A Stackelberg game perspective on the conflict between machine learning and data obfuscation
暂无分享,去创建一个
[1] Nathan Srebro,et al. Fast Rates for Regularized Objectives , 2008, NIPS.
[2] Jens Grossklags,et al. A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[3] John C. Mitchell,et al. Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.
[4] Carmela Troncoso,et al. Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.
[5] Wayne H. Wolf,et al. Cyber-physical Systems , 2009, Computer.
[6] Ting Yu,et al. Empirical privacy and empirical utility of anonymized data , 2013, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW).
[7] H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
[8] R.S. Parker,et al. A model-based algorithm for blood glucose control in Type I diabetic patients , 1999, IEEE Transactions on Biomedical Engineering.
[9] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[10] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[11] Melanie Swan,et al. Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0 , 2012, J. Sens. Actuator Networks.
[12] Aaron Roth,et al. Selling privacy at auction , 2015, Games Econ. Behav..
[13] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[14] Scott R. Peppet. Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security & Consent , 2014 .
[15] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[16] Moni Naor,et al. On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy , 2010, J. Priv. Confidentiality.
[17] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[18] Jens Grossklags,et al. A Short Paper on the Incentives to Share Private Information for Population Estimates , 2015, Financial Cryptography.
[19] Rico Neumann,et al. Obfuscation: A user’s guide for privacy and protest , 2017, New Media Soc..
[20] Ian R. Kerr,et al. Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society , 2009 .
[21] Ninghui Li,et al. Membership privacy: a unifying framework for privacy definitions , 2013, CCS.
[22] David Xiao,et al. Is privacy compatible with truthfulness? , 2013, ITCS '13.
[23] Helen Nissenbaum,et al. Trackmenot: Resisting Surveillance in Web Search , 2015 .
[24] Romit Roy Choudhury,et al. Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.