A class of mobile motion prediction algorithms for wireless mobile computing and communication
Mobile Networks and Applications - Special issue: routing in mobile communications networks
LeZi-update: an information-theoretic framework for personal mobility tracking in PCS networks
Wireless Networks - Selected Papers from Mobicom'99
A Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research
Using GPS to learn significant locations and predict movement across multiple users
Personal and Ubiquitous Computing
A study of smoothing methods for language models applied to information retrieval
ACM Transactions on Information Systems (TOIS)
A Survey of Outlier Detection Methodologies
Artificial Intelligence Review
Activity Recognition and Abnormality Detection with the Switching Hidden Semi-Markov Model
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 1 - Volume 01
Video Behaviour Profiling and Abnormality Detection without Manual Labelling
ICCV '05 Proceedings of the Tenth IEEE International Conference on Computer Vision - Volume 2
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Navigate like a cabbie: probabilistic reasoning from observed context-aware behavior
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Traffic Prediction for Agent Route Planning
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
ACM Computing Surveys (CSUR)
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Exploring Privacy Concerns about Personal Sensing
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Real-time anomaly detection for traveling individuals
Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility
How routine learners can support family coordination
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Implicit authentication through learning user behavior
ISC'10 Proceedings of the 13th international conference on Information security
Predestination: inferring destinations from partial trajectories
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Mobility modeling, location tracking, and trajectory prediction in wireless ATM networks
IEEE Journal on Selected Areas in Communications
CASA: context-aware scalable authentication
Proceedings of the Ninth Symposium on Usable Privacy and Security
Hi-index | 0.00 |
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. Anomaly detection capabilities can be used in theft detection, remote elder-care monitoring systems, and many other applications. In this paper we present an n-gram based model for modeling a user's mobility patterns. Under the Markovian assumption that a user's location at time t depends only on the last n - 1 locations until t - 1, we can model a user's idiosyncratic location patterns through a collection of n-gram geo-labels, each with estimated probabilities. We present extensive evaluations of the n-gram model conducted on real-world data, compare it with the previous approaches of using T-Patterns and Markovian models, and show that for anomaly detection the n-gram model outperforms existing work by approximately 10%. We also show that the model can use a hierarchical location partitioning system that is able to obscure a user's exact location, to protect privacy, while still allowing applications to utilize the obscured location data for modeling anomalies effectively.