Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design

Published: 18 July 2021 Publication History

Abstract

The vast majority of artificial intelligence solutions are founded on game theory, and differential privacy is emerging as perhaps the most rigorous and widely adopted privacy paradigm in the field. However, alongside all the advancements made in both these fields, there is not a single application that is not still vulnerable to privacy violations, security breaches, or manipulation by adversaries. Our understanding of the interactions between differential privacy and game theoretic solutions is limited. Hence, we undertook a comprehensive review of literature in the field, finding that differential privacy has several advantageous properties that can make more of a contribution to game theory than just privacy protection. It can also be used to build heuristic models for game-theoretic solutions, to avert strategic manipulations, and to quantify the cost of privacy protection. With a focus on mechanism design, the aim of this article is to provide a new perspective on the currently held impossibilities in game theory, potential avenues to circumvent those impossibilities, and opportunities to improve the performance of game-theoretic solutions with differentially private techniques.

References

[1]
Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Conference on Computer and Communications Security (CCS’16). ACM, New York, NY, 308–318.
[2]
D. An, Q. Yang, D. Li, W. Yu, W. Zhao, and C. B. Yan. 2020. Where am I parking: Incentive online parking-space sharing mechanism with privacy protection. IEEE Trans. Autom. Sci. Eng. (2020), 1–20.
[3]
Dou An, Qingyu Yang, Wei Yu, Donghe Li, and Wei Zhao. 2020. LoPrO: Location privacy-preserving online auction scheme for electric vehicles joint bidding and charging. Fut. Gen. Comput. Syst. 107 (2020), 394–407.
[4]
Sanjeev Arora, Elad Hazan, and Satyen Kale. 2012. The multiplicative weights update method: A meta-algorithm and applications. Theor. Comput. 8, 6 (2012), 121–164.
[5]
M. Balcan, A. Blum, J. D. Hartline, and Y. Mansour. 2005. Mechanism design via machine learning. In 46th IEEE Symposium on Foundations of Computer Science (FOCS’05). 605–614.
[6]
Stephen Boyd, Neal Parikh, Eric Chu, Borja Peleato, and Jonathan Eckstein. 2011. Distributed optimization and statistical learning via the alternating direction method of multipliers. Found. Trends Mach. Learn. 3 (01 2011), 1–122.
[7]
Jonathan Bredin. 2005. Models for truthful online double auctions. In 21st Conference on Uncertainty in Artificial Intelligence (UAI’05). AUAI Press, 50–59.
[8]
Glenn W. Brier. 1950. Verification of forecasts expressed in terms of probability. Month. Weath. Rev. 78 (1950), 1–3.
[9]
Mark Bun, Jelani Nelson, and Uri Stemmer. 2019. Heavy hitters and the structure of local privacy. ACM Trans. Algor. 15, 4 (Oct. 2019).
[10]
T.-H. Hubert Chan, Elaine Shi, and Dawn Song. 2011. Private and continual release of statistics. ACM Trans. Inf. Syst. Secur. 14, 3 (Nov. 2011).
[11]
S. Chen, Y. Tao, D. Yu, F. Li, B. Gong, and X. Cheng. 2021. Privacy-preserving collaborative learning for multiarmed bandits in IoT. IEEE Internet. Things J. 8, 5 (2021), 3276–3286.
[12]
Yiling Chen, Stephen Chong, Ian A. Kash, Tal Moran, and Salil Vadhan. 2016. Truthful mechanisms for agents that value privacy. ACM Trans. Econ. Comput. 4, 3 (Mar. 2016).
[13]
Yiling Chen, Or Sheffet, and Salil Vadhan. 2020. Privacy games. ACM Trans. Econ. Comput. 8, 2 (May 2020).
[14]
Z. Chen, T. Ni, H. Zhong, S. Zhang, and J. Cui. 2019. Differentially private double spectrum auction with approximate social welfare maximization. IEEE Trans. Inf. Forens. Secur. 14, 11 (Nov. 2019), 2805–2818.
