{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:48Z","timestamp":1750220808722,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T00:00:00Z","timestamp":1561680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1616575, CNS-1646019, CNS-1739517"],"award-info":[{"award-number":["CNS-1616575, CNS-1646019, CNS-1739517"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,28]]},"DOI":"10.1145\/3338506.3340273","type":"proceedings-article","created":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T12:34:36Z","timestamp":1564058076000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Contract design for purchasing private data using a biased differentially private algorithm"],"prefix":"10.1145","author":[{"given":"Mohammad Mahdi","family":"Khalili","sequence":"first","affiliation":[{"name":"University of Michigan"}]},{"given":"Xueru","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Mingyan","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Michigan"}]}],"member":"320","published-online":{"date-parts":[[2019,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Datacoup. http:\/\/datacoup.com\/. Datacoup. http:\/\/datacoup.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Online Appendix. Available at http:\/\/bit.ly\/2Fi4k9w. Online Appendix. Available at http:\/\/bit.ly\/2Fi4k9w."},{"volume-title":"On the Protection of Private Information in Machine Learning Systems: Two Recent Approches. In 2017 IEEE 30th Computer Security Foundations Symposium (CSF). 1--6.","author":"Abadi M.","key":"e_1_3_2_1_3_1","unstructured":"M. Abadi , \u00c3\u017d. Erlingsson, I. Goodfellow , H. B. McMahan , I. Mironov , N. Papernot , K. Talwar , and L. Zhang . 2017 . On the Protection of Private Information in Machine Learning Systems: Two Recent Approches. In 2017 IEEE 30th Computer Security Foundations Symposium (CSF). 1--6. M. Abadi, \u00c3\u017d. Erlingsson, I. Goodfellow, H. B. McMahan, I. Mironov, N. Papernot, K. Talwar, and L. Zhang. 2017. On the Protection of Private Information in Machine Learning Systems: Two Recent Approches. In 2017 IEEE 30th Computer Security Foundations Symposium (CSF). 1--6."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2688073.2688106"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229054"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993574.1993605"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.50"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2691190.2691191"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.23919\/SPECTS.2017.8046783"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842171"},{"key":"e_1_3_2_1_14_1","first-page":"7","article-title":"Privacy or Utility in Data Collection? A Contract Theoretic Approach","volume":"9","author":"Xu L.","year":"2015","unstructured":"L. Xu , C. Jiang , Y. Chen , Y. Ren , and K. J. R. Liu . 2015 . Privacy or Utility in Data Collection? A Contract Theoretic Approach . IEEE Journal of Selected Topics in Signal Processing 9 , 7 (Oct 2015), 1256--1269. L. Xu, C. Jiang, Y. Chen, Y. Ren, and K. J. R. Liu. 2015. Privacy or Utility in Data Collection? A Contract Theoretic Approach. IEEE Journal of Selected Topics in Signal Processing 9, 7 (Oct 2015), 1256--1269.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2611487"},{"key":"e_1_3_2_1_16_1","volume-title":"Mohammad Mahdi Khalili, and Mingyan Liu","author":"Zhang Xueru","year":"2018","unstructured":"Xueru Zhang , Mohammad Mahdi Khalili, and Mingyan Liu . 2018 . Improving the Privacy and Accuracy of ADMM-Based Distributed Algorithms . arXiv preprint arXiv:1806.02246 (2018). Xueru Zhang, Mohammad Mahdi Khalili, and Mingyan Liu. 2018. Improving the Privacy and Accuracy of ADMM-Based Distributed Algorithms. arXiv preprint arXiv:1806.02246 (2018)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2018.8635916"}],"event":{"name":"SIGMETRICS '19: ACM SIGMETRICS \/ International Conference on Measurement and Modeling of Computer Systems","acronym":"SIGMETRICS '19","location":"Phoenix Arizona"},"container-title":["Proceedings of the 14th Workshop on the Economics of Networks, Systems and Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338506.3340273","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338506.3340273","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338506.3340273","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:49Z","timestamp":1750201969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338506.3340273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,28]]},"references-count":17,"alternative-id":["10.1145\/3338506.3340273","10.1145\/3338506"],"URL":"https:\/\/doi.org\/10.1145\/3338506.3340273","relation":{},"subject":[],"published":{"date-parts":[[2019,6,28]]},"assertion":[{"value":"2019-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}