{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T17:59:42Z","timestamp":1774979982009,"version":"3.50.1"},"reference-count":53,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102337, 62202307, 62122066, 62372163, 62202150"],"award-info":[{"award-number":["62102337, 62202307, 62122066, 62372163, 62202150"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Natural Science Foundation of\u00a0Hunan Province","doi-asserted-by":"publisher","award":["2023JJ40174"],"award-info":[{"award-number":["2023JJ40174"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Young Elite Scientists Sponsorship Program by CAST","award":["2023QNRC001"],"award-info":[{"award-number":["2023QNRC001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. ACM Manag. Data"],"published-print":{"date-parts":[[2024,10,1]]},"abstract":"<jats:p>\n                    The proliferation of machine learning (ML) applications has given rise to a new and popular data marketplace paradigm. These marketplaces facilitate ML model requesters in obtaining data from data owners to train their desired models. To mitigate the privacy concerns of data owners, federated learning (FL) has been introduced, enabling collaborative model training without raw data trading. Furthermore, researchers have incorporated differential privacy (DP) techniques into FL, resulting in differentially private federated learning (DPFL) to enhance privacy preservation. However, existing designs of DPFL-based data marketplaces consider a\n                    <jats:italic toggle=\"yes\">simplified but unrealistic<\/jats:italic>\n                    scenario where the model requester holds dominant market power, and data owners cannot set their own prices. In this work, we propose a novel DPFL-based data marketplace that accommodates both price-taking and price-setting data owners. We model the interactions among the model requester and these two types of data owners as a three-stage Stackelberg game, focusing on maximizing the model requester's profit. We rigorously establish that the formulated game is a convex game with a unique subgame perfect equilibrium. Moreover, we devise iterative algorithms to determine the equilibrium strategies for the model requester and price-setting data owners. Notably, our algorithms allow data owners to operate without requiring complete information about the model requester or other data owners. Numerical experiments demonstrate the superiority of our proposed three-stage framework in terms of the model requester's profitability compared to scenarios where only price-taking data owners are involved. Furthermore, we reveal that price competition among price-setting data owners reduces equilibrium market prices.\n                  <\/jats:p>","DOI":"10.1145\/3677127","type":"journal-article","created":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T17:41:44Z","timestamp":1727718104000},"page":"1-27","source":"Crossref","is-referenced-by-count":9,"title":["A Profit-Maximizing Data Marketplace with Differentially Private Federated Learning under Price Competition"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6221-8142","authenticated-orcid":false,"given":"Peng","family":"Sun","sequence":"first","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5160-5999","authenticated-orcid":false,"given":"Liantao","family":"Wu","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5804-3279","authenticated-orcid":false,"given":"Zhibo","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2921-2827","authenticated-orcid":false,"given":"Jinfei","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6097-1559","authenticated-orcid":false,"given":"Juan","family":"Luo","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5194-6352","authenticated-orcid":false,"given":"Wenqiang","family":"Jin","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329589"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1137\/16M1080173"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589317"},{"key":"e_1_2_1_5_1","volume-title":"International Conference on Machine Learning. PMLR, 3336--3359","author":"Chen Junjie","year":"2022","unstructured":"Junjie Chen, Minming Li, and Haifeng Xu. 2022. Selling Data To a Machine Learner: Pricing via Costly Signaling. In International Conference on Machine Learning. PMLR, 3336--3359."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300078"},{"key":"e_1_2_1_7_1","unstructured":"DEFINED.AI. [n. d.]. https:\/\/www.defined.ai\/."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00458"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of $$USENIX$$ Security Symposium.","author":"Fang Minghong","year":"2020","unstructured":"Minghong Fang, Xiaoyu Cao, Jinyuan Jia, and Neil Gong. 2020. Local model poisoning attacks to byzantine-robust federated learning. In Proceedings of $$USENIX$$ Security Symposium."},{"key":"e_1_2_1_11_1","volume-title":"CVX: Matlab software for disciplined convex programming, version 2.1","author":"Grant M.","year":"2014","unstructured":"M. Grant and S. Boyd. 2014. CVX: Matlab software for disciplined convex programming, version 2.1. http:\/\/cvxr.com\/cvx (2014)."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322475"},{"key":"e_1_2_1_13_1","volume-title":"Promoting Collaborations in Cross-Silo Federated Learning: Challenges and Opportunities","author":"Huang Chao","year":"2023","unstructured":"Chao Huang, Ming Tang, Qian Ma, Jianwei Huang, and Xin Liu. 2023. Promoting Collaborations in Cross-Silo Federated Learning: Challenges and Opportunities. IEEE Communications Magazine (2023)."},{"key":"e_1_2_1_14_1","unstructured":"Innodata. [n. d.]. https:\/\/innodata.com\/ai-data-marketplace\/."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000058"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01819"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of Advances in Neural Information Processing Systems","volume":"2","author":"LeCun Yann","year":"1989","unstructured":"Yann LeCun, Bernhard Boser, John Denker, Donnie Henderson, Richard Howard, Wayne Hubbard, and Lawrence Jackel. 