[15]
A. Chivukula, X. Yang, W. Liu, T. Zhu, and W. Zhou. 2020. Game theoretical adversarial deep learning with variational adversaries. IEEE Trans. Knowl. Data Eng. (2020), 1–1.
[16]
Rachel Cummings, Stratis Ioannidis, and Katrina Ligett. 2015. Truthful linear regression. In Proceedings of the 28th Conference on Learning Theory (COLT’15). 448–483.
[17]
Rachel Cummings, Michael Kearns, Aaron Roth, and Zhiwei Steven Wu. 2015. Privacy and truthful equilibrium selection for aggregative games. In Web and Internet Economy. Springer Berlin, 286–299.
[18]
Rachel Cummings, Katrina Ligett, Mallesh M. Pai, and Aaron Roth. 2016. The strange case of privacy in equilibrium models. In ACM Conference on Economics and Computation (EC’16). ACM, New York, NY, 659.
[19]
Rachel Cummings, Katrina Ligett, Jaikumar Radhakrishnan, Aaron Roth, and Zhiwei Steven Wu. 2016. Coordination complexity: Small information coordinating large populations. In Innovations in Theoretical Computer Science Conference. ACM, New York, NY, 281–290.
[20]
Rachel Cummings, David M. Pennock, and Jennifer Wortman Vaughan. 2016. The possibilities and limitations of private prediction markets. In ACM Conference on Economics and Computation (EC’16). ACM, New York, NY, 143–160.
[21]
Felipe Leno Da Silva and Anna Helena Reali Costa. 2019. A survey on transfer learning for multiagent reinforcement learning systems. J. Artif. Int. Res. 64, 1 (Jan. 2019), 645–703.
[22]
Felipe Leno da Silva, Ruben Glatt, and Anna Helena Reali Costa. 2017. Simultaneously learning and advising in multiagent reinforcement learning. In International Conference on Autonomous Agents and Multi-Agent Systems., 1100–1108.
[23]
Emily Diana, Hadi Elzayn, Michael Kearns, Aaron Roth, Saeed Sharifi-Malvajerdi, and Juba Ziani. 2020. Differentially Private Call Auctions and Market Impact. arxiv:cs.GT/2002.05699
[24]
Emily Diana, Michael Kearns, Seth Neel, and Aaron Roth. 2019. Optimal, truthful, and private securities lending. arXiv:1912.06202 [cs, q-fin] (Dec. 2019).
[25]
Cuong T. Do, Nguyen H. Tran, Choongseon Hong, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren, Niki Pissinou, and Sundaraja Sitharama Iyengar. 2017. Game theory for cyber security and privacy. ACM Comput. Surv. 50, 2 (May 2017).
[26]
J. C. Duchi, M. I. Jordan, and M. J. Wainwright. 2013. Local privacy and statistical minimax rates. In 51st Allerton Conference on Communication, Control, and Computing (Allerton’13). 1592–1592.
[27]
Cynthia Dwork. 2011. A firm foundation for private data analysis. Commun. ACM 54, 1 (Jan. 2011), 86–95.
[28]
Cynthia Dwork. 2019. Differential privacy and the US census. In 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS’19). ACM, New York, NY, 1.
[29]
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography, Shai Halevi and Tal Rabin (Eds.). Springer Berlin, 265–284.
[30]
Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N. Rothblum. 2010. Differential privacy under continual observation. In 42nd ACM Symposium on Theory of Computing (STOC’10). ACM, New York, NY, 715–724.
[31]
C. Dwork and A. Roth. 2014. The Algorithmic Foundations of Differential Privacy. now.
[32]
C. Dwork, G. N. Rothblum, and S. Vadhan. 2010. Boosting and differential privacy. In IEEE 51st Symposium on Foundations of Computer Science. 51–60.
[33]
Úlfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova. 2014. RAPPOR: Randomized aggregatable privacy-preserving ordinal response. In ACM SIGSAC Conference on Computer and Communications Security (CCS’14). ACM, New York, 1054–1067.
