{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:17:25Z","timestamp":1743121045116,"version":"3.40.3"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030235963"},{"type":"electronic","value":"9783030235970"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23597-0_10","type":"book-chapter","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T11:03:48Z","timestamp":1561028628000},"page":"124-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Model"],"prefix":"10.1007","author":[{"given":"Yan","family":"Huang","sequence":"first","affiliation":[]},{"given":"Zhipeng","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Anu G.","family":"Bourgeois","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,21]]},"reference":[{"key":"10_CR1","unstructured":"The Equifax data breach. https:\/\/www.ftc.gov\/equifax-data-breach"},{"key":"10_CR2","unstructured":"Facebook security breach exposes accounts of 50 million users. https:\/\/www.nytimes.com\/2018\/09\/28\/technology\/facebook-hack-data-breach.html . Accessed 28 Sept 2018"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Cai, Z., He, Z.: Trading private range counting over big IoT data. In: The 39th IEEE International Conference on Distributed Computing Systems, July 2019","DOI":"10.1109\/ICDCS.2019.00023"},{"issue":"4","key":"10_CR4","first-page":"577","volume":"15","author":"Z Cai","year":"2018","unstructured":"Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Depend. Secure Comput. 15(4), 577\u2013590 (2018)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE TNSE 1 (2018)","DOI":"10.1109\/TNSE.2018.2830307"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Cai, Z., Zheng, X., Yu, J.: A differential-private framework for urban traffic flows estimation via taxi companies. IEEE Trans. Ind. Inform. (2019)","DOI":"10.1109\/TII.2019.2911697"},{"key":"10_CR7","first-page":"44","volume":"118","author":"N Capurso","year":"2018","unstructured":"Capurso, N., Mei, B., Song, T., Cheng, X., Yu, J.: A survey on key fields of context awareness for mobile devices. JNCA 118, 44\u201360 (2018)","journal-title":"JNCA"},{"issue":"1","key":"10_CR8","first-page":"58","volume":"6","author":"M Clerc","year":"2002","unstructured":"Clerc, M., Kennedy, J.: The particle swarm - explosion, stability, and convergence in a multidimensional complex space. IEEE TEC 6(1), 58\u201373 (2002)","journal-title":"IEEE TEC"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Cormode, G., Jha, S., Kulkarni, T., Li, N., Srivastava, D., Wang, T.: Privacy at scale: local differential privacy in practice. In: SIGMOD, pp. 1655\u20131658 (2018)","DOI":"10.1145\/3183713.3197390"},{"issue":"12","key":"10_CR10","first-page":"2360","volume":"12","author":"R Dewri","year":"2013","unstructured":"Dewri, R.: Local differential perturbations: location privacy under approximate knowledge attackers. IEEE TMC 12(12), 2360\u20132372 (2013)","journal-title":"IEEE TMC"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Erlingsson, U., Pihur, V., Korolova, A.: Rappor: Randomized aggregatable privacy-preserving ordinal response. In: CCS. ACM (2014)","DOI":"10.1145\/2660267.2660348"},{"key":"10_CR12","unstructured":"Filkins, B.: Sensitive data at risk: the SANS 2017 data protection survey, September 2017"},{"issue":"2","key":"10_CR13","first-page":"84","volume":"10","author":"J Freudiger","year":"2013","unstructured":"Freudiger, J., Manshaei, M.H., Hubaux, J.P., Parkes, D.C.: Non-cooperative location privacy. TDSC 10(2), 84\u201398 (2013)","journal-title":"TDSC"},{"issue":"1","key":"10_CR14","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1109\/TVT.2017.2738018","volume":"67","author":"Z He","year":"2018","unstructured":"He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665\u2013673 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"8","key":"10_CR15","doi-asserted-by":"crossref","first-page":"7698","DOI":"10.1109\/TVT.2018.2838041","volume":"67","author":"Q Hu","year":"2018","unstructured":"Hu, Q., Wang, S., Hu, C., Huang, J., Li, W., Cheng, X.: Messages in a concealed bottle: achieving query content privacy with accurate location-based services. IEEE Trans. Veh. Technol. 67(8), 7698\u20137711 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10_CR16","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.jnca.2017.12.002","volume":"103","author":"Y Huang","year":"2018","unstructured":"Huang, Y., Cai, Z., Bourgeois, A.G.: Search locations safely and accurately: a location privacy protection algorithm with accurate service. J. Netw. Comput. Appl. 103, 146\u2013156 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"10_CR17","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s00199-008-0419-8","volume":"43","author":"MK Jensen","year":"2010","unstructured":"Jensen, M.K.: Aggregative games and best-reply potentials. Econ. Theory 43(1), 45\u201366 (2010)","journal-title":"Econ. Theory"},{"key":"10_CR18","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.cose.2015.07.004","volume":"55","author":"Y Jia","year":"2015","unstructured":"Jia, Y., Chen, Y., Dong, X., Saxena, P., Mao, J., Liang, Z.: Man-in-the-browser-cache: persisting https attacks via browser cache poisoning. Comput. Secur. 