{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:16:50Z","timestamp":1768339010937,"version":"3.49.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,9]]},"DOI":"10.1109\/cdc57313.2025.11312389","type":"proceedings-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:19:56Z","timestamp":1768241996000},"page":"4071-4076","source":"Crossref","is-referenced-by-count":1,"title":["On the Interplay of Privacy, Persuasion, and Quantization"],"prefix":"10.1109","author":[{"given":"Anju","family":"Anand","sequence":"first","affiliation":[{"name":"Binghamton University&#x2013;SUNY,Binghamton,NY,USA,13902"}]},{"given":"Emrah","family":"Akyol","sequence":"additional","affiliation":[{"name":"Binghamton University&#x2013;SUNY,Binghamton,NY,USA,13902"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2024.3354886"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1257\/aer.101.6.2590"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-economics-080218-025739"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jet.2019.04.008"},{"key":"ref5","first-page":"34","article-title":"Algorithmic aspects of private bayesian persuasion","volume-title":"8th Innovations in Theoretical Computer Science Conference (ITCS 2017)","author":"Babichenko"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3696410.3714854"},{"issue":"22","key":"ref7","first-page":"43","article-title":"Privacy-constrained communication","volume":"49","author":"Farokhi","year":"2016","journal-title":"IFACPapersOnLine"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7402924"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT54713.2023.10206722"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4227690"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2025.3559117"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1109\/CDC57313.2025.11312389","article-title":"On the interplay of privacy, persuasion and quantization","author":"Anand","year":"2025"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton63246.2024.10735318"}],"event":{"name":"2025 IEEE 64th Conference on Decision and Control (CDC)","location":"Rio de Janeiro, Brazil","start":{"date-parts":[[2025,12,9]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["2025 IEEE 64th Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11311984\/11311968\/11312389.pdf?arnumber=11312389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:30:01Z","timestamp":1768293001000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11312389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/cdc57313.2025.11312389","relation":{},"subject":[],"published":{"date-parts":[[2025,12,9]]}}}