{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:59Z","timestamp":1750306079600,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T00:00:00Z","timestamp":1499644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,10]]},"DOI":"10.1145\/3084041.3084059","type":"proceedings-article","created":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T12:20:18Z","timestamp":1500294018000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Quantum Game Analysis of Privacy-Leakage for Application Ecosystems"],"prefix":"10.1145","author":[{"given":"Shengling","family":"Wang","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, Beijing Normal University, Beijing, China"}]},{"given":"Jianhui","family":"Huang","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, The Chinese Academy of Sciences, Beijing, China"}]},{"given":"Luyun","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Beijing Normal University, Beijing, China"}]},{"given":"Liran","family":"Ma","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Texas Christian University, Texas, USA"}]},{"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The George Washington University, Washington DC, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.64.030301"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Charles H Bennett and David P DiVincenzo. 2000. Quantum information and computation. Nature 404 6775 (2000) 247--255.  Charles H Bennett and David P DiVincenzo. 2000. Quantum information and computation. Nature 404 6775 (2000) 247--255.","DOI":"10.1038\/35005001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766507"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1039111.1039117"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.82.1052"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"e_1_3_2_1_7_1","unstructured":"Manuel Egele Christopher Kruegel Engin Kirda and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS. 177--183.  Manuel Egele Christopher Kruegel Engin Kirda and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS. 177--183."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.1666587"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0896-6273(02)00962-5"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213870"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.83.3077"},{"key":"e_1_3_2_1_15_1","first-page":"2","article-title":"Continuous-variable quantum games","volume":"306","author":"Li H.","year":"2003","journal-title":"Physics"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42836-9_35"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.87"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Edward W Piotrowski and Jan Sladkowski. 2003. Quantum english auctions. Physica A: Statistical Mechanics and its Applications 318 3 (2003) 505--515.  Edward W Piotrowski and Jan Sladkowski. 2003. Quantum english auctions. Physica A: Statistical Mechanics and its Applications 318 3 (2003) 505--515.","DOI":"10.1016\/S0378-4371(02)01533-9"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"David H. Von Seggern. 2016. CRC Standard Curves and Surfaces with Mathematica (3 ed.). CRC Press.  David H. Von Seggern. 2016. CRC Standard Curves and Surfaces with Mathematica (3 ed.). CRC Press.","DOI":"10.1201\/b16001"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848177"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195577"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_3_2_1_24_1","first-page":"173","article-title":"Multiplayer quantum game with continuous variable strategies","volume":"23","author":"Zhou J.","year":"2006","journal-title":"Chinese Journal of Quantum Electronics"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"Mobihoc '17: The Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Chennai India","acronym":"Mobihoc '17"},"container-title":["Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3084041.3084059","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3084041.3084059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:08Z","timestamp":1750217408000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3084041.3084059"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,10]]},"references-count":25,"alternative-id":["10.1145\/3084041.3084059","10.1145\/3084041"],"URL":"https:\/\/doi.org\/10.1145\/3084041.3084059","relation":{},"subject":[],"published":{"date-parts":[[2017,7,10]]},"assertion":[{"value":"2017-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}