[34]
Ferdinando Fioretto, Lesia Mitridati, and Pascal Van Hentenryck. 2020. Differential privacy for stackelberg games. In 29th Inter Joint Conference on Artificial Intelligence, (IJCAI’20), Christian Bessiere (Ed.). ijcai.org, 3480–3486.
[35]
Lisa K. Fleischer and Yu-Han Lyu. 2012. Approximately optimal auctions for selling privacy when costs are correlated with data. In 13th ACM Conference on Economics and Computation (EC’12). ACM, New York, 568–585.
[36]
Arik Friedman, Shlomo Berkovsky, and Mohamed Ali Kaafar. 2016. A differential privacy framework for matrix factorization recommender systems. User Model. User-adapt. Interact. 26, 5 (01 Dec. 2016), 425–458.
[37]
Lorenzo Frigerio, Anderson Santana de Oliveira, Laurent Gomez, and Patrick Duverger. 2019. Differentially private generative adversarial networks for time series, continuous, and discrete open data. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Vol. 562. Springer, 151–164.
[38]
Arpita Ghosh and Katrina Ligett. 2013. Privacy and coordination: Computing on databases with endogenous participation. In 14th ACM Conference on Economics and Computation (EC’13). ACM, New York, NY, 543–560.
[39]
Arpita Ghosh, Katrina Ligett, Aaron Roth, and Grant Schoenebeck. 2014. Buying private data without verification. In 15th ACM Conference on Economics and Computation (EC’14). ACM, New York, NY, 931–948.
[40]
Arpita Ghosh and Aaron Roth. 2011. Selling privacy at auction. In 12th ACM Conference on Economics and Computation (EC’11). Association for Computing Machinery, New York, NY, 199–208.
[41]
Arpita Ghosh, Tim Roughgarden, and Mukund Sundararajan. 2009. Universally utility-maximizing privacy mechanisms. In 41st ACM Symposium on Theory of Computing (STOC’09). ACM, New York, NY, 351–360.
[42]
Tilmann Gneiting and Adrian E. Raftery. 2007. Strictly proper scoring rules, prediction, and estimation. J. Amer. Statist. Assoc. 102, 477 (2007), 359–378.
[43]
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In International Conference on Advances in Neural Information Processing Systems. 2672–2680.
[44]
Christopher Greer, Martin J. Burns, David A. Wollman, and Edward R. Griffor. 2019. Cyber-physical systems and internet of things. Nat. Inst. Stand. Technol. 1900-202 (2019).
[45]
Anupam Gupta, Katrina Ligett, Frank McSherry, Aaron Roth, and Kunal Talwar. 2010. Differentially private combinatorial optimization. In 21st ACM-SIAM Symposium on Discrete Algorithms (SODA’10). SIAM, 1106–1125.
[46]
S. Han, U. Topcu, and G. J. Pappas. 2017. Differentially private distributed constrained optimization. IEEE Trans. Automat. Contr. 62, 1 (Jan. 2017), 50–64.
[47]
M. U. Hassan, M. H. Rehmani, and J. Chen. 2020. Differential privacy techniques for cyber physical systems: A survey. IEEE Commun. Surv. Tutor. 22, 1 (2020), 746–789.
[48]
Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural Comput. 9, 8 (1997), 1735–1780.
[49]
Justin Hsu, Zhiyi Huang, Aaron Roth, Tim Roughgarden, and Zhiwei Steven Wu. 2014. Private matchings and allocations. In 46th ACM Symposium on Theory of Computing (STOC’14). ACM, New York, 21–30.
[50]
Justin Hsu, Zhiyi Huang, Aaron Roth, and Zhiwei Steven Wu. 2016. Jointly private convex programming. In 28th ACM-SIAM Symposium on Discrete Algorithms (SODA’16). SIAM, 580–599.
