Machine learning for synthetic data generation: a review

Y Lu, M Shen, H Wang, X Wang, C van Rechem… - arxiv preprint arxiv …, 2023 - arxiv.org
Machine learning heavily relies on data, but real-world applications often encounter various
data-related issues. These include data of poor quality, insufficient data points leading to …

Generative models for synthetic urban mobility data: A systematic literature review

A Kapp, J Hansmeyer, H Mihaljević - ACM Computing Surveys, 2023 - dl.acm.org
Although highly valuable for a variety of applications, urban mobility data are rarely made
openly available, as it contains sensitive personal information. Synthetic data aims to solve …

Ldptrace: Locally differentially private trajectory synthesis

Y Du, Y Hu, Z Zhang, Z Fang, L Chen… - Proceedings of the …, 2023 - dl.acm.org
Trajectory data has the potential to greatly benefit a wide-range of real-world applications,
such as tracking the spread of the disease through people's movement patterns and …

Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey

JW Kim, B Jang - Journal of Network and Computer Applications, 2024 - Elsevier
The generation of trajectory data has increased dramatically with the advent and
widespread use of GPS-enabled devices. This rich source of data provides invaluable …

{FACE-AUDITOR}: Data Auditing in Facial Recognition Systems

M Chen, Z Zhang, T Wang, M Backes… - 32nd USENIX Security …, 2023 - usenix.org
Few-shot-based facial recognition systems have gained increasing attention due to their
scalability and ability to work with a few face images during the model deployment phase …

Towards mobility data science (vision paper)

M Mokbel, M Sakr, L **ong, A Züfle, J Almeida… - arxiv preprint arxiv …, 2023 - arxiv.org
Mobility data captures the locations of moving objects such as humans, animals, and cars.
With the availability of GPS-equipped mobile devices and other inexpensive location …

{PrivGraph}: Differentially Private Graph Data Publication by Exploiting Community Information

Q Yuan, Z Zhang, L Du, M Chen, P Cheng… - 32nd USENIX Security …, 2023 - usenix.org
Graph data is used in a wide range of applications, while analyzing graph data without
protection is prone to privacy breach risks. To mitigate the privacy risks, we resort to the …

NetDPSyn: Synthesizing Network Traces under Differential Privacy

D Sun, JQ Chen, C Gong, T Wang, Z Li - … of the 2024 ACM on Internet …, 2024 - dl.acm.org
As the utilization of network traces for the network measurement research becomes
increasingly prevalent, concerns regarding privacy leakage from network traces have …

ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning

L Du, M Chen, M Sun, S Ji, P Cheng, J Chen… - arxiv preprint arxiv …, 2023 - arxiv.org
Data is a critical asset in AI, as high-quality datasets can significantly improve the
performance of machine learning models. In safety-critical domains such as autonomous …

PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems

L Du, Q Yuan, M Chen, M Sun, P Cheng… - Proceedings of the 19th …, 2024 - dl.acm.org
Recommender systems predict and suggest relevant options to users in various domains,
such as e-commerce, streaming services, and social media. Recently, deep reinforcement …