1989. Handwritten digit recognition with a back-propagation network. Proceedings of Advances in Neural Information Processing Systems, Vol. 2 (1989)."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/3503585.3503598"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00989"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/3447689.3447700"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/3503585.3503592"},{"key":"e_1_2_1_22_1","first-page":"5925","article-title":"On privacy and personalization in cross-silo federated learning","volume":"35","author":"Liu Ken","year":"2022","unstructured":"Ken Liu, Shengyuan Hu, Steven Z Wu, and Virginia Smith. 2022. On privacy and personalization in cross-silo federated learning. Advances in Neural Information Processing Systems, Vol. 35 (2022), 5925--5940.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501811"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3167434"},{"key":"e_1_2_1_25_1","volume-title":"Forbes","volume":"1","author":"Marr Bernard","year":"2017","unstructured":"Bernard Marr. 2017. Where can you buy big data? here are the biggest consumer data brokers. Forbes, Vol. 1 (2017)."},{"key":"e_1_2_1_26_1","volume-title":"Green","author":"Mas-Colell Andreu","year":"1995","unstructured":"Andreu Mas-Colell, Michael D. Whinston, and Jerry R. Green. 1995. Microeconomic Theory. Oxford University Press, New York."},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of Artificial Intelligence and Statistics.","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Proceedings of Artificial Intelligence and Statistics."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3045927"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.2307\/1911749"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2688402"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1483085"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3118354"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796833"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599500"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2021.3055076"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01174"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2880722"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"e_1_2_1_39_1","first-page":"217","article-title":"How machines learn: where do companies get data for machine learning and what licenses do they need","volume":"13","author":"Wilka Rachel","year":"2017","unstructured":"Rachel Wilka, Rachel Landy, and Scott A McKinney. 2017. How machines learn: where do companies get data for machine learning and what licenses do they need. Wash. JL Tech. & Arts, Vol. 13 (2017), 217.","journal-title":"Wash. JL Tech. & Arts"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589264"},{"key":"e_1_2_1_41_1","volume-title":"International Conference on Machine Learning. PMLR, 10495--10503","author":"Xie Cong","year":"2020","unstructured":"Cong Xie, Sanmi Koyejo, and Indranil Gupta. 2020. Zeno: Robust fully asynchronous SGD. In International Conference on Machine Learning. PMLR, 10495--10503."},{"key":"e_1_2_1_42_1","volume-title":"Online Data Valuation and Pricing for Machine Learning Tasks in Mobile Health. In IEEE INFOCOM 2022-IEEE Conference on Computer Communications. IEEE, 850--859","author":"Xu Anran","year":"2022","unstructured":"Anran Xu, Zhenzhe Zheng, Fan Wu, and Guihai Chen. 2022. Online Data Valuation and Pricing for Machine Learning Tasks in Mobile Health. In IEEE INFOCOM 2022-IEEE Conference on Computer Communications. IEEE, 850--859."},{"key":"e_1_2_1_43_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Yang Yuchen","year":"2023","unstructured":"Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, and Yinzhi Cao. 2023. $$PrivateFL$$: Accurate, Differentially Private Federated Learning via Personalized Data Transformation. In 32nd USENIX Security Symposium (USENIX Security 23). 1595--1612."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.414651"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3181509"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228953"},{"key":"e_1_2_1_47_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Yue Kai","year":"2023","unstructured":"Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, and Huaiyu Dai. 2023. Gradient obfuscation gives a false sense of security in federated learning. In 32nd USENIX Security Symposium (USENIX Security 23). 6381--6398."},{"key":"e_1_2_1_48_1","unstructured":"Zaloni. [n. d.]. https:\/\/www.zaloni.com\/next-generation-data-marketplace\/."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3140131"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2019.1915"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.14778\/3587136.3587141"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10020232"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of Advances in Neural Information Processing Systems. n","author":"Zhu Ligeng","year":"2019","unstructured":"Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep leakage from gradients. In Proceedings of Advances in Neural Information Processing Systems. n"}],"container-title":["Proceedings of the ACM on Management of Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677127","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3677127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T17:10:58Z","timestamp":1774977058000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":53,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,10,1]]}},"alternative-id":["10.1145\/3677127"],"URL":"https:\/\/doi.org\/10.1145\/3677127","relation":{},"ISSN":["2836-6573"],"issn-type":[{"value":"2836-6573","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,30]]}}}