Author of the publication

More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design.

, , , , and . ACM Comput. Surv., 54 (7): 136:1-136:37 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy preservation auction in a dynamic social network., , , , and . Concurr. Comput. Pract. Exp., (2022)Location privacy preservation through kernel transformation., , , , and . Concurr. Comput. Pract. Exp., (2022)A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)A Differentially Private Method for Crowdsourcing Data Submission., , and . PAKDD (Workshops), volume 11154 of Lecture Notes in Computer Science, page 142-148. Springer, (2018)Optimizing rewards allocation for privacy-preserving spatial crowdsourcing., , , , and . Comput. Commun., (2019)Private collaborative filtering under untrusted recommender server., , , , and . Future Gener. Comput. Syst., (2020)Integration of Low-Cost GNSS and Monocular Cameras for Simultaneous Localization and Mapping., , , , and . Sensors, 18 (7): 2193 (2018)Active Power Dispatch Plan among Units in DFIG Based Wind Farm., and . Int. J. Comput. Intell. Syst., 8 (1): 44-52 (2015)A differentially private method for crowdsourcing data submission., , , and . Concurr. Comput. Pract. Exp., (2019)Returns Acquiring and HRRP Imaging for Radar Ship Target Recognition., , and . ICDMA, page 1055-1059. IEEE Computer Society, (2011)