{"id":"https://openalex.org/W4403487604","doi":"https://doi.org/10.3233/faia240734","title":"Preserving the Privacy of Reward Functions in MDPs through Deception","display_name":"Preserving the Privacy of Reward Functions in MDPs through Deception","publication_year":2024,"publication_date":"2024-10-16","ids":{"openalex":"https://openalex.org/W4403487604","doi":"https://doi.org/10.3233/faia240734"},"language":"en","primary_location":{"id":"doi:10.3233/faia240734","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia240734","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240734","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240734","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099801522","display_name":"Shashank Reddy Chirra","orcid":null},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Shashank Reddy Chirra","raw_affiliation_strings":["Singapore Management University"],"affiliations":[{"raw_affiliation_string":"Singapore Management University","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089113099","display_name":"Pradeep Varakantham","orcid":"https://orcid.org/0000-0001-7342-5745"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Pradeep Varakantham","raw_affiliation_strings":["Singapore Management University"],"affiliations":[{"raw_affiliation_string":"Singapore Management University","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000689728","display_name":"Praveen Paruchuri","orcid":"https://orcid.org/0000-0001-8071-5409"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Praveen Paruchuri","raw_affiliation_strings":["International Institute of Information Technology, Hyderabad"],"affiliations":[{"raw_affiliation_string":"International Institute of Information Technology, Hyderabad","institution_ids":["https://openalex.org/I64189192"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5099801522"],"corresponding_institution_ids":["https://openalex.org/I79891267"],"apc_list":null,"apc_paid":null,"fwci":1.0791,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81417471,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9750999808311462,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9639000296592712,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.8864133358001709},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.5419967174530029},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.44887495040893555},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.36072322726249695},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.3098735511302948}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.8864133358001709},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.5419967174530029},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.44887495040893555},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.36072322726249695},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.3098735511302948}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia240734","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia240734","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240734","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia240734","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia240734","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240734","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5299999713897705}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4403487604.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4391375266","https://openalex.org/W2165717120","https://openalex.org/W2039390456","https://openalex.org/W2948663225","https://openalex.org/W2029954793","https://openalex.org/W1992683634","https://openalex.org/W4295295666","https://openalex.org/W2010073985"],"abstract_inverted_index":{"Preserving":[0],"the":[1,55,59,96,121,131,136,150,177,197,205],"privacy":[2,43,147,170,198],"of":[3,7,50,123,199],"preferences":[4],"(or":[5],"rewards)":[6],"a":[8,48,77,92,116,145,158,174],"sequential":[9],"decision-making":[10],"agent":[11],"when":[12],"decisions":[13],"are":[14,105],"observable":[15],"is":[16,157],"crucial":[17],"in":[18,26,45,52,86,120,149,195],"many":[19],"physical":[20],"and":[21,100,133],"cybersecurity":[22],"domains.":[23],"For":[24],"instance,":[25],"wildlife":[27],"monitoring,":[28],"forest":[29],"rangers":[30],"must":[31],"conduct":[32],"surveillance":[33],"without":[34],"revealing":[35],"animal":[36],"locations":[37],"to":[38,62,71,90,166,203],"poachers.":[39],"This":[40],"paper":[41],"addresses":[42],"preservation":[44],"planning":[46,161],"over":[47],"sequence":[49],"actions":[51],"MDPs,":[53],"where":[54],"reward":[56,99,200],"function":[57],"represents":[58],"preference":[60],"structure":[61],"be":[63,208],"protected.":[64],"Observers":[65],"can":[66,207],"use":[67],"Inverse":[68],"RL":[69],"(IRL)":[70],"learn":[72],"these":[73,169],"preferences,":[74],"making":[75],"this":[76,87,112],"challenging":[78],"task.":[79],"Current":[80],"research":[81],"on":[82,95,176,182],"Differential":[83],"Privacy":[84],"(DP)":[85],"setting":[88],"fails":[89],"ensure":[91],"lower":[93],"bound":[94],"minimum":[97],"expected":[98,178],"offers":[101],"theoretical":[102],"guarantees":[103],"that":[104,163,188],"inadequate":[106],"against":[107],"IRL-based":[108],"observers.":[109],"To":[110],"bridge":[111],"gap,":[113],"we":[114,142,186],"propose":[115],"novel":[117,159],"approach":[118,191],"rooted":[119],"theory":[122],"deception.":[124],"Deception":[125],"includes":[126],"two":[127],"models:":[128],"dissimulation":[129],"(hiding":[130],"truth)":[132],"simulation":[134,165],"(showing":[135],"wrong).":[137],"As":[138],"our":[139,189],"first":[140],"contribution,":[141],"theoretically":[143],"demonstrate":[144],"significant":[146],"leak":[148],"current":[151],"dissimulation-based":[152],"method.":[153],"Our":[154],"second":[155],"contribution":[156],"RL-based":[160],"algorithm":[162],"uses":[164],"effectively":[167],"address":[168],"concerns":[171],"while":[172],"ensuring":[173],"guarantee":[175],"reward.":[179],"Through":[180],"experimentation":[181],"multiple":[183],"benchmark":[184],"problems,":[185],"show":[187],"proposed":[190],"outperforms":[192],"existing":[193],"methods":[194],"preserving":[196],"functions.":[201],"Code":[202],"reproduce":[204],"results":[206],"found":[209],"at:":[210],"https://github.com/shshnkreddy/DeceptiveRL":[211]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