55, 62\u201380 (2015)","journal-title":"Comput. Secur."},{"issue":"10","key":"10_CR19","first-page":"797","volume":"7","author":"U Jugel","year":"2014","unstructured":"Jugel, U., Jerzak, Z., Hackenbroich, G., Markl, V.: M4: a visualization-oriented time series data aggregation. VLDB 7(10), 797\u2013808 (2014)","journal-title":"VLDB"},{"key":"10_CR20","unstructured":"Kairouz, P., Oh, S., Viswanath, P.: Extremal mechanisms for local differential privacy. In: Advances in Neural Information Processing Systems, vol. 27, pp. 2879\u20132887. Curran Associates, Inc., Red Hook (2014)"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-31540-4_6","volume-title":"Data and Applications Security and Privacy XXVI","author":"R Karimi Adl","year":"2012","unstructured":"Karimi Adl, R., Askari, M., Barker, K., Safavi-Naini, R.: Privacy consensus in anonymization systems via game theory. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 74\u201389. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31540-4_6"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106\u2013115, April 2007","DOI":"10.1109\/ICDE.2007.367856"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Li, W., Song, T., Li, Y., Ma, L., Yu, J., Cheng, X.: A hierarchical game framework for data privacy preservation in context-aware IoT applications. In: 2017 IEEE Symposium on Privacy-Aware Computing (PAC), pp. 176\u2013177, August 2017","DOI":"10.1109\/PAC.2017.26"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Li, W., Hu, C., Song, T., Yu, J., Xing, X., Cai, Z.: Preserving data privacy in context-aware applications through hierarchical game. In: SPAC, Washington DC, USA, September 2018","DOI":"10.1109\/PAC.2018.00014"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Liang, Y., Cai, Z., Han, Q., Li, Y.: Location privacy leakage through sensory data. Secur. Commun. Netw. 2017 (2017)","DOI":"10.1155\/2017\/7576307"},{"issue":"4","key":"10_CR26","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MNET.2018.1700349","volume":"32","author":"Y Liang","year":"2018","unstructured":"Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8\u201314 (2018)","journal-title":"IEEE Netw."},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Liu, C., Wang, S., Ma, L., Cheng, X., Bie, R., Yu, J.: Mechanism design games for thwarting malicious behavior in crowdsourcing applications. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1\u20139, May 2017","DOI":"10.1109\/INFOCOM.2017.8057176"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, K., Guo, L., Li, X., Fang, Y.: A game-theoretic approach for achieving k-anonymity in location based services. In: IEEE INFOCOM, April 2013","DOI":"10.1109\/INFCOM.2013.6567110"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Ma, R., Xiong, J., Lin, M., Yao, Z., Lin, H., Ye, A.: Privacy protection-oriented mobile crowdsensing analysis based on game theory. In: IEEE TBDI, pp. 990\u2013995, August 2017","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.342"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Venkitasubramaniam, M., Kifer, D., Gehrke, J.: l-diversity: Privacy beyond k-anonymity. In: ICDE, p. 24, April 2006","DOI":"10.1109\/ICDE.2006.1"},{"issue":"1","key":"10_CR31","first-page":"120","volume":"4","author":"S Maharjan","year":"2013","unstructured":"Maharjan, S., Zhu, Q., Zhang, Y., Gjessing, S., Basar, T.: Dependable demand response management in the smart grid: a stackelberg game approach. IEEE TSG 4(1), 120\u2013132 (2013)","journal-title":"IEEE TSG"},{"issue":"3","key":"10_CR32","first-page":"712","volume":"18","author":"MKE Mahrsi","year":"2017","unstructured":"Mahrsi, M.K.E., C\u00f4me, E., Oukhellou, L., Verleysen, M.: Clustering smart card data for urban mobility analysis. IEEE TITSyst. 18(3), 712\u2013728 (2017)","journal-title":"IEEE TITSyst."},{"issue":"1","key":"10_CR33","first-page":"279","volume":"2018","author":"J Mao","year":"2018","unstructured":"Mao, J., Tian, W., Jiang, J., He, Z., Zhou, Z., Liu, J.: Understanding structure-based social network de-anonymization techniques via empirical analysis. EURASIP JWCN 2018(1), 279 (2018)","journal-title":"EURASIP JWCN"},{"issue":"2","key":"10_CR34","doi-asserted-by":"crossref","first-page":"435","DOI":"10.2307\/2525757","volume":"18","author":"W Meeusen","year":"1977","unstructured":"Meeusen, W., van Den Broeck, J.: Efficiency estimation from Cobb-Douglas production functions with composed error. Int. Econ. Rev. 18(2), 435\u2013444 (1977)","journal-title":"Int. Econ. Rev."