[51]
Justin Hsu, Aaron Roth, Tim Roughgarden, and Jonathan Ullman. 2014. Privately solving linear programs. In Automata, Languages, and Programming. Springer Berlin, 612–624.
[52]
P. Huang, X. Zhang, L. Guo, and M. Li. 2019. Incentivizing crowdsensing-based noise monitoring with differentially-private locations. IEEE Trans. Mob. Comput. 20, 2 (2019), 519–532.
[53]
Z. Huang and S. Kannan. 2012. The exponential mechanism for social welfare: private, truthful, and nearly optimal. In IEEE 53rd Symposium on Foundations of Computer Science. 140–149.
[54]
Zhiyi Huang, Jinyan Liu, and Xiangning Wang. 2018. Learning optimal reserve price against non-myopic bidders. In 32nd International Conference on Neural Information Processing Systems (NIPS’18). Curran Associates Inc., 2042–2052.
[55]
Zhiyi Huang and Xue Zhu. 2018. Near optimal jointly private packing algorithms via dual multiplicative weight update. In 29th ACM-SIAM Symposium on Discrete Algorithms (SODA’18). SIAM, 343–357.
[56]
Zhiyi Huang and Xue Zhu. 2019. Scalable and Jointly Differentially Private Packing. arxiv:cs.DS/1905.00767
[57]
Mathias Humbert, Benjamin Trubert, and Kévin Huguenin. 2019. A survey on interdependent privacy. ACM Comput. Surv. 52, 6 (Oct. 2019).
[58]
Leonid Hurwicz, Eric S. Maskin, and Roger B. Myerson. 2007. Intelligent design. The Economist (18 Oct. 2007).
[59]
H. Jiang, U. V. Shanbhag, and S. P. Meyn. 2018. Distributed computation of equilibria in misspecified convex stochastic Nash games. IEEE Trans. Automat. Control 63, 2 (2018), 360–371.
[60]
H. Jin, L. Su, H. Xiao, and K. Nahrstedt. 2018. Incentive mechanism for privacy-aware data aggregation in mobile crowd sensing systems. IEEE/ACM Trans. Netw. 26, 5 (2018), 2019–2032.
[61]
X. Jin and Y. Zhang. 2018. Privacy-preserving crowdsourced spectrum sensing. IEEE/ACM Trans. Netw. 26, 3 (June 2018), 1236–1249.
[62]
James Jordon, Jinsung Yoon, and Mihaela van der Schaar. 2019. PATE-GAN: Generating synthetic data with differential privacy guarantees. In 7th International Conference on Learning Representations. OpenReview.net.
[63]
Sampath Kannan, Jamie Morgenstern, Ryan Rogers, and Aaron Roth. 2018. Private pareto optimal exchange. ACM Trans. Econ. Comput. 6, 3–4 (Oct. 2018).
[64]
Sampath Kannan, Jamie Morgenstern, Aaron Roth, and Zhiwei Steven Wu. 2015. Approximately stable, school optimal, and student-truthful many-to-one matchings (via differential privacy). In ACM-SIAM Symposium on Discrete Algorithms (SODA’15). SIAM, 1890–1903.
[65]
S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. 2008. What can we learn privately? In 49th IEEE Symposium on Foundations of Computer Science. 531–540.
[66]
Michael Kearns, Mallesh Pai, Aaron Roth, and Jonathan Ullman. 2014. Mechanism design in large games: Incentives and privacy. In 5th Conference on Innovations in Theoretical Computer Science (ITCS’14). ACM, New York, NY, 403–410.
[67]
Daniel Kifer and Ashwin Machanavajjhala. 2011. No free lunch in data privacy. In ACM SIGMOD International Conference on Management of Data (SIGMOD’11). ACM, New York, NY, 193–204.
[68]
Daniel Kifer and Ashwin Machanavajjhala. 2012. A rigorous and customizable framework for privacy. In 31st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS’12). ACM, New York, 77–88.
