{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:05:53Z","timestamp":1755799553314,"version":"3.44.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030015534"},{"type":"electronic","value":"9783030015541"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01554-1_21","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T11:47:56Z","timestamp":1537876076000},"page":"366-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation"],"prefix":"10.1007","author":[{"given":"Luyao","family":"Niu","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Clark","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, Y., Balaji, B., Gupta, R., Lyles, J., Wei, M., Weng, T.: Occupancy-driven energy management for smart building automation. In: Proceedings of the Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, pp. 1\u20136. ACM (2010)","DOI":"10.1145\/1878431.1878433"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD Record, vol. 29, pp. 439\u2013450. ACM (2000)","DOI":"10.1145\/335191.335438"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Archer, A., Tardos, \u00c9.: Truthful mechanisms for one-parameter agents. In: Proceedings of the Symposium on Foundations of Computer Science, pp. 482\u2013491. IEEE (2001)","DOI":"10.1109\/SFCS.2001.959924"},{"issue":"4","key":"21_CR4","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/0191-2615(84)90016-X","volume":"18","author":"M Ben-Akiva","year":"1984","unstructured":"Ben-Akiva, M., Cyna, M., De Palma, A.: Dynamic model of peak period congestion. Transp. Res. Part B: Methodol. 18(4), 339\u2013355 (1984)","journal-title":"Transp. Res. Part B: Methodol."},{"key":"21_CR5","unstructured":"Brown, M.: Report: Seattle one of the worst U.S. cities for traffic congestion, tied with NYC. http:\/\/www.geekwire.com\/2015\/report-finds-seattle-is-one-of-the-worst-u-s-cities-for-traffic-congestion-tied-with-new-york\/"},{"issue":"2","key":"21_CR6","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TAC.2012.2209975","volume":"58","author":"G Como","year":"2013","unstructured":"Como, G., Savla, K., Acemoglu, D., Dahleh, M.A., Frazzoli, E.: Robust distributed routing in dynamical networks\u2013part II: strong resilience, equilibrium selection and cascaded failures. Trans. Autom. Control 58(2), 333\u2013348 (2013)","journal-title":"Trans. Autom. Control"},{"issue":"2","key":"21_CR7","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/TAC.2012.2209951","volume":"58","author":"G Como","year":"2013","unstructured":"Como, G., Savla, K., Acemoglu, D., Dahleh, M.A., Frazzoli, E.: Robust distributed routing in dynamical networks\u2013part I: locally responsive policies and weak resilience. Trans. Autom. Control 58(2), 317\u2013332 (2013)","journal-title":"Trans. Autom. Control"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Fiez, T., Ratliff, L.J., Dowling, C., Zhang, B.: Data-driven spatio-temporal modeling of parking demand (2018)","DOI":"10.23919\/ACC.2018.8431681"},{"issue":"3","key":"21_CR11","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1109\/TITS.2013.2252428","volume":"14","author":"Y Geng","year":"2013","unstructured":"Geng, Y., Cassandras, C.G.: New \u201csmart parking\u201d system based on resource allocation and reservations. Trans. Intell. Transp. Syst. 14(3), 1129\u20131139 (2013)","journal-title":"Trans. Intell. Transp. Syst."},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Gupta, A., Ligett, K., McSherry, F., Roth, A., Talwar, K.: Differentially private combinatorial optimization. In: Proceedings of the Symposium on Discrete Algorithms, pp. 1106\u20131125. SIAM (2010)","DOI":"10.1137\/1.9781611973075.90"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1146\/annurev-control-060117-105018","volume":"1","author":"S Han","year":"2018","unstructured":"Han, S., Pappas, G.J.: Privacy in control and dynamical systems. Annu. Rev. Control Robot. Autonom. Syst. 1, 309\u2013332 (2018)","journal-title":"Annu. Rev. Control Robot. Autonom. Syst."},{"issue":"4","key":"21_CR14","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MPRV.2006.69","volume":"5","author":"B Hoh","year":"2006","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. Pervasive Comput. 5(4), 38\u201346 (2006)","journal-title":"Pervasive Comput."},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Huang, Z., Kannan, S.: The exponential mechanism for social welfare: private, truthful, and nearly optimal. In: Proceedings of the Symposium on Foundations of Computer Science, pp. 140\u2013149. IEEE (2012)","DOI":"10.1109\/FOCS.2012.36"},{"key":"21_CR16","unstructured":"ISO New England Inc.: Five minute system demand. https:\/\/www.iso-ne.com\/isoexpress\/web\/reports\/load-and-demand"},{"key":"21_CR17","unstructured":"Kleiner, A., Nebel, B., Ziparo, V.: A mechanism for dynamic ride sharing based on parallel auctions (2011)"},{"key":"21_CR18","volume-title":"Auction Theory","author":"V Krishna","year":"2009","unstructured":"Krishna, V.: Auction Theory. Academic Press, Cambridge (2009)"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Lam, K., Krichene, W., Bayen, A.: On learning how players learn: estimation of learning dynamics in the routing game. In: Proceedings of the International Conference on Cyber-Physical Systems, pp. 1\u201310. IEEE (2016)","DOI":"10.1109\/ICCPS.2016.7479108"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Ma, S., Zheng, Y., Wolfson, O.: T-share: a large-scale dynamic taxi ridesharing service. In: International Conference on Data Engineering, pp. 410\u2013421. IEEE (2013)","DOI":"10.1109\/ICDE.2013.6544843"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. In: Proceedings of the International Conference on Data Engineering, p. 24. IEEE (2006)","DOI":"10.1109\/ICDE.2006.1"},{"issue":"3","key":"21_CR22","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P McDaniel","year":"2009","unstructured":"McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. Secur. Priv. 7(3), 75\u201377 (2009)","journal-title":"Secur. Priv."},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: Symposium on Foundations of Computer Science, pp. 94\u2013103. IEEE (2007)","DOI":"10.1109\/FOCS.2007.66"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Miao, F., Han, S., Hendawi, A.M., Khalefa, M.E., Stankovic, J.A., Pappas, G.J.: Data-driven distributionally robust vehicle balancing using dynamic region partitions. In: Proceedings of the International Conference on Cyber-Physical Systems, pp. 261\u2013271. ACM (2017)","DOI":"10.1145\/3055004.3055024"},{"issue":"2","key":"21_CR25","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/TASE.2016.2529580","volume":"13","author":"F Miao","year":"2016","unstructured":"Miao, F., et al.: Taxi dispatch with real-time sensing data in metropolitan areas: a receding horizon control approach. Trans. Autom. Sci. Eng. 13(2), 463\u2013478 (2016)","journal-title":"Trans. Autom. Sci. Eng."},{"issue":"3","key":"21_CR26","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TIT.2002.808134","volume":"49","author":"P Moulin","year":"2003","unstructured":"Moulin, P., O\u2019Sullivan, J.A.: Information-theoretic analysis of information hiding. Trans. Inf. Theory 49(3), 563\u2013593 (2003)","journal-title":"Trans. Inf. Theory"},{"issue":"6","key":"21_CR27","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MC.2011.187","volume":"44","author":"M Naphade","year":"2011","unstructured":"Naphade, M., Banavar, G., Harrison, C., Paraszczak, J., Morris, R.: Smarter cities and their innovation challenges. Computer 44(6), 32\u201339 (2011)","journal-title":"Computer"},{"key":"21_CR28","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481","volume-title":"Algorithmic Game Theory","author":"N Nisan","year":"2007","unstructured":"Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V.: Algorithmic Game Theory. Cambridge University Press, Cambridge (2007)"},{"issue":"7","key":"21_CR29","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1177\/0278364912444766","volume":"31","author":"M Pavone","year":"2012","unstructured":"Pavone, M., Smith, S.L., Frazzoli, E., Rus, D.: Robotic load balancing for mobility-on-demand systems. Int. J. Robot. Res. 31(7), 839\u2013854 (2012)","journal-title":"Int. J. Robot. Res."},{"issue":"3","key":"21_CR30","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1016\/j.ejor.2016.08.029","volume":"257","author":"J Schuijbroek","year":"2017","unstructured":"Schuijbroek, J., Hampshire, R.C., Van Hoeve, W.J.: Inventory rebalancing and vehicle routing in bike sharing systems. Eur. J. Oper. Res. 257(3), 992\u20131004 (2017)","journal-title":"Eur. J. Oper. Res."},{"issue":"05","key":"21_CR31","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"21_CR32","doi-asserted-by":"crossref","unstructured":"Tumova, J., Karaman, S., Belta, C., Rus, D.: Least-violating planning in road networks from temporal logic specifications. In: Proceedings of the International Conference on Cyber-Physical Systems, p. 17. IEEE Press (2016)","DOI":"10.1109\/ICCPS.2016.7479106"},{"issue":"1","key":"21_CR33","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1111\/j.1540-6261.1961.tb02789.x","volume":"16","author":"W Vickrey","year":"1961","unstructured":"Vickrey, W.: Counterspeculation, auctions, and competitive sealed tenders. J. Financ. 16(1), 8\u201337 (1961)","journal-title":"J. Financ."},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, R., Rossi, F., Pavone, M.: Model predictive control of autonomous mobility-on-demand systems. In: Proceedings of the International Conference on Robotics and Automation, pp. 1382\u20131389. IEEE (2016)","DOI":"10.1109\/ICRA.2016.7487272"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01554-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T00:17:02Z","timestamp":1755649022000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-01554-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030015534","9783030015541"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01554-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"26 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seattle, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.gamesec-conf.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Three of the full papers and two of the short papers were submitted to a special track on Adversarial AI.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}