Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy
暂无分享,去创建一个
[1] Niki Pissinou,et al. Game theoretic modeling of security and trust relationship in cyberspace , 2016, Int. J. Commun. Syst..
[2] Qian Zhang,et al. A stochastic game for privacy preserving context sensing on mobile phone , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[3] Richeng Jin,et al. On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach , 2017, HotSoS.
[4] W. Press,et al. Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent , 2012, Proceedings of the National Academy of Sciences.
[5] Yingshu Li,et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[6] O. Günther,et al. Privacy concerns and identity in online social networks , 2009 .
[7] Lei Li,et al. Cognitive Approach for Location Privacy Protection , 2018, IEEE Access.
[8] Jiguo Yu,et al. Efficient privacy-preserving schemes for dot-product computation in mobile computing , 2016, PAMCO '16.
[9] Yi Liang,et al. Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.
[10] Stephen Armstrong,et al. What happens to data gathered by health and wellness apps? , 2016, British Medical Journal.
[11] Xiaolei Wang,et al. DroidContext: Identifying Malicious Mobile Privacy Leak Using Context , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[12] Lei Ying,et al. A game-theoretic approach to quality control for collecting privacy-preserving data , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[13] Carmela Troncoso,et al. Privacy Games Along Location Traces , 2016, ACM Trans. Priv. Secur..
[14] Chunqiang Hu,et al. Secure multi-unit sealed first-price auction mechanisms , 2016, Secur. Commun. Networks.
[15] Jiguo Yu,et al. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds , 2018, IEEE Transactions on Big Data.
[16] Jörgen W. Weibull,et al. Evolutionary Game Theory , 1996 .
[17] Zhipeng Cai,et al. A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems , 2020, IEEE Transactions on Network Science and Engineering.
[18] Jianzhong Li,et al. Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.