[69]
N. Kohli and P. Laskowski. 2018. Epsilon voting: Mechanism design for parameter selection in differential privacy. In IEEE Symposium on Privacy-Aware Computing (PAC’18). 19–30.
[70]
Chao Li, Daniel Yang Li, Gerome Miklau, and Dan Suciu. 2015. A theory of pricing private data. ACM Trans. Datab. Syst. 39, 4 (Dec. 2015).
[71]
D. Li, Q. Yang, W. Yu, D. An, Y. Zhang, and W. Zhao. 2020. Towards differential privacy-based online double auction for smart grid. IEEE Trans. Inf. Forens. Secur. 15 (2020), 971–986.
[72]
G. Liao, X. Chen, and J. Huang. 2020. Prospect theoretic analysis of privacy-preserving mechanism. IEEE/ACM Trans. Netw. 28, 1 (2020), 71–83.
[73]
Katrina Ligett and Aaron Roth. 2012. Take it or leave it: Running a survey when privacy comes at a cost. In Internet and Network Economics, Paul W. Goldberg (Ed.). Springer Berlin, 378–391.
[74]
J. Lin, D. Yang, M. Li, J. Xu, and G. Xue. 2018. Frameworks for privacy-preserving mobile crowdsensing incentive mechanisms. IEEE Trans. Mob. Comput. 17, 8 (Aug. 2018), 1851–1864.
[75]
Changchang Liu, Supriyo Chakraborty, and Prateek Mittal. 2016. Dependence makes you vulnerable: Differential privacy under dependent tuples. In Network and Distributed System Security Symposium, Vol. 16. 21–24.
[76]
Y. Liu, H. Wang, M. Peng, J. Guan, J. Xu, and Y. Wang. 2020. DeePGA: A privacy-preserving data aggregation game in crowdsensing via deep reinforcement learning. IEEE Internet Things J. 7, 5 (2020), 4113–4127.
[77]
Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, and Jean-Pierre Hubaux. 2013. Game theory meets network security and privacy. ACM Comput. Surv. 45, 3 (July 2013).
[78]
Frank McSherry. 2010. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. Commun. ACM 53, 9 (Sept. 2010), 89–97.
[79]
F. McSherry and K. Talwar. 2007. Mechanism design via differential privacy. In 48th IEEE Symposium on Foundations of Computer Science (FOCS’07). 94–103.
[80]
Paul Milgrom and Ilya Segal. 2002. Envelope theorems for arbitrary choice sets. Econometrica 70, 2 (2002), 583–601.
[81]
Nolan Miller, Paul Resnick, and Richard Zeckhauser. 2005. Eliciting informative feedback: The peer-prediction method. Manage. Sci. 51, 9 (Sept. 2005), 1359–1373.
[82]
Roger B. Myerson. 1991. Game Theory: Analysis of Conflict. Harvard University Press.
[83]
Parinaz Naghizadeh and Arunesh Sinha. 2019. Adversarial contract design for private data commercialization. In ACM Conference on Economics and Computation (EC’19). ACM, New York, NY, 681–699.
[84]
John Nash. 1951. Non-cooperative games. Ann. Math. 54, 2 (1951), 286–295.
[85]
Tianjiao Ni, Zhili Chen, Lin Chen, Hong Zhong, Shun Zhang, and Yan Xu. 2020. Differentially Private Combinatorial Cloud Auction. arxiv:cs.CR/2001.00694
[86]
Kobbi Nissim, Claudio Orlandi, and Rann Smorodinsky. 2012. Privacy-aware mechanism design. In 13th ACM Conference on Economics and Computation (EC’12). ACM, New York, NY, 774–789.
[87]
Kobbi Nissim, Rann Smorodinsky, and Moshe Tennenholtz. 2012. Approximately optimal mechanism design via differential privacy. In 3rd Innovations in Theoretical Computer Science Conference (ITCS’12). ACM, New York, 203–213.
[88]
Kobbi Nissim, Rann Smorodinsky, and Moshe Tennenholtz. 2018. Segmentation, incentives, and privacy. Math. Oper. Res. 43, 4 (2018), 1252–1268.
