R
Roberto Pellungrini
Researcher at University of Pisa
Publications - 14
Citations - 163
Roberto Pellungrini is an academic researcher from University of Pisa. The author has contributed to research in topics: Computer science & Information privacy. The author has an hindex of 5, co-authored 12 publications receiving 113 citations.
Papers
More filters
Posted Content
scikit-mobility: a Python library for the analysis, generation and risk assessment of mobility data
TL;DR: Scikit-mobility is a Python library that has the ambition of providing an environment to reproduce existing research, analyze mobility data, and simulate human mobility habits, and is efficient and easy to use as it extends pandas, a popular Python library for data analysis.
Journal ArticleDOI
A Data Mining Approach to Assess Privacy Risk in Human Mobility Data
TL;DR: The idea is to train classifiers to capture the relation between individual mobility patterns and the level of privacy risk of individuals, and shows the effectiveness of the approach by an extensive experiment on real-world GPS data in two urban areas.
Proceedings ArticleDOI
Human Mobility from theory to practice:Data, Models and Applications
TL;DR: This tutorial presents an overview of both modeling principles of human mobility and machine learning models applicable to specific problems and shows experiments and simulations using the Python library ”scikit-mobility” developed by the presenters.
Journal ArticleDOI
Modeling Adversarial Behavior Against Mobility Data Privacy
TL;DR: This work proposes Simulated Privacy Annealing (SPA), a new adversarial behavior model for privacy risk assessment in mobility data and introduces an optimization approach to find the most effective adversary trajectory in terms of privacy risk produced for the individuals represented in a mobility data set.
Book ChapterDOI
Analyzing Privacy Risk in Human Mobility Data
TL;DR: This paper proposes a methodology for assessing privacy risk in human mobility data, defines the minimum data format necessary for the computation of each feature and defines a set of possible attacks on these data formats.