},{"issue":"488","key":"10_CR35","first-page":"F394","volume":"113","author":"M Miltiadis","year":"2001","unstructured":"Miltiadis, M.: The theory of incentives: the principal-agent model. Econ. J. 113(488), F394\u2013F395 (2001)","journal-title":"Econ. J."},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Pastore, A., Gastpar, M.: Locally differentially-private distribution estimation. In: IEEE ISIT, pp. 2694\u20132698, July 2016","DOI":"10.1109\/ISIT.2016.7541788"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Qin, Z., Yang, Y., Yu, T., Khalil, I., Xiao, X., Ren, K.: Heavy hitter estimation over set-valued data with local differential privacy. In: CCS. ACM (2016)","DOI":"10.1145\/2976749.2978409"},{"key":"10_CR38","unstructured":"Thakurta, A.G., et al.: Emoji frequency detection and deep link frequency (2017)"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Vakilinia, I., Tosh, D.K., Sengupta, S.: 3-way game model for privacy-preserving cybersecurity information exchange framework. In: MILCOM, October 2017","DOI":"10.1109\/MILCOM.2017.8170842"},{"key":"10_CR40","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1007\/s00779-018-1124-7","volume":"22","author":"J Wang","year":"2018","unstructured":"Wang, J., Cai, Z., Li, Y., Yang, D., Li, J., Gao, H.: Protecting query privacy with differentially private k-anonymity in location-based services. Pers. Ubiquitous Comput. 22, 453\u2013469 (2018)","journal-title":"Pers. Ubiquitous Comput."},{"issue":"3","key":"10_CR41","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/MCOM.2018.1700288","volume":"56","author":"S Wang","year":"2018","unstructured":"Wang, S., Hu, Q., Sun, Y., Huang, J.: Privacy preservation in location-based services. IEEE Commun. Mag. 56(3), 134\u2013140 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"10_CR42","doi-asserted-by":"crossref","unstructured":"Wang, S., Huang, J., Li, L., Ma, L., Cheng, X.: Quantum game analysis of privacy-leakage for application ecosystems. In: MobiHoc, July 2017","DOI":"10.1145\/3084041.3084059"},{"issue":"2","key":"10_CR43","doi-asserted-by":"crossref","first-page":"339","DOI":"10.3390\/s17020339","volume":"17","author":"S Wang","year":"2017","unstructured":"Wang, S., Li, L., Sun, W., Guo, J., Bie, R., Lin, K.: Context sensing system analysis for privacy preservation based on game theory. Sensors 17(2), 339 (2017)","journal-title":"Sensors"},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"Wu, X., Dou, W., Ni, Q.: Game theory based privacy preserving analysis in correlated data publication. In: ACSW, February 2017","DOI":"10.1145\/3014812.3014887"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Xu, L., Jiang, C., Qian, Y., Li, J., Zhao, Y., Ren, Y.: Privacy-accuracy trade-off in differentially-private distributed classification: a game theoretical approach. IEEE TBD 1 (2017)","DOI":"10.1109\/TBDATA.2017.2777968"},{"issue":"9","key":"10_CR46","first-page":"2422","volume":"16","author":"C Yi","year":"2017","unstructured":"Yi, C., Cai, J.: A priority-aware truthful mechanism for supporting multi-class delay-sensitive medical packet transmissions in e-Health networks. IEEE TMC 16(9), 2422\u20132435 (2017)","journal-title":"IEEE TMC"},{"key":"10_CR47","doi-asserted-by":"crossref","unstructured":"Ying, B., Nayak, A.: Location privacy-protection based on p-destination in mobile social networks: a game theory analysis. In: IEEE CDSC, pp. 243\u2013250, August 2017","DOI":"10.1109\/DESEC.2017.8073812"},{"key":"10_CR48","doi-asserted-by":"crossref","unstructured":"Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM, pp. 1\u20139, May 2017","DOI":"10.1109\/INFOCOM.2017.8056976"},{"issue":"9","key":"10_CR49","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MCOM.2018.1701245","volume":"56","author":"X Zheng","year":"2018","unstructured":"Zheng, X., Cai, Z., Li, Y.: Data linkage in smart internet of things systems: a consideration from a privacy perspective. IEEE Commun. Mag. 56(9), 55\u201361 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"10_CR50","doi-asserted-by":"crossref","first-page":"1868","DOI":"10.1109\/JIOT.2017.2679483","volume":"4","author":"X Zheng","year":"2017","unstructured":"Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE Internet Things J. 4(6), 1868\u20131878 (2017)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23597-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,29]],"date-time":"2019-11-29T17:12:25Z","timestamp":1575047545000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-23597-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030235963","9783030235970"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23597-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"21 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Honolulu, HI","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"143","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}