Skip to main content

n-Gram Geo-trace Modeling

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6696))

Abstract

As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. Anomaly detection capabilities can be used in theft detection, remote elder-care monitoring systems, and many other applications. In this paper we present an n-gram based model for modeling a user’s mobility patterns. Under the Markovian assumption that a user’s location at time t depends only on the last n − 1 locations until t − 1, we can model a user’s idiosyncratic location patterns through a collection of n-gram geo-labels, each with estimated probabilities. We present extensive evaluations of the n-gram model conducted on real-world data, compare it with the previous approaches of using T-Patterns and Markovian models, and show that for anomaly detection the n-gram model outperforms existing work by approximately 10%. We also show that the model can use a hierarchical location partitioning system that is able to obscure a user’s exact location, to protect privacy, while still allowing applications to utilize the obscured location data for modeling anomalies effectively.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ashbrook, D., Starner, T.: Using GPS to learn significant locations and predict movement across multiple users. Personal and Ubiquitous Computing 7(5), 275–286 (2003)

    Article  Google Scholar 

  2. Bhattacharya, A., Das, S.K.: Lezi-update: an information-theoretic framework for personal mobility tracking in pcs networks. Wireless Networks 8(2/3), 121–135 (2002)

    Article  MATH  Google Scholar 

  3. Brush, A.J.B., Krumm, J., Scott, J.: Exploring end user preferences for location obfuscation, location-based services, and the value of location. In: UbiComp 2010 (2010)

    Google Scholar 

  4. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41(3), 1–58 (2009)

    Article  Google Scholar 

  5. Chen, G., Kotz, D.: A survey of context-aware mobile computing research. Tech. rep., Hanover, NH, USA (2000)

    Google Scholar 

  6. Davidoff, S., Zimmerman, J., Dey, A.K.: How routine learners can support family coordination. In: Proceedings of CHI 2010, pp. 2461–2470 (2010)

    Google Scholar 

  7. Duong, T.V., Bui, H.H., Phung, D.Q., Venkatesh, S.: Activity recognition and abnormality detection with the switching hidden semi-markov model. Computer Vision and Pattern Recognition 1, 838–845 (2005)

    Google Scholar 

  8. Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In: Applications of Data Mining in Computer Security (2002)

    Google Scholar 

  9. Gehrke, J., Wojtusiak, J.: Traffic prediction for agent route planning. In: Bubak, M., van Albada, G., Dongarra, J., Sloot, P. (eds.) Computational Science at ICCS 2008, pp. 692–701 (2008)

    Google Scholar 

  10. Giannotti, F., Nanni, M., Pinelli, F., Pedreschi, D.: Trajectory pattern mining. In: KDD 2007: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 330–339 (2007)

    Google Scholar 

  11. Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.L.: Understanding individual human mobility patterns. Nature 453, 779–782 (2008)

    Article  Google Scholar 

  12. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003, pp. 31–42 (2003)

    Google Scholar 

  13. Gupta, M., Intille, S.S., Larson, K.: Adding GPS-control to traditional thermostats: An exploration of potential energy savings and design challenges. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 95–114. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  14. Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artificial Intelligence Review 22, 85–126 (2004)

    Article  MATH  Google Scholar 

  15. Klasnja, P., Consolvo, S., Choudhury, T., Beckwith, R., Hightower, J.: Exploring privacy concerns about personal sensing. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 176–183. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  16. Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127–143. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  17. Krumm, J., Horvitz, E.: Predestination: Inferring destinations from partial trajectories. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol. 4206, pp. 243–260. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  18. Liao, B.: Anomaly detection in GPS data based on visual analytics. Master’s thesis, University of Illinois at Urbana-Champaign (2010)

    Google Scholar 

  19. Liu, G., Maguire Jr., G.: A class of mobile motion prediction algorithms for wireless mobile computing and communication. Mobile Networks and Applications 1(2), 113–121 (1996)

    Article  Google Scholar 

  20. Liu, T., Bahl, P., Chlamtac, I.: Mobility modeling, location tracking, and trajectory prediction in wireless atm networks. IEEE Journal on Selected Areas in Communications SAC 16(6), 922–936 (1998)

    Article  Google Scholar 

  21. Ma, T.S.: Real-time anomaly detection for traveling individuals. In: Assets 2009. pp. 273–274 (2009)

    Google Scholar 

  22. Magnusson, M.S.: Discovering hidden time patterns in behavior: T-patterns and their detection. Behaviour Research Methods Instruments and Computers 32(1), 93–110 (2000)

    Article  Google Scholar 

  23. Patcha, A., Park, J.M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks 51(12), 3448–3470 (2007)

    Article  Google Scholar 

  24. Salvador, S., Philip Chan, P., Brodie, J.: Learning states and rules for time series anomaly detection. Tech. rep., Department of Computer Sciences, Florida Institute of Technology, Melbourne, FL 329012004 (2004)

    Google Scholar 

  25. Scott, J., Krumm, J., Meyers, B., Brush, A.J., Kapoor, A.: Home heating using gps-based arrival prediction. Tech. rep., Microsoft Research, USA (2010)

    Google Scholar 

  26. Shannon, C.E.: A mathematical theory of communication. Tech. rep., Bell Systems Technical Journal (1948)

    Google Scholar 

  27. Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 99–113. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  28. Xiang, T., Gong, S.: Video behaviour profiling and abnormality detection without manual labeling. In: ICCV 2005: Proceedings of the Tenth IEEE International Conference on Computer Vision, pp. 1238–1245 (2005)

    Google Scholar 

  29. Zhai, C., Lafferty, J.: A study of smoothing methods for language models applied to information retrieval. ACM Transactions on Information and System Security 22(2), 179–214 (2004)

    Article  Google Scholar 

  30. Ziebart, B.D., Maas, A.L., Dey, A.K., Bagnell, J.A.: Navigate like a cabbie: probabilistic reasoning from observed context-aware behavior. In: UbiComp 2008, pp. 322–331 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Buthpitiya, S., Zhang, Y., Dey, A.K., Griss, M. (2011). n-Gram Geo-trace Modeling. In: Lyons, K., Hightower, J., Huang, E.M. (eds) Pervasive Computing. Pervasive 2011. Lecture Notes in Computer Science, vol 6696. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21726-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21726-5_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21725-8

  • Online ISBN: 978-3-642-21726-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics