Deep learning for trajectory data management and mining: A survey and beyond

W Chen, Y Liang, Y Zhu, Y Chang, K Luo… - arXiv preprint arXiv …, 2024 - arxiv.org
Trajectory computing is a pivotal domain encompassing trajectory data management and
mining, garnering widespread attention due to its crucial role in various practical …

Towards Robust Trajectory Representations: Isolating Environmental Confounders with Causal Learning

K Luo, Y Zhu, W Chen, K Wang, Z Zhou, S Ruan… - arXiv preprint arXiv …, 2024 - arxiv.org
Trajectory modeling refers to characterizing human movement behavior, serving as a pivotal
step in understanding mobility patterns. Nevertheless, existing studies typically ignore the …

Deep Temporal Deaggregation: Large-Scale Spatio-Temporal Generative Models

D Bergström, M Tiger, F Heintz - arXiv preprint arXiv:2406.12423, 2024 - arxiv.org
Many of today's data is time-series data originating from various sources, such as sensors,
transaction systems, or production systems. Major challenges with such data include privacy …

A Short Survey of Human Mobility Prediction in Epidemic Modeling from Transformers to LLMs

CN Mayemba, DJK Nkashama, JM Tshimula… - arXiv preprint arXiv …, 2024 - arxiv.org
This paper provides a comprehensive survey of recent advancements in leveraging
machine learning techniques, particularly Transformer models, for predicting human mobility …

Spatiotemporal-Augmented Graph Neural Networks for Human Mobility Simulation

Y Wang, T Zheng, S Liu, Z Feng, K Chen… - … on Knowledge and …, 2024 - ieeexplore.ieee.org
Human mobility patterns have shown significant applications in policy-decision scenarios
and economic behavior researches. The human mobility simulation task aims to generate …

Geospatial Trajectory Generation via Efficient Abduction: Deployment for Independent Testing

D Bavikadi, D Aditya, D Parkar, P Shakarian… - arXiv preprint arXiv …, 2024 - arxiv.org
The ability to generate artificial human movement patterns while meeting location and time
constraints is an important problem in the security community, particularly as it enables the …