|Table of Contents|

Privacy-preserved Vehicular Trajectory Embedding Federated Learning and Clustering(PDF)

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

Issue:
2022年02期
Page:
80-86
Research Field:
计算机科学与技术
Publishing date:

Info

Title:
Privacy-preserved Vehicular Trajectory Embedding Federated Learning and Clustering
Author(s):
Kong Xiuping1Lu Lin2
(1.Department of Information Center,Yangzhou Polytechnic Institute,Yangzhou 225127,China)(2.China Electronic Cloud Digital Intelligence Technology Co.,Ltd.,Wuhan 430056,China)
Keywords:
sequential autoencoderfederated learningdifferential privacytrajectory clustering
PACS:
TP311.1
DOI:
10.3969/j.issn.1672-1292.2022.02.012
Abstract:
High dimensional trajectory data of intelligent networked vehicles are widely used to find different motion patterns from vehicle trajectories,so as to reduce traffic risk and improve traffic efficiency. However,more and more attention has been paid to the privacy problem in the process of data utilization. How to research and apply the algorithm under the premise of privacy protection is a big challenge. In view of the background that vehicle trajectory data are scattered among different owners and cannot be shared due to privacy protection,this paper uses differential privacy federated learning framework to construct a sequence autoencoding network to extracting low dimensional representation of trajectory sequence,and such latent representation is further used to find frequent vehicle routes in different periods. The proposed framework not only avoids the sharing of user privacy data through local training,but also prevents the disclosure of model information through Gaussian differential privacy mechanism. The framework is validated on real trajectory data sets,using LSTM autoencoder as embedding learning network,and compared with non-federated and non-differential encryption models. Finally,through clustering analysis,it is found that the learning model under the framework can still find effective frequent trajectories under the premise of fully respecting privacy protection.

References:

[1] ATEV S,MILLER G,PAPANIKOLOPOULOS N P. Clustering of vehicle trajectories[J]. IEEE Transactions on Intelligent Transportation Systems,2010,11(3):647-657.
[2]BIAN J,TIAN D Y,TANG Y Y,et al. A survey on trajectory clustering analysis[J]. arXiv Preprint,2018:1-40.
[3]柳盛,吉根林. 空间聚类技术研究综述[J]. 南京师范大学学报(工程技术版),2010,10(2):57-62.
[4]陈铭,吉根林. 一种基于相似维的高维子空间聚类算法[J]. 南京师大学报(自然科学版),2010,33(4):119-122.
[5]BRELL T,BIERMANN H,PHILIPSEN R,et al. Conditional privacy:users’ perception of data privacy in autonomous driving[C]//Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems. Anchorage,USA:IEEE,2019:352-359.
[6]姚瑶,吉根林. 面向垂直划分数据库的隐私保护分布式聚类算法[J]. 南京师范大学学报(工程技术版),2008,8(4):099-102.
[7]KYUNGHY N C,BART V M,CAGLAR G,et al. Learning phrase representations using RNN encoder-decoder for statistical machine translation[J]. arXiv Preprint arXiv:1406.1078,2014.
[8]YAO D,ZHANG C,ZHU Z H,et al. Trajectory clustering via deep representation learning[C]//International Joint Conference on Neural Networks. Anchorage,USA:IEEE,2017.
[9]YUE M X,LI Y G,YANG H Z,et al. DETECT:deep trajectory clustering for mobility-behavior analysis[C]//2019 IEEE Internation Conference on Big Data,Los angeles,USA:IEEE,2019.
[10]张新峰,闫昆鹏,赵珣. 基于双向LSTM的手写文字识别技术研究[J]. 南京师大学报(自然科学版),2019,42(3):58-64.
[11]杨强,刘洋,陈天健,等. 联邦学习[M]. 北京:电子工业出版社,2020.
[12]YANG Q,LIU Y,CHEN T J,et al. Federated machine learning:concept and applications[J]. ACM Transactions on Intelligent System Technology,2019 10(2):1-19.
[13]DWORK C,ROTH A. The algorithmic foundations of differential privacy[J]. Foundations and Trends in Theoretical Computer Science,2014,9(3/4):211-407.
[14]ABADI M,CHU A,GOODFELLOW I,et al. Deep learning with differential privacy[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York,USA:Association for Computing Machinery. 2016:308-318.
[15]BU Z Q,DONG J S,LONG Q,et al. Deep learning with Gaussian differential privacy[J]. arXiv Preprint arXiv:1911.11607,2019.
[16]MIRONOV I,TALWAR K,ZHANG L. Rényi differential privacy of the sampled Gaussian mechanism[J]. arXiv Preprint arXiv:1908.10530,2019.

Memo

Memo:
-
Last Update: 1900-01-01