Urban mobility and activity space

KA Cagney, E York Cornwell… - Annual Review of …, 2020 - annualreviews.org
Recent theoretical and methodological advances in urban sociology, including spatially
located data, provide new opportunities to consider the joint influence of mobility and place …

An overview on trajectory outlier detection

F Meng, G Yuan, S Lv, Z Wang, S Xia - Artificial Intelligence Review, 2019 - Springer
The task of trajectory outlier detection is to discover trajectories or their segments which
differ substantially from or are inconsistent with the remaining set. In this paper, we make an …

Interaction data from the copenhagen networks study

P Sapiezynski, A Stopczynski, DD Lassen, S Lehmann - Scientific Data, 2019 - nature.com
We describe the multi-layer temporal network which connects a population of more than 700
university students over a period of four weeks. The dataset was collected via smartphones …

Privacy in trajectory micro-data publishing: a survey

M Fiore, P Katsikouli, E Zavou, M Cunche… - Transactions on Data …, 2020 - orbit.dtu.dk
We survey the literature on the privacy of trajectory micro-data, ie, spatiotemporal
information about the mobility of individuals, whose collection is becoming increasingly …

Individual mobility prediction using transit smart card data

Z Zhao, HN Koutsopoulos, J Zhao - Transportation research part C …, 2018 - Elsevier
For intelligent urban transportation systems, the ability to predict individual mobility is crucial
for personalized traveler information, targeted demand management, and dynamic system …

Digital footprints: Using WiFi probe and locational data to analyze human mobility trajectories in cities

MW Traunmueller, N Johnson, A Malik… - … Environment and Urban …, 2018 - Elsevier
City governments all over the world face challenges understanding mobility patterns within
dense urban environments at high spatial and temporal resolution. While such measures …

Deleting edges to restrict the size of an epidemic in temporal networks

J Enright, K Meeks, GB Mertzios, V Zamaraev - Journal of Computer and …, 2021 - Elsevier
Spreading processes on graphs are a natural model for a wide variety of real-world
phenomena, including information spread over social networks and biological diseases …

[PDF][PDF] FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild.

Z Li, W Wang, C Wilson, J Chen, C Qian, T Jung… - NDSS, 2017 - academia.edu
Base stations constitute the basic infrastructure of today's cellular networks. Unfortunately,
vulnerabilities in the GSM (2G) network protocol enable the creation of fake base stations …

Inferring person-to-person proximity using WiFi signals

P Sapiezynski, A Stopczynski, DK Wind… - Proceedings of the …, 2017 - dl.acm.org
Today's societies are enveloped in an ever-growing telecommunication infrastructure. This
infrastructure offers important opportunities for sensing and recording a multitude of human …

Handoff all your privacy: A review of apple's bluetooth low energy continuity protocol

J Martin, D Alpuche, K Bodeman, L Brown… - arXiv preprint arXiv …, 2019 - arxiv.org
We investigate Apple's Bluetooth Low Energy (BLE) Continuity protocol, designed to support
interoperability and communication between iOS and macOS devices, and show that the …