Learning Location from Shared Elevation Profiles in Fitness Apps: A
Privacy Perspective
- URL: http://arxiv.org/abs/2210.15529v1
- Date: Thu, 27 Oct 2022 15:15:13 GMT
- Title: Learning Location from Shared Elevation Profiles in Fitness Apps: A
Privacy Perspective
- Authors: Ulku Meteriz-Yildiran and Necip Fazil Yildiran and Joongheon Kim and
David Mohaisen
- Abstract summary: We study the extent to which elevation profiles can be used to predict the location of users.
We devise three plausible threat settings under which the city or borough of the targets can be predicted.
We achieve a prediction success rate ranging from 59.59% to 99.80%.
- Score: 14.886240385518716
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: The extensive use of smartphones and wearable devices has facilitated many
useful applications. For example, with Global Positioning System (GPS)-equipped
smart and wearable devices, many applications can gather, process, and share
rich metadata, such as geolocation, trajectories, elevation, and time. For
example, fitness applications, such as Runkeeper and Strava, utilize the
information for activity tracking and have recently witnessed a boom in
popularity. Those fitness tracker applications have their own web platforms and
allow users to share activities on such platforms or even with other social
network platforms. To preserve the privacy of users while allowing sharing,
several of those platforms may allow users to disclose partial information,
such as the elevation profile for an activity, which supposedly would not leak
the location of the users. In this work, and as a cautionary tale, we create a
proof of concept where we examine the extent to which elevation profiles can be
used to predict the location of users. To tackle this problem, we devise three
plausible threat settings under which the city or borough of the targets can be
predicted. Those threat settings define the amount of information available to
the adversary to launch the prediction attacks. Establishing that simple
features of elevation profiles, e.g., spectral features, are insufficient, we
devise both natural language processing (NLP)-inspired text-like representation
and computer vision-inspired image-like representation of elevation profiles,
and we convert the problem at hand into text and image classification problem.
We use both traditional machine learning- and deep learning-based techniques
and achieve a prediction success rate ranging from 59.59\% to 99.80\%. The
findings are alarming, highlighting that sharing elevation information may have
significant location privacy risks.
Related papers
- SoMeR: Multi-View User Representation Learning for Social Media [1.7949335303516192]
We propose SoMeR, a Social Media user representation learning framework that incorporates temporal activities, text content, profile information, and network interactions to learn comprehensive user portraits.
SoMeR encodes user post streams as sequences of timestamped textual features, uses transformers to embed this along with profile data, and jointly trains with link prediction and contrastive learning objectives.
We demonstrate SoMeR's versatility through two applications: 1) Identifying inauthentic accounts involved in coordinated influence operations by detecting users posting similar content simultaneously, and 2) Measuring increased polarization in online discussions after major events by quantifying how users with different beliefs moved farther apart
arXiv Detail & Related papers (2024-05-02T22:26:55Z) - Where you go is who you are -- A study on machine learning based
semantic privacy attacks [3.259843027596329]
We present a systematic analysis of two attack scenarios, namely location categorization and user profiling.
Experiments on the Foursquare dataset and tracking data demonstrate the potential for abuse of high-quality spatial information.
Our findings point out the risks of ever-growing databases of tracking data and spatial context data.
arXiv Detail & Related papers (2023-10-26T17:56:50Z) - Privacy-Preserving Representations are not Enough -- Recovering Scene
Content from Camera Poses [63.12979986351964]
Existing work on privacy-preserving localization aims to defend against an attacker who has access to a cloud-based service.
We show that an attacker can learn about details of a scene without any access by simply querying a localization service.
arXiv Detail & Related papers (2023-05-08T10:25:09Z) - One Size Does not Fit All: Quantifying the Risk of Malicious App
Encounters for Different Android User Profiles [18.58456177992614]
We perform a large-scale quantitative analysis of the risk of encountering malware across user communities.
At the core of our study is a dataset of app installation logs collected from 12M Android mobile devices.
Our results confirm the inadequacy of one-size-fits-all protection solutions.
arXiv Detail & Related papers (2023-01-18T07:31:41Z) - Data Leakage via Access Patterns of Sparse Features in Deep
Learning-based Recommendation Systems [10.657479921108287]
State-of-the-art recommendation models rely on sparse and dense features to represent users' profile information.
This paper explores the private information that may be learned by tracking a recommendation model's sparse feature access patterns.
arXiv Detail & Related papers (2022-12-12T22:05:46Z) - OPOM: Customized Invisible Cloak towards Face Privacy Protection [58.07786010689529]
We investigate the face privacy protection from a technology standpoint based on a new type of customized cloak.
We propose a new method, named one person one mask (OPOM), to generate person-specific (class-wise) universal masks.
The effectiveness of the proposed method is evaluated on both common and celebrity datasets.
arXiv Detail & Related papers (2022-05-24T11:29:37Z) - ASHA: Assistive Teleoperation via Human-in-the-Loop Reinforcement
Learning [91.58711082348293]
Reinforcement learning from online user feedback on the system's performance presents a natural solution to this problem.
This approach tends to require a large amount of human-in-the-loop training data, especially when feedback is sparse.
We propose a hierarchical solution that learns efficiently from sparse user feedback.
arXiv Detail & Related papers (2022-02-05T02:01:19Z) - Attribute Inference Attack of Speech Emotion Recognition in Federated
Learning Settings [56.93025161787725]
Federated learning (FL) is a distributed machine learning paradigm that coordinates clients to train a model collaboratively without sharing local data.
We propose an attribute inference attack framework that infers sensitive attribute information of the clients from shared gradients or model parameters.
We show that the attribute inference attack is achievable for SER systems trained using FL.
arXiv Detail & Related papers (2021-12-26T16:50:42Z) - Statistical Feature-based Personal Information Detection in Mobile
Network Traffic [13.568975395946433]
In this paper, statistical features of personal information are designed to depict the occurrence patterns of personal information in the traffic.
A detector is trained based on machine learning algorithms to discover potential personal information with similar patterns.
As far as we know, this is the first work that detects personal information based on statistical features.
arXiv Detail & Related papers (2021-12-23T04:01:16Z) - PGLP: Customizable and Rigorous Location Privacy through Policy Graph [68.3736286350014]
We propose a new location privacy notion called PGLP, which provides a rich interface to release private locations with customizable and rigorous privacy guarantee.
Specifically, we formalize a user's location privacy requirements using a textitlocation policy graph, which is expressive and customizable.
Third, we design a private location trace release framework that pipelines the detection of location exposure, policy graph repair, and private trajectory release with customizable and rigorous location privacy.
arXiv Detail & Related papers (2020-05-04T04:25:59Z) - Know Your Surroundings: Exploiting Scene Information for Object Tracking [181.1750279330811]
Current state-of-the-art trackers only rely on a target appearance model in order to localize the object in each frame.
We propose a novel tracking architecture which can utilize scene information for tracking.
arXiv Detail & Related papers (2020-03-24T17:59:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.