[89]
Kobbi Nissim, Salil Vadhan, and David Xiao. 2014. Redrawing the boundaries on purchasing data from privacy-sensitive individuals. In 5th Conference on Innovvations in Theoretical Computer Science (ITCS’14). ACM, New York, 411–422.
[90]
C. Niu, Z. Zheng, S. Tang, X. Gao, and F. Wu. 2019. Making big money from small sensors: Trading time-series data under pufferfish privacy. In IEEE Conference on Computer Communications (INFOCOM’19). 568–576.
[91]
Chaoyue Niu, Zhenzhe Zheng, Fan Wu, Shaojie Tang, Xiaofeng Gao, and Guihai Chen. 2018. Unlocking the value of privacy: Trading aggregate statistics over private correlated data. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, New York, NY, 2031–2040.
[92]
M. J. Osborne and A. Rubinstein. 1994. A Course in Game Theory. The MIT Press. 94008308
[93]
Mallesh M. Pai and Aaron Roth. 2013. Privacy and mechanism design. SIGecom Exch. 12 (June 2013), 8–29.
[94]
Mallesh M. Pai, Aaron Roth, and Jonathan Ullman. 2016. An antifolk theorem for large repeated games. ACM Trans. Econ. Comput. 5, 2 (Oct. 2016).
[95]
Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and Úlfar Erlingsson. 2018. Scalable private learning with PATE. ArXiv abs/1802.08908 (2018).
[96]
Balázs Pejó, Qiang Tang, and Gergely Biczók. 2018. The price of privacy in collaborative learning. In ACM SIGSAC Conference on Computer and Communications Security, (CCS’18). ACM, 2261–2263.
[97]
Y. Qu, S. Yu, J. Zhang, H. T. T. Binh, L. Gao, and W. Zhou. 2019. GAN-DP: Generative adversarial net driven differentially privacy-preserving big data publishing. In IEEE International Conference on Communications (ICC’19). 1–6.
[98]
Ryan Rogers, Aaron Roth, Jonathan Ullman, and Zhiwei Steven Wu. 2015. Inducing approximately optimal flow using truthful mediators. In 16th ACM Conference on Economics and Computation (EC’15). ACM, New York, 471–488.
[99]
Ryan M. Rogers and Aaron Roth. 2014. Asymptotically truthful equilibrium selection in large congestion games. In 15th ACM Conference on Economics and Computation (EC’14). ACM, New York, NY, 771–782.
[100]
Roshan Shariff and Or Sheffet. 2018. Differentially private contextual linear bandits. In 32nd International Conference on Neural Information Processing Systems (NIPS’18). Curran Associates Inc., 4301–4311.
[101]
M. Simaan and J. B. Cruz. 1973. On the Stackelberg strategy in nonzero-sum games. J. Optim. Theor. Appl. 11, 5 (May 1973), 533–555.
[102]
Shuang Song, Yizhen Wang, and Kamalika Chaudhuri. 2017. Pufferfish privacy mechanisms for correlated data. In ACM International Conference on Management of Data (SIGMOD’17). ACM, New York, NY, 1291–1306.
[103]
D. Tian, J. Zhou, Y. Wang, Z. Sheng, X. Duan, and V. C. M. Leung. 2020. Channel access optimization with adaptive congestion pricing for cognitive vehicular networks: An evolutionary game approach. IEEE Trans. Mob. Comput. 19, 4 (2020), 803–820.
[104]
I. Vakilinia and S. Sengupta. 2019. Fair and private rewarding in a coalitional game of cybersecurity information sharing. IET Inf. Secur. 13, 6 (2019), 530–540.
[105]
Vijay V. Vazirani. 2003. Approximation Algorithms. Springer, Berlin.
[106]
William Vickrey. 1961. Counterspeculation, auctions, and competitive sealed tenders. J. Finance 16, 1 (1961), 8–37.
