{"id":"https://openalex.org/W2885457068","doi":"https://doi.org/10.1109/icc.2018.8422735","title":"Improving Data Utility through Game Theory in Personalized Differential Privacy","display_name":"Improving Data Utility through Game Theory in Personalized Differential Privacy","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2885457068","doi":"https://doi.org/10.1109/icc.2018.8422735","mag":"2885457068"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2018.8422735","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422735","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/Improving_data_utility_through_game_theory_in_personalized_differential_privacy/20794789","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040772796","display_name":"Youyang Qu","orcid":"https://orcid.org/0000-0002-2944-4647"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Youyang Qu","raw_affiliation_strings":["School of Information Technology, Deakin University, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026963407","display_name":"Lei Cui","orcid":null},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lei Cui","raw_affiliation_strings":["School of Information Technology, Deakin University, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Information Technology, Deakin University, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051406984","display_name":"Wanlei Zhou","orcid":"https://orcid.org/0000-0002-1680-2521"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wanlei Zhou","raw_affiliation_strings":["School of Information Technology, Deakin University, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004673608","display_name":"Jun Wu","orcid":"https://orcid.org/0000-0003-2483-6980"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Wu","raw_affiliation_strings":["School of Information Technology, Deakin University, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5040772796"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":0.6769,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.7760066,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"10","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.906379759311676},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7891346216201782},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7459369897842407},{"id":"https://openalex.org/keywords/stochastic-game","display_name":"Stochastic game","score":0.6732109785079956},{"id":"https://openalex.org/keywords/bayesian-game","display_name":"Bayesian game","score":0.6640658378601074},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.584055483341217},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4989778995513916},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.4764174222946167},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4381037950515747},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4303343892097473},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3998590111732483},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2742120623588562},{"id":"https://openalex.org/keywords/repeated-game","display_name":"Repeated game","score":0.26539236307144165},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.14440682530403137},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1155557930469513}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.906379759311676},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7891346216201782},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7459369897842407},{"id":"https://openalex.org/C22171661","wikidata":"https://www.wikidata.org/wiki/Q1074380","display_name":"Stochastic game","level":2,"score":0.6732109785079956},{"id":"https://openalex.org/C200594392","wikidata":"https://www.wikidata.org/wiki/Q812529","display_name":"Bayesian game","level":4,"score":0.6640658378601074},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.584055483341217},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4989778995513916},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.4764174222946167},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4381037950515747},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4303343892097473},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3998590111732483},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2742120623588562},{"id":"https://openalex.org/C202556891","wikidata":"https://www.wikidata.org/wiki/Q1584646","display_name":"Repeated game","level":3,"score":0.26539236307144165},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.14440682530403137},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1155557930469513}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/icc.2018.8422735","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422735","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30120228","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},{"id":"pmh:oai:figshare.com:article/20794789","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Improving_data_utility_through_game_theory_in_personalized_differential_privacy/20794789","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/133536","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/133536","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20794789","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Improving_data_utility_through_game_theory_in_personalized_differential_privacy/20794789","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W56293434","https://openalex.org/W1524752513","https://openalex.org/W1873763122","https://openalex.org/W2019704260","https://openalex.org/W2068220504","https://openalex.org/W2079411451","https://openalex.org/W2119593119","https://openalex.org/W2294137680","https://openalex.org/W2328524933","https://openalex.org/W2343248474","https://openalex.org/W2344811709","https://openalex.org/W2417915283","https://openalex.org/W2487500832","https://openalex.org/W2507088381","https://openalex.org/W2589280626","https://openalex.org/W2608178897","https://openalex.org/W2701059868","https://openalex.org/W2741740309","https://openalex.org/W2743753426","https://openalex.org/W2759819187","https://openalex.org/W2911978475","https://openalex.org/W2963296381","https://openalex.org/W6639246211","https://openalex.org/W6758947373"],"related_works":["https://openalex.org/W3010781909","https://openalex.org/W4200233390","https://openalex.org/W4304208041","https://openalex.org/W4315705624","https://openalex.org/W3116386889","https://openalex.org/W4315488958","https://openalex.org/W4225635684","https://openalex.org/W2605443953","https://openalex.org/W4309618081","https://openalex.org/W4313218046"],"abstract_inverted_index":{"Due":[0],"to":[1,14,85],"dramatically":[2],"increasing":[3],"information":[4],"published":[5],"in":[6,52,98],"social":[7,70],"networks,":[8],"privacy":[9,22,24,32,67,101],"issues":[10],"have":[11],"given":[12],"rise":[13],"public":[15,146],"concerns.":[16],"Although":[17],"the":[18,29,47,50,53,75,86,95,99,107,120,126,131,136,140,143,148,157,161],"presence":[19],"of":[20,49,55,89,109,139],"differential":[21,66,100],"provides":[23],"protection":[25],"with":[26],"theoretical":[27],"foundations,":[28],"trade-off":[30,115,128],"between":[31],"and":[33,81,142,166],"data":[34,56,77,133],"utility":[35,78,134],"still":[36],"demands":[37],"further":[38],"improvement.":[39],"However,":[40],"most":[41],"existing":[42],"works":[43],"do":[44],"not":[45],"consider":[46],"impact":[48],"adversary":[51,144],"measurement":[54],"utility.":[57],"In":[58,124],"this":[59],"paper,":[60],"we":[61,73],"firstly":[62],"propose":[63],"a":[64,110],"personalized":[65],"based":[68],"on":[69,156],"distance.":[71],"Then,":[72],"analyze":[74],"maximum":[76],"when":[79],"users":[80],"adversaries":[82],"are":[83,145,151],"blind":[84],"strategy":[87,149],"sets":[88,138,150],"each":[90],"other.":[91],"We":[92],"formulize":[93],"all":[94],"payoff":[96],"functions":[97],"sense,":[102],"which":[103],"is":[104,116,164],"followed":[105],"by":[106,118],"establishment":[108],"Static":[111],"Bayesian":[112,121],"Game.":[113],"The":[114],"calculated":[117],"deriving":[119],"Nash":[122],"Equilibrium.":[123],"addition,":[125],"in-place":[127],"can":[129],"maximize":[130],"user'":[132],"if":[135],"action":[137],"user":[141],"while":[147],"unrevealed.":[152],"Our":[153],"extensive":[154],"experiments":[155],"real-world":[158],"dataset":[159],"prove":[160],"proposed":[162],"model":[163],"effective":[165],"feasible.":[167]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
