{"id":"https://openalex.org/W2962311019","doi":"https://doi.org/10.1109/wifs47025.2019.9035097","title":"Privacy-Aware Location Sharing with Deep Reinforcement Learning","display_name":"Privacy-Aware Location Sharing with Deep Reinforcement Learning","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W2962311019","doi":"https://doi.org/10.1109/wifs47025.2019.9035097","mag":"2962311019"},"language":"en","primary_location":{"id":"doi:10.1109/wifs47025.2019.9035097","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs47025.2019.9035097","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1907.07606","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085664802","display_name":"Ecenaz Erdemir","orcid":"https://orcid.org/0000-0002-2170-4985"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ecenaz Erdemir","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, Imperial College London","Imperial College London. Department of Electrical and Electronic Engineering"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, Imperial College London","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Imperial College London. Department of Electrical and Electronic Engineering","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053203917","display_name":"Pier Luigi Dragotti","orcid":"https://orcid.org/0000-0002-6073-2807"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Pier Luigi Dragotti","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, Imperial College London","Imperial College London. Department of Electrical and Electronic Engineering"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, Imperial College London","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Imperial College London. Department of Electrical and Electronic Engineering","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016883501","display_name":"Den\u0131z G\u00fcnd\u00fcz","orcid":"https://orcid.org/0000-0002-7725-395X"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Deniz Gunduz","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, Imperial College London","Imperial College London"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, Imperial College London","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Imperial College London","institution_ids":["https://openalex.org/I47508984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5085664802"],"corresponding_institution_ids":["https://openalex.org/I47508984"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.07348689,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8116376399993896},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7418627142906189},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.7019004821777344},{"id":"https://openalex.org/keywords/markov-decision-process","display_name":"Markov decision process","score":0.6651155948638916},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6553652882575989},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6370466947555542},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.5833771824836731},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.5145801901817322},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.48752471804618835},{"id":"https://openalex.org/keywords/mutual-information","display_name":"Mutual information","score":0.4864601790904999},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.454863041639328},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4326237142086029},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.42928147315979004},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27148211002349854},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10486653447151184}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8116376399993896},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7418627142906189},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.7019004821777344},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.6651155948638916},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6553652882575989},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6370466947555542},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.5833771824836731},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.5145801901817322},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.48752471804618835},{"id":"https://openalex.org/C152139883","wikidata":"https://www.wikidata.org/wiki/Q252973","display_name":"Mutual information","level":2,"score":0.4864601790904999},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.454863041639328},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4326237142086029},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.42928147315979004},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27148211002349854},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10486653447151184},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/wifs47025.2019.9035097","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs47025.2019.9035097","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1907.07606","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1907.07606","pdf_url":"https://arxiv.org/pdf/1907.07606","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:2962311019","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1907.07606v2","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1907.07606","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1907.07606","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1907.07606","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1907.07606","pdf_url":"https://arxiv.org/pdf/1907.07606","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1980666796","https://openalex.org/W2009303086","https://openalex.org/W2032100464","https://openalex.org/W2035311901","https://openalex.org/W2046376809","https://openalex.org/W2053801139","https://openalex.org/W2060871119","https://openalex.org/W2098432798","https://openalex.org/W2120911939","https://openalex.org/W2121863487","https://openalex.org/W2126729912","https://openalex.org/W2511693736","https://openalex.org/W2589035105","https://openalex.org/W2775752987","https://openalex.org/W2809452802","https://openalex.org/W2894779347","https://openalex.org/W2917440896","https://openalex.org/W2962986088","https://openalex.org/W2963049181","https://openalex.org/W2964121744","https://openalex.org/W3123972088","https://openalex.org/W4288345394","https://openalex.org/W6631190155","https://openalex.org/W6651608069"],"related_works":["https://openalex.org/W3011227821","https://openalex.org/W3009521130","https://openalex.org/W2085921246","https://openalex.org/W2566989010","https://openalex.org/W1547847136","https://openalex.org/W2505368206","https://openalex.org/W3126314691","https://openalex.org/W3007864507","https://openalex.org/W2970585478","https://openalex.org/W3023858629","https://openalex.org/W2612022080","https://openalex.org/W2261418456","https://openalex.org/W3039337871","https://openalex.org/W2294598291","https://openalex.org/W2268833196","https://openalex.org/W2757411787","https://openalex.org/W2896739440","https://openalex.org/W2087923570","https://openalex.org/W2807662719","https://openalex.org/W1440652654"],"abstract_inverted_index":{"Location-based":[0],"services":[1,11],"(LBSs)":[2],"have":[3],"become":[4],"widely":[5],"popular.":[6],"Despite":[7],"their":[8],"utility,":[9],"these":[10,70],"raise":[12],"concerns":[13],"for":[14,75],"privacy":[15,43,74,106,120],"since":[16],"they":[17,79],"require":[18],"sharing":[19,35,45],"location":[20,34,48,51,108,132],"information":[21,85,103,125,139],"with":[22],"untrusted":[23],"third":[24],"parties.":[25],"In":[26],"this":[27],"work,":[28],"we":[29,141],"study":[30],"privacy-utility":[31],"trade-off":[32],"in":[33,97],"mechanisms.":[36],"Existing":[37],"approaches":[38],"are":[39],"mainly":[40],"focused":[41],"on":[42],"of":[44,55,84],"a":[46,98,146],"single":[47],"or":[49],"myopic":[50],"trace":[52,88],"privacy;":[53],"neither":[54],"them":[56],"taking":[57],"into":[58,115],"account":[59],"the":[60,64,73,76,87,91,119,123,127,136,143],"temporal":[61,95,113],"correlations":[62,96,114],"between":[63,126],"past":[65],"and":[66,130,151],"current":[67,77],"locations.":[68],"Although":[69],"methods":[71],"preserve":[72],"time,":[78],"may":[80],"leak":[81],"significant":[82],"amount":[83],"at":[86],"level":[89],"as":[90,145],"adversary":[92],"can":[93],"exploit":[94],"trace.":[99],"We":[100,117],"propose":[101],"an":[102],"theoretically":[104],"optimal":[105],"preserving":[107],"release":[109],"mechanism":[110],"that":[111],"takes":[112],"account.":[116],"measure":[118],"leakage":[121],"by":[122],"mutual":[124,138],"user's":[128],"true":[129],"released":[131],"traces.":[133],"To":[134],"tackle":[135],"history-dependent":[137],"minimization,":[140],"reformulate":[142],"problem":[144],"Markov":[147],"decision":[148],"process":[149],"(MDP),":[150],"solve":[152],"it":[153],"using":[154],"asynchronous":[155],"actor-critic":[156],"deep":[157],"reinforcement":[158],"learning":[159],"(RL).":[160]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