[107]
T. Wang, N. Li, and S. Jha. 2018. Locally differentially private frequent itemset mining. In IEEE Symposium on Security and Privacy (SP’18). 127–143.
[108]
W. Wang, M. Min, L. Xiao, Y. Chen, and H. Dai. 2019. Protecting semantic trajectory privacy for VANET with reinforcement learning. In IEEE International Conference on Communications (ICC’19). 1–5.
[109]
Weina Wang, Lei Ying, and Junshan Zhang. 2018. The value of privacy: Strategic data subjects, incentive mechanisms, and fundamental limits. ACM Trans. Econ. Comput. 6, 2 (Aug. 2018).
[110]
Z. Wang, J. Hu, R. Lv, J. Wei, Q. Wang, D. Yang, and H. Qi. 2019. Personalized privacy-preserving task allocation for mobile crowdsensing. IEEE Trans. Mob. Comput. 18, 6 (June 2019), 1330–1341.
[111]
Z. Wang, J. Li, J. Hu, J. Ren, Z. Li, and Y. Li. 2019. Towards privacy-preserving incentive for mobile crowdsensing under an untrusted platform. In IEEE Conference on Computer Communications. 2053–2061.
[112]
X. Wu, T. Wu, M. Khan, Q. Ni, and W. Dou. 2017. Game theory based correlated privacy preserving analysis in big data. IEEE Trans. Big Data (2017), 1–1.
[113]
David Xiao. 2013. Is privacy compatible with truthfulness? In 4th Conference on Innovations in Theoretical Computer Science (ITCS’13). Association for Computing Machinery, New York, NY, 67–86.
[114]
Liyang Xie, Kaixiang Lin, Shu Wang, Fei Wang, and Jiayu Zhou. 2018. Differentially private generative adversarial network. CoRR abs/1802.06739 (2018).
[115]
J. Xu, B. Palanisamy, Y. Tang, and S. D. M. Kumar. 2017. PADS: Privacy-preserving auction design for allocating dynamically priced cloud resources. In IEEE 3rd International Conference on Collaboration and Internet Computing (CIC’17). 87–96.
[116]
Q. Xu, Z. Su, M. Dai, and S. Yu. 2019. APIS: Privacy-preserving incentive for sensing task allocation in cloud and edge-cooperation mobile internet of things with SDN. IEEE Internet Things J. 7, 7 (2019), 5892–5905.
[117]
Qiang Yang, Yang Liu, Tianjian Chen, and Yongxin Tong. 2019. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. 10, 2 (Jan. 2019).
[118]
X. Yang, T. Wang, X. Ren, and W. Yu. 2017. Survey on improving data utility in differentially private sequential data publishing. IEEE Trans. Big Data (2017), 1–1.
[119]
D. Ye, T. Zhu, S. Shen, and W. Zhou. 2020. A differentially private game theoretic approach for deceiving cyber adversaries. IEEE Trans. Inf. Forens. Secur. 16 (2020), 569–584.
[120]
D. Ye, T. Zhu, W. Zhou, and P. S. Yu. 2019. Differentially private malicious agent avoidance in multiagent advising learning. IEEE Trans. Cyber. 50, 10 (2019), 4214–4227.
[121]
T. Zhang, T. Zhu, P. Xiong, H. Huo, Z. Tari, and W. Zhou. 2020. Correlated differential privacy: Feature selection in machine learning. IEEE Trans. Industr. Inform. 16, 3 (2020), 2115–2124.
[122]
Y. Zhang, Y. Mao, and S. Zhong. 2016. Joint differentially private Gale-Shapley mechanisms for location privacy protection in mobile traffic offloading systems. IEEE J. Select. Areas Commun. 34, 10 (2016), 2738–2749.
[123]
Z. Zhang, S. He, J. Chen, and J. Zhang. 2018. REAP: An efficient incentive mechanism for reconciling aggregation accuracy and individual privacy in crowdsensing. IEEE Trans. Inf. Forens. Secur. 13, 12 (Dec. 2018), 2995–3007.
