/Q193139","display_name":"Trajectory","level":2,"score":0.7053543329238892},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5634419918060303},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5035099387168884},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.494718998670578},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47358280420303345},{"id":"https://openalex.org/C191485582","wikidata":"https://www.wikidata.org/wiki/Q6887309","display_name":"Mobility model","level":2,"score":0.4624853730201721},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43904614448547363},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4334118366241455},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39934033155441284},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3518502414226532},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2819727659225464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18907326459884644},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.11427918076515198},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom42002.2020.9322357","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom42002.2020.9322357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2020 - 2020 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.7699999809265137,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G1907895590","display_name":null,"funder_award_id":"2020YFG0053,2020YFQ0018,2018GZ0087,2019YJ0543","funder_id":"https://openalex.org/F4320322922","funder_display_name":"Department of Science and Technology of Sichuan Province"},{"id":"https://openalex.org/G4292040920","display_name":null,"funder_award_id":"CNS 1646107","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7348718317","display_name":null,"funder_award_id":"201906070095","funder_id":"https://openalex.org/F4320322725","funder_display_name":"China Scholarship Council"},{"id":"https://openalex.org/G7380578634","display_name":null,"funder_award_id":"61602097,61802033","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"},{"id":"https://openalex.org/F4320322922","display_name":"Department of Science and Technology of Sichuan Province","ror":"https://ror.org/04323m874"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1614298861","https://openalex.org/W1959608418","https://openalex.org/W2064675550","https://openalex.org/W2071702404","https://openalex.org/W2099471712","https://openalex.org/W2110953678","https://openalex.org/W2472954632","https://openalex.org/W2605021547","https://openalex.org/W2616145386","https://openalex.org/W2620163154","https://openalex.org/W2741206673","https://openalex.org/W2742032966","https://openalex.org/W2783127637","https://openalex.org/W2808113502","https://openalex.org/W2897730209","https://openalex.org/W2901471513","https://openalex.org/W2905432015","https://openalex.org/W2911485121","https://openalex.org/W2911662370","https://openalex.org/W2911826336","https://openalex.org/W2913696151","https://openalex.org/W2950577311","https://openalex.org/W2963746531","https://openalex.org/W2971198513","https://openalex.org/W4256545681","https://openalex.org/W4320013936","https://openalex.org/W6636510571","https://openalex.org/W6640963894","https://openalex.org/W6736095516","https://openalex.org/W6745535286"],"related_works":["https://openalex.org/W2554282488","https://openalex.org/W4323768008","https://openalex.org/W1941703695","https://openalex.org/W4248382324","https://openalex.org/W3131574667","https://openalex.org/W4360995134","https://openalex.org/W3112412180","https://openalex.org/W3023605104","https://openalex.org/W2039473718","https://openalex.org/W2387529410"],"abstract_inverted_index":{"The":[0],"ubiquity":[1],"of":[2,10,80],"mobile":[3],"devices":[4],"use":[5],"has":[6,54],"generated":[7],"huge":[8],"volumes":[9],"location-aware":[11],"contextual":[12,82,136],"data,":[13,53],"providing":[14],"opportunities":[15],"enriching":[16],"various":[17],"location-based":[18],"social":[19,35,44],"network":[20],"(LBSN)":[21],"applications":[22],"-":[23],"e.g.,":[24],"trip":[25],"recommendation,":[26],"ride-sharing":[27],"allocation":[28],"and":[29,98,173],"taxi":[30],"demand":[31],"prediction":[32],"etc.":[33],"Trajectory-based":[34],"circle":[36],"inference":[37],"(TSCI),":[38],"which":[39,163],"aims":[40],"at":[41],"inferring":[42],"the":[43,50,90,102,124,135,154,169,192],"relationships":[45],"among":[46],"users":[47],"based":[48],"on":[49,180],"human":[51],"mobility":[52,104,171,182],"received":[55],"great":[56],"attention":[57],"in":[58,65,84,93],"recent":[59],"years":[60],"due":[61],"to":[62,100,122,166],"its":[63],"importance":[64],"many":[66],"LBSN":[67],"applications.":[68],"However,":[69],"existing":[70],"solutions":[71],"suffer":[72],"from":[73],"three":[74],"key":[75],"challenges,":[76],"including":[77],"(1)":[78],"lack":[79],"modeling":[81],"feature":[83],"user":[85,94,170],"check-ins;":[86],"(2)":[87],"cannot":[88],"capture":[89],"structural":[91],"information":[92,137],"motion":[95],"patterns;":[96],"(3)":[97],"fail":[99],"consider":[101],"underlying":[103],"distribution.":[105,176],"In":[106],"this":[107],"paper,":[108],"we":[109],"propose":[110],"a":[111,129],"novel":[112],"framework":[113],"ASCI-CAM":[114,127],"(Adversity-based":[115],"Social":[116],"Circles":[117],"Inference":[118],"via":[119],"Context-Aware":[120],"Mobility)":[121],"address":[123],"above":[125],"challenges.":[126],"is":[128],"graph-based":[130],"model":[131,187],"taking":[132],"into":[133],"account":[134],"associated":[138],"with":[139,143,158],"check-ins":[140],"which,":[141],"combined":[142],"an":[144,159],"attentive":[145],"auto-encoder,":[146],"allows":[147,164],"for":[148],"semantic":[149],"trajectory":[150,156,175],"representation.":[151],"We":[152],"regularize":[153],"learned":[155],"embedding":[157],"adversarial":[160],"learning":[161],"procedure,":[162],"us":[165],"better":[167],"understand":[168],"patterns":[172],"personalized":[174],"Our":[177],"extensive":[178],"experiments":[179],"real-world":[181],"datasets":[183],"demonstrate":[184],"that":[185],"our":[186],"achieves":[188],"significant":[189],"improvement":[190],"over":[191],"state-of-the-art":[193],"baselines.":[194]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
