{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:49:08Z","timestamp":1755802148801,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T00:00:00Z","timestamp":1741564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,10]]},"DOI":"10.1145\/3701551.3703529","type":"proceedings-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T12:30:16Z","timestamp":1740573016000},"page":"512-520","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Balancing Revenue and Privacy with Signaling Schemes in Online Ad Auctions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0015-6314","authenticated-orcid":false,"given":"Hongtao","family":"Liu","sequence":"first","affiliation":[{"name":"Gaoling School of Artificial Intelligence, Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8774-345X","authenticated-orcid":false,"given":"Luxi","family":"Chen","sequence":"additional","affiliation":[{"name":"Gaoling School of Artificial Intelligence, Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3286-905X","authenticated-orcid":false,"given":"Yiming","family":"Ding","sequence":"additional","affiliation":[{"name":"Kuaishou Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9489-5737","authenticated-orcid":false,"given":"Changcheng","family":"Li","sequence":"additional","affiliation":[{"name":"Kuaishou Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9801-9292","authenticated-orcid":false,"given":"Han","family":"Li","sequence":"additional","affiliation":[{"name":"Kuaishou Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9266-0780","authenticated-orcid":false,"given":"Peng","family":"Jiang","sequence":"additional","affiliation":[{"name":"Kuaishou Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4366-9276","authenticated-orcid":false,"given":"Weiran","family":"Shen","sequence":"additional","affiliation":[{"name":"Gaoling School of Artificial Intelligence, Renmin University of China, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,3,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/23307706.2017.1397554"},{"key":"e_1_3_2_1_2_1","unstructured":"Laurynas Baltrusaitis TJ Klein and Kim van Asten MSc. 2022. The Effect of Implementing Differential Privacy on the Second-Price Auction for Display Ads. (2022)."},{"key":"e_1_3_2_1_3_1","volume-title":"Data, competition, and digital platforms. arXiv preprint arXiv:2304.07653","author":"Bergemann Dirk","year":"2023","unstructured":"Dirk Bergemann and Alessandro Bonatti. 2023. Data, competition, and digital platforms. arXiv preprint arXiv:2304.07653 (2023)."},{"key":"e_1_3_2_1_4_1","volume-title":"How Do Digital Advertising Auctions Impact Product Prices?","author":"Bergemann Dirk","year":"2023","unstructured":"Dirk Bergemann, Alessandro Bonatti, and Nicholas Wu. 2023. How Do Digital Advertising Auctions Impact Product Prices? (2023)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512050"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.p20161046"},{"key":"e_1_3_2_1_7_1","unstructured":"Alessandro Bonatti. 2022. The Platform Dimension of Digital Privacy. Technical Report. National Bureau of Economic Research."},{"key":"e_1_3_2_1_8_1","first-page":"16188","article-title":"Online bayesian persuasion","volume":"33","author":"Castiglioni Matteo","year":"2020","unstructured":"Matteo Castiglioni, Andrea Celli, Alberto Marchesi, and Nicola Gatti. 2020. Online bayesian persuasion. Advances in Neural Information Processing Systems, Vol. 33, 16188--16198.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_9_1","volume-title":"Sinkhorn distances: Lightspeed computation of optimal transport. Advances in neural information processing systems","author":"Cuturi Marco","year":"2013","unstructured":"Marco Cuturi. 2013. Sinkhorn distances: Lightspeed computation of optimal transport. Advances in neural information processing systems, Vol. 26 (2013)."},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"CVXPY: A Python-embedded modeling language for convex optimization","volume":"17","author":"Diamond Steven","year":"2016","unstructured":"Steven Diamond and Stephen Boyd. 2016. CVXPY: A Python-embedded modeling language for convex optimization. Journal of Machine Learning Research, Vol. 17, 83 (2016), 1--5.","journal-title":"Journal of Machine Learning Research"},{"volume-title":"International colloquium on automata, languages, and programming","author":"Dwork Cynthia","key":"e_1_3_2_1_11_1","unstructured":"Cynthia Dwork. 2006. Differential privacy. In International colloquium on automata, languages, and programming. Springer, 1--12."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/21M145505X"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594564"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.23.3.37"},{"key":"e_1_3_2_1_16_1","volume-title":"If MaxEnt RL is the answer, what is the question? arXiv preprint arXiv:1910.01913","author":"Eysenbach Benjamin","year":"2019","unstructured":"Benjamin Eysenbach and Sergey Levine. 