[124]
L. Zhao, Q. Wang, Q. Zou, Y. Zhang, and Y. Chen. 2020. Privacy-preserving collaborative deep learning with unreliable participants. IEEE Trans. Inf. Forens. Secur. 15 (2020), 1486–1500.
[125]
T. Zhu, G. Li, W. Zhou, and P. S. Yu. 2017. Differentially private data publishing and analysis: A survey. IEEE Trans. Knowl. Data Eng. 29, 8 (Aug. 2017), 1619–1638.
[126]
T. Zhu, P. Xiong, G. Li, and W. Zhou. 2015. Correlated differential privacy: Hiding information in Non-IID data set. IEEE Trans. Inf. Forens. Secur. 10, 2 (2015), 229–242.
[127]
T. Zhu, D. Ye, W. Wang, W. Zhou, and P. Yu. 2020. More than privacy: Applying differential privacy in key areas of artificial intelligence. IEEE Trans. Knowl. Data Eng. (2020), 1–1.
[128]
H. Zuo, G. Zhang, W. Pedrycz, V. Behbood, and J. Lu. 2017. Fuzzy regression transfer learning in Takagi-Sugeno fuzzy models. IEEE Trans. Fuzzy Syst. 25, 6 (2017), 1795–1807.

Cited By

View all
  • (2024)Scenario-based Adaptations of Differential Privacy: A Technical SurveyACM Computing Surveys10.1145/365115356:8(1-39)Online publication date: 26-Apr-2024
  • (2024)SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of ThingsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.342023319(6978-6990)Online publication date: 2024
  • (2024)Attribute-Based Membership Inference Attacks and Defenses on GANsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.330559121:4(2376-2393)Online publication date: Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 54, Issue 7
September 2022
778 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3476825
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 July 2021
Accepted: 01 April 2021
Revised: 01 April 2021
Received: 01 November 2020
Published in CSUR Volume 54, Issue 7

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Differential privacy
  2. game theory
  3. mechanism design

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Australia Research Council

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)304
  • Downloads (Last 6 weeks)26
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Scenario-based Adaptations of Differential Privacy: A Technical SurveyACM Computing Surveys10.1145/365115356:8(1-39)Online publication date: 26-Apr-2024
  • (2024)SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of ThingsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.342023319(6978-6990)Online publication date: 2024
  • (2024)Attribute-Based Membership Inference Attacks and Defenses on GANsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.330559121:4(2376-2393)Online publication date: Jul-2024
  • (2024)A Concurrent Federated Reinforcement Learning for IoT Resources Allocation With Local Differential PrivacyIEEE Internet of Things Journal10.1109/JIOT.2023.331211811:4(6537-6550)Online publication date: 15-Feb-2024
  • (2024)How to dissolve the “privacy paradox” in social networks? A game approach based on privacy calculusKybernetes10.1108/K-03-2024-0544Online publication date: 11-Jun-2024
  • (2024)Advances in Differential Privacy and Differentially Private Machine LearningInformation Technology Security10.1007/978-981-97-0407-1_7(147-188)Online publication date: 2-Apr-2024
  • (2023)Machine Unlearning: A SurveyACM Computing Surveys10.1145/360362056:1(1-36)Online publication date: 28-Aug-2023
  • (2023)Learning Games for Defending Advanced Persistent Threats in Cyber SystemsIEEE Transactions on Systems, Man, and Cybernetics: Systems10.1109/TSMC.2022.321186653:4(2410-2422)Online publication date: Apr-2023
  • (2023)Adaptive Observability for Forensic-Ready Microservice SystemsIEEE Transactions on Services Computing10.1109/TSC.2023.329047416:5(3196-3209)Online publication date: Sep-2023
  • (2023)A Personalized Privacy Preserving Mechanism for Crowdsourced Federated LearningIEEE Transactions on Mobile Computing10.1109/TMC.2023.323763623:2(1568-1585)Online publication date: 17-Jan-2023
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media