We consider a network game, where End Users (EUs) minimize their cost by computing their demand and generation while satisfying a set of local and coupling constraints. Their nominal demand constitutes sensitive information, that they might want to keep private. We prove that the network game admits a unique Variational Equilibrium, which depends on the private information of all the EUs. A data aggregator is introduced, which aims to learn the EUs' private information. The EUs might have incentives to report biased and noisy readings to preserve their privacy, which creates shifts in their strategies. Relying on performative prediction, we define a decision-dependent game G^stoch to couple the network game with a data market. Two variants ...
Privacy preservation is one of the greatest concerns in big data. As one of extensive applications i...
The Internet is shaping our daily lives. On the one hand, social networks like Facebook and Twitter ...
In Ghosh-Ligett 2013, we propose a simple model where individuals in a privacy-sensitive population ...
We consider a peer-to-peer electricity market, where agents hold private information that they might...
Empirical thesis.Bibliography: pages 55-62.1. Introduction -- 2. Literature review -- 3. Privacy pre...
Abstract—Data collecting agents in large networks, such as the electric power system, need to share ...
In crowdsourcing systems, it is important for the crowdsource campaign initiator to incentivize user...
This paper considers the problem of Nash equilibrium (NE) seeking in aggregative games, where the co...
© 2018 IEEE. Due to dramatically increasing information published in social networks, privacy issues...
Privacy issues arising in the process of collecting, publishing and mining individuals' personal dat...
In mobile networks, authentication is a required primitive for the majority of security protocols. H...
International audienceIt is advantageous for collecting agents in interconnected systems to exchange...
In settings with incomplete information, players can find it difficult to coordinate to find states ...
The pervasiveness of Internet of Things results in vast volumes of personal data generated by smart ...
© 2019, Springer Science+Business Media, LLC & Science Press, China. Due to dramatically increasing ...
Privacy preservation is one of the greatest concerns in big data. As one of extensive applications i...
The Internet is shaping our daily lives. On the one hand, social networks like Facebook and Twitter ...
In Ghosh-Ligett 2013, we propose a simple model where individuals in a privacy-sensitive population ...
We consider a peer-to-peer electricity market, where agents hold private information that they might...
Empirical thesis.Bibliography: pages 55-62.1. Introduction -- 2. Literature review -- 3. Privacy pre...
Abstract—Data collecting agents in large networks, such as the electric power system, need to share ...
In crowdsourcing systems, it is important for the crowdsource campaign initiator to incentivize user...
This paper considers the problem of Nash equilibrium (NE) seeking in aggregative games, where the co...
© 2018 IEEE. Due to dramatically increasing information published in social networks, privacy issues...
Privacy issues arising in the process of collecting, publishing and mining individuals' personal dat...
In mobile networks, authentication is a required primitive for the majority of security protocols. H...
International audienceIt is advantageous for collecting agents in interconnected systems to exchange...
In settings with incomplete information, players can find it difficult to coordinate to find states ...
The pervasiveness of Internet of Things results in vast volumes of personal data generated by smart ...
© 2019, Springer Science+Business Media, LLC & Science Press, China. Due to dramatically increasing ...
Privacy preservation is one of the greatest concerns in big data. As one of extensive applications i...
The Internet is shaping our daily lives. On the one hand, social networks like Facebook and Twitter ...
In Ghosh-Ligett 2013, we propose a simple model where individuals in a privacy-sensitive population ...