{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:17:01Z","timestamp":1768339021116,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS#2339775, CCF-230337, CNS#2232693"],"award-info":[{"award-number":["CNS#2339775, CCF-230337, CNS#2232693"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF- 23-1-003"],"award-info":[{"award-number":["W911NF- 23-1-003"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1145\/3696410.3714854","type":"proceedings-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T16:42:02Z","timestamp":1746463322000},"page":"1425-1440","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Differentially Private Bayesian Persuasion"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7603-5886","authenticated-orcid":false,"given":"Yuqi","family":"Pan","sequence":"first","affiliation":[{"name":"Harvard University, Cambridge, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8125-8227","authenticated-orcid":false,"given":"Zhiwei Steven","family":"Wu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6371-4906","authenticated-orcid":false,"given":"Haifeng","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2575-8283","authenticated-orcid":false,"given":"Shuran","family":"Zheng","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.20140737"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jet.2019.04.008"},{"key":"e_1_3_2_1_3_1","volume-title":"8th Innovations in Theoretical Computer Science Conference (ITCS","author":"Babichenko Yakov","year":"2017","unstructured":"Yakov Babichenko and Siddharth Barman. 2017. Algorithmic aspects of private Bayesian persuasion. In 8th Innovations in Theoretical Computer Science Conference (ITCS 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2022.09.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i6.16648"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-economics-080315-015439"},{"key":"e_1_3_2_1_7_1","volume-title":"The design and price of information. American economic review","author":"Bergemann Dirk","year":"2018","unstructured":"Dirk Bergemann, Alessandro Bonatti, and Alex Smolin. 2018. The design and price of information. American economic review, Vol. 108, 1 (2018), 1--48."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1257\/jel.20181489"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940753"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229033"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"e_1_3_2_1_12_1","first-page":"16188","article-title":"Online bayesian persuasion","volume":"33","author":"Castiglioni Matteo","year":"2020","unstructured":"Matteo Castiglioni, Andrea Celli, Alberto Marchesi, and Nicola Gatti. 2020. Online bayesian persuasion. Advances in Neural Information Processing Systems, Vol. 33 (2020), 16188--16198.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Machine Learning. PMLR, 1314--1323","author":"Castiglioni Matteo","year":"2021","unstructured":"Matteo Castiglioni, Alberto Marchesi, Andrea Celli, and Nicola Gatti. 2021. Multi-receiver online bayesian persuasion. In International Conference on Machine Learning. PMLR, 1314--1323."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2015.91"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975994.149"},{"key":"e_1_3_2_1_16_1","volume-title":"Constrained information design. Mathematics of Operations Research","author":"Doval Laura","year":"2023","unstructured":"Laura Doval and Vasiliki Skreta. 2023. Constrained information design. Mathematics of Operations Research (2023)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055589.3055591"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35389-6_11"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897583"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033274.3085152"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1086\/701813"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3982\/ECTA19107"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_25_1","volume-title":"Concentrated differential privacy. arXiv preprint arXiv:1603.01887","author":"Dwork Cynthia","year":"2016","unstructured":"Cynthia Dwork and Guy N Rothblum. 2016. Concentrated differential privacy. arXiv preprint arXiv:1603.01887 (2016)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594564"},{"key":"e_1_3_2_1_27_1","volume-title":"A dual perspective on information design. Available at SSRN 3297406","author":"Galperti Simone","year":"2018","unstructured":"Simone Galperti and Jacopo Perego. 2018. A dual perspective on information design. Available at SSRN 3297406 (2018)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2021.1218"},{"key":"e_1_3_2_1_29_1","volume-title":"Algorithmic persuasion with evidence. arXiv preprint arXiv:2008.12626","author":"Hoefer Martin","year":"2020","unstructured":"Martin Hoefer, Pasin Manurangsi, and Alexandros Psomas. 2020. Algorithmic persuasion with evidence. arXiv preprint arXiv:2008.12626 (2020)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-economics-080218-025739"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.101.6.2590"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v6i1.634"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.3982\/TE1805"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Anton Kolotilin Roberto Corrao and Alexander Wolitzky. 2023. Persuasion with non-linear preferences. (2023).","DOI":"10.2139\/ssrn.4204824"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jet.2019.104940"},{"key":"e_1_3_2_1_36_1","volume-title":"Optimal signaling mechanisms in unobservable queues. Operations research","author":"Lingenbrink David","year":"2019","unstructured":"David Lingenbrink and Krishnamurthy Iyer. 2019. Optimal signaling mechanisms in unobservable queues. Operations research, Vol. 67, 5 (2019), 1397--1416."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1257\/mic.20160247"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.3982\/ECTA15674"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2021.2205"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2021.09.005"},{"key":"e_1_3_2_1_41_1","volume-title":"R\u00e9nyi differential privacy. In 2017 IEEE 30th computer security foundations symposium (CSF)","author":"Mironov Ilya","unstructured":"Ilya Mironov. 2017. R\u00e9nyi differential privacy. In 2017 IEEE 30th computer security foundations symposium (CSF). IEEE, 263--275."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2772879.2773237"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability","volume":"4","author":"R\u00e9nyi Alfr\u00e9d","year":"1961","unstructured":"Alfr\u00e9d R\u00e9nyi. 1961. On measures of entropy and information. In Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Contributions to the Theory of Statistics, Vol. 4. University of California Press, 547--562."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jet.2021.105191"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 23rd ACM Conference on Economics and Computation (EC '22)","author":"Ian","unstructured":"Ian M. Schmutte and Nathan Yoder. 2022. Information Design for Differential Privacy. In Proceedings of the 23rd ACM Conference on Economics and Computation (EC '22). Association for Computing Machinery, 1142--1143."},{"key":"e_1_3_2_1_46_1","volume-title":"Bayesian Persuasion: Reduced Form Approach","author":"Toikka Juuso","year":"2022","unstructured":"Juuso Toikka, Akhil Vohra, Rakesh V Vohra, et al. 2022. Bayesian Persuasion: Reduced Form Approach. Penn Institute for Economic Research, Department of Economics, University of ."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975994.165"},{"key":"e_1_3_2_1_48_1","unstructured":"Haifeng Xu Rupert Freeman Vincent Conitzer Shaddin Dughmi and Milind Tambe. 2016. Signaling in Bayesian Stackelberg Games.. In AAMAS. 150--158."}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714854","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:42Z","timestamp":1750295922000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714854"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":48,"alternative-id":["10.1145\/3696410.3714854","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714854","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}