A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Game Theory in Mobile CrowdSensing:A Comprehensive Survey
2020
Sensors
Research on various game theoretic approaches aims to provide a stable solution to this problem. ...
We propose a taxonomy of game theory-based solutions for MCS platforms in which problems are mainly formulated based on Stackelberg, Bayesian and Evolutionary games. ...
In this survey, we review various game theoretical methods applied in MCS that help to reach an equilibrium in a competition for gaining higher utility between service requester and service provider. ...
doi:10.3390/s20072055
pmid:32268546
pmcid:PMC7180814
fatcat:jahw2lzp4re7dim5q4onf6tlzm
Non-Cooperative Location Privacy
2013
IEEE Transactions on Dependable and Secure Computing
In this paper, we analyze non-cooperative behavior of mobile nodes by using a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost. ...
A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is costly. ...
This approach however lacks flexibility and is prone to attacks because a central authority fixes mix zone locations and must shared them with mobile nodes. ...
doi:10.1109/tdsc.2012.85
fatcat:w6fkxpok3rct5m7ux7hlqjmqhm
Game Theoretic Approaches in Vehicular Networks: A Survey
[article]
2020
arXiv
pre-print
Game theory, a theoretical framework designed for strategic interactions among rational decision-makers who faced with scarce resources, can be used to model and analyze individual or group behaviors of ...
However, as the number of connected nodes keeps increasing, it is challenging to satisfy various and large amounts of service requests with different Quality of Service (QoS ) and security requirements ...
[78] proposed a Bayesian game-theoretic approach for the beacon collision alleviation at the MAC layer in urban VNs. ...
arXiv:2006.00992v1
fatcat:lljjlitvlvbvhbg3aot5xszefm
On non-cooperative location privacy
2009
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
In this paper, we analyze the non-cooperative behavior of mobile nodes with a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost. ...
Because this approach is costly, self-interested mobile nodes might decide not to cooperate and could thus jeopardize the achievable location privacy. ...
We compare the game-theoretic approach with random and socially-optimal strategies and show that using the Bayesian Nash equilibrium, players reduce their consumption of pseudonyms while still achieving ...
doi:10.1145/1653662.1653702
dblp:conf/ccs/FreudigerMHP09
fatcat:6ym62k34svabznb43zao2y6rxm
Incentive Mechanisms for Federated Learning: From Economic and Game Theoretic Perspective
[article]
2021
arXiv
pre-print
In this paper, we provide a comprehensive review for the economic and game theoretic approaches proposed in the literature to design various schemes for stimulating data owners to participate in FL training ...
Then, we review applications of game theory and economic approaches applied for incentive mechanisms design of FL. ...
A typical example is the Bayesian game [53] where the outcome of the game can be predicted using Bayesian game analysis. The equilibrium solution of such a game is Bayesian Nash equilibrium (BNE). ...
arXiv:2111.11850v1
fatcat:24xqnqiqtbh2hdn6lnkdkctqii
Information Security in Big Data: Privacy and Data Mining
2014
IEEE Access
Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data ...
In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information. ...
ASSUMPTIONS OF THE GAME MODEL In above discussions we have reviewed the game theoretical approaches to privacy issues in data mining. ...
doi:10.1109/access.2014.2362522
fatcat:oxnmv2kjy5bllhotbkqvxd5rfu
A survey on game theoretical methods in Human–Machine Networks
2017
Future generations computer systems
Huang et al. exploited a location-awareness resource allocation approach based on a repeated non-cooperative game with complete information for D2D communications [70] . ...
Bayesian coalition structure ensures players to