{"id":"https://openalex.org/W2735238926","doi":"https://doi.org/10.1145/3084041.3084059","title":"Quantum Game Analysis of Privacy-Leakage for Application Ecosystems","display_name":"Quantum Game Analysis of Privacy-Leakage for Application Ecosystems","publication_year":2017,"publication_date":"2017-07-10","ids":{"openalex":"https://openalex.org/W2735238926","doi":"https://doi.org/10.1145/3084041.3084059","mag":"2735238926"},"language":"en","primary_location":{"id":"doi:10.1145/3084041.3084059","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3084041.3084059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041386552","display_name":"Shengling Wang","orcid":"https://orcid.org/0000-0002-6698-3623"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shengling Wang","raw_affiliation_strings":["College of Information Science and Technology, Beijing Normal University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Beijing Normal University, Beijing, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101859055","display_name":"Jianhui Huang","orcid":"https://orcid.org/0000-0002-5614-1019"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhui Huang","raw_affiliation_strings":["Institute of Computing Technology, The Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, The Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089614577","display_name":"Lu-Yun Li","orcid":null},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Luyun Li","raw_affiliation_strings":["College of Information Science and Technology, Beijing Normal University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Beijing Normal University, Beijing, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037484949","display_name":"Liran Ma","orcid":"https://orcid.org/0000-0002-1003-1770"},"institutions":[{"id":"https://openalex.org/I128956969","display_name":"Texas Christian University","ror":"https://ror.org/054b0b564","country_code":"US","type":"education","lineage":["https://openalex.org/I128956969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Liran Ma","raw_affiliation_strings":["Department of Computer Science, Texas Christian University, Texas, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas Christian University, Texas, USA","institution_ids":["https://openalex.org/I128956969"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100692488","display_name":"Xiuzhen Cheng","orcid":"https://orcid.org/0000-0001-5912-4647"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiuzhen Cheng","raw_affiliation_strings":["Department of Computer Science, The George Washington University, Washington DC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The George Washington University, Washington DC, USA","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5041386552"],"corresponding_institution_ids":["https://openalex.org/I25254941"],"apc_list":null,"apc_paid":null,"fwci":0.7553,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.70693959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9690999984741211,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9545000195503235,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7436600923538208},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7410237193107605},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5220515727996826},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.4968860447406769},{"id":"https://openalex.org/keywords/quantum-entanglement","display_name":"Quantum entanglement","score":0.4511317014694214},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.4290688633918762},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4100303053855896},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.30250096321105957},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11578738689422607}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7436600923538208},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7410237193107605},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5220515727996826},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.4968860447406769},{"id":"https://openalex.org/C121040770","wikidata":"https://www.wikidata.org/wiki/Q215675","display_name":"Quantum entanglement","level":3,"score":0.4511317014694214},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.4290688633918762},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4100303053855896},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.30250096321105957},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11578738689422607},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3084041.3084059","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3084041.3084059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Life in Land","id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1526668070","https://openalex.org/W1555215938","https://openalex.org/W1620538313","https://openalex.org/W1966517804","https://openalex.org/W1976606204","https://openalex.org/W1988410378","https://openalex.org/W2010705953","https://openalex.org/W2019112050","https://openalex.org/W2021497016","https://openalex.org/W2060318973","https://openalex.org/W2060692877","https://openalex.org/W2075153215","https://openalex.org/W2077568170","https://openalex.org/W2085577046","https://openalex.org/W2087804676","https://openalex.org/W2117417568","https://openalex.org/W2125011234","https://openalex.org/W2126105956","https://openalex.org/W2127017105","https://openalex.org/W2148797863","https://openalex.org/W2158888459","https://openalex.org/W2349033663","https://openalex.org/W2484815303","https://openalex.org/W3038125555","https://openalex.org/W3136699861","https://openalex.org/W4298475235","https://openalex.org/W6678938929"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W2258058860","https://openalex.org/W2065830994","https://openalex.org/W2092555887","https://openalex.org/W1964921276","https://openalex.org/W2741523612","https://openalex.org/W2102682197","https://openalex.org/W2101135880","https://openalex.org/W2071709897","https://openalex.org/W3104551701"],"abstract_inverted_index":{"Personalized":[0],"applications":[1,23],"often":[2],"provide":[3],"their":[4,106,224],"functionality":[5],"by":[6],"extracting":[7],"sensitive":[8,27],"data":[9,28],"from":[10,42,64,129,192],"users.":[11],"Such":[12],"a":[13,43,51,65,118,130],"strategy":[14],"brings":[15],"potential":[16],"threats":[17],"to":[18,29,96,146,166,205],"users'":[19,26],"privacy":[20,39,60,126,208],"because":[21,154],"malicious":[22],"may":[24],"sell":[25],"third-parties":[30],"for":[31,121],"economic":[32],"interests.":[33],"The":[34,211],"state-of-the-art":[35],"literature":[36],"addresses":[37],"the":[38,56,77,98,102,109,140,148,155,169,174,188,196,203,207,217,228,231],"issue":[40],"mainly":[41],"technical":[44],"perspective.":[45],"In":[46],"this":[47],"paper,":[48],"we":[49,75,201],"take":[50,182],"different":[52],"angle":[53],"in":[54,160],"which":[55,82,114,151],"main":[57],"players":[58,222],"involving":[59],"leakage":[61,209],"are":[62,202],"studied":[63],"connected":[66],"perspective":[67],"rather":[68],"than":[69],"an":[70,183],"isolated":[71],"one.":[72],"More":[73],"specifically,":[74],"propose":[76],"concept":[78],"of":[79,84,111,136,142,158,190,198,230],"application":[80,103,149,232],"ecosystem,":[81,150],"consists":[83],"user,":[85,175],"application,":[86,176],"and":[87,105,124,177,226],"adversary":[88],"(malicious":[89],"third-party)":[90],"as":[91,117],"entities.":[92],"Our":[93],"aim":[94],"is":[95,139,152],"analyze":[97],"tension":[99,171],"forces":[100,172],"inside":[101],"ecosystem":[104],"impacts":[107],"on":[108],"behavior":[110],"each":[112],"player,":[113],"can":[115,163],"serve":[116],"theoretical":[119],"basis":[120],"designing":[122],"effective":[123],"efficient":[125],"preservation":[127],"solutions":[128],"management":[131],"level.":[132],"Another":[133],"outstanding":[134],"trait":[135],"our":[137,199],"analysis":[138],"adoption":[141],"quantum":[143,161],"game":[144],"theory":[145],"model":[147],"suitable":[153],"important":[156,184],"property":[157],"entanglement":[159],"games":[162],"be":[164],"employed":[165],"well":[167],"depict":[168],"inner":[170],"among":[173,220],"adversary.":[178],"This":[179],"makes":[180],"us":[181],"step":[185],"towards":[186],"understanding":[187],"complexity":[189],"decision-making":[191],"rational":[193],"individuals.":[194],"To":[195],"best":[197],"knowledge,":[200],"first":[204],"quantize":[206],"issue.":[210],"simulation":[212],"results":[213],"quantitatively":[214],"demonstrate":[215],"how":[216],"mutual":[218],"restrictions":[219],"all":[221],"determine":[223],"strategies":[225],"hence":[227],"development":[229],"ecosystem.":[233]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