2019. If MaxEnt RL is the answer, what is the question? arXiv preprint arXiv:1910.01913 (2019)."},{"key":"e_1_3_2_1_17_1","volume-title":"Privacy regulation and online advertising. Management science","author":"Goldfarb Avi","year":"2011","unstructured":"Avi Goldfarb and Catherine E Tucker. 2011. Privacy regulation and online advertising. Management science, Vol. 57, 1 (2011), 57--71."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, 2708--2727","author":"Haifeng Xu","year":"2020","unstructured":"Xu Haifeng. 2020. On the tractability of public persuasion with no externalities. In Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, 2708--2727."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the Eighth International Workshop on Data Mining for Online Advertising. 1--6.","author":"Hairen Liao","year":"2014","unstructured":"Liao Hairen, Peng Lingxiao, Liu Zhenchuan, and Shen Xuehua. 2014. iPinYou global rtb bidding algorithm competition dataset. In Proceedings of the Eighth International Workshop on Data Mining for Online Advertising. 1--6."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Garrett Johnson. 2013. The impact of privacy policy on the auction market for online display advertising. (2013).","DOI":"10.2139\/ssrn.2333193"},{"key":"e_1_3_2_1_21_1","volume-title":"Bayesian Calibrated Click-Through Auction. ArXiv. \/abs\/2306.06554","author":"Junjie Chen","year":"2023","unstructured":"Chen Junjie, Li Minming, Xu Haifeng, and Zuo Song. 2023. Bayesian Calibrated Click-Through Auction. ArXiv. \/abs\/2306.06554 (2023)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.101.6.2590"},{"key":"e_1_3_2_1_23_1","volume-title":"International conference on machine learning. PMLR","author":"Laclau Charlotte","year":"2017","unstructured":"Charlotte Laclau, Ievgen Redko, Basarab Matei, Younes Bennani, and Vincent Brault. 2017. Co-clustering through optimal transport. In International conference on machine learning. PMLR, 1955--1964."},{"key":"e_1_3_2_1_24_1","volume-title":"Deep learning. nature","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. nature, Vol. 521, 7553 (2015), 436--444."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.100.2.603"},{"key":"e_1_3_2_1_26_1","unstructured":"Tom M Mitchell. 1997. Machine learning."},{"key":"e_1_3_2_1_27_1","first-page":"3","article-title":"Conic Optimization via Operator Splitting and Homogeneous Self-Dual Embedding","volume":"169","author":"O'Donoghue Brendan","year":"2016","unstructured":"Brendan O'Donoghue, Eric Chu, Neal Parikh, and Stephen Boyd. 2016. Conic Optimization via Operator Splitting and Homogeneous Self-Dual Embedding. Journal of Optimization Theory and Applications, Vol. 169, 3 (June 2016), 1042--1068. http:\/\/stanford.edu\/ boyd\/papers\/scs.html","journal-title":"Journal of Optimization Theory and Applications"},{"key":"e_1_3_2_1_28_1","unstructured":"Anup Rao. 2010. Information Theory in Computer Science."},{"key":"e_1_3_2_1_29_1","unstructured":"Pierangela Samarati and Latanya Sweeney. 1998. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. (1998)."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing. 412--425","author":"Shaddin Dughmi","year":"2016","unstructured":"Dughmi Shaddin and Xu Haifeng. 2016. Algorithmic bayesian persuasion. In Proceedings of the forty-eighth annual ACM symposium on Theory of Computing. 412--425."},{"key":"e_1_3_2_1_31_1","volume-title":"International Conference on Machine Learning. PMLR","author":"Su Kefan","year":"2022","unstructured":"Kefan Su and Zongqing Lu. 2022. Divergence-regularized multi-agent actor-critic. In International Conference on Machine Learning. PMLR, 20580--20603."},{"key":"e_1_3_2_1_32_1","volume-title":"8th Innovations in Theoretical Computer Science Conference (ITCS","author":"Yakov Babichenko","year":"2017","unstructured":"Babichenko Yakov and Barman Siddharth. 2017. Algorithmic aspects of private Bayesian persuasion. In 8th Innovations in Theoretical Computer Science Conference (ITCS 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."}],"event":{"name":"WSDM '25: The Eighteenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Hannover Germany","acronym":"WSDM '25"},"container-title":["Proceedings of the Eighteenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701551.3703529","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701551.3703529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T09:07:39Z","timestamp":1755767259000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701551.3703529"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,10]]},"references-count":32,"alternative-id":["10.1145\/3701551.3703529","10.1145\/3701551"],"URL":"https:\/\/doi.org\/10.1145\/3701551.3703529","relation":{},"subject":[],"published":{"date-parts":[[2025,3,10]]},"assertion":[{"value":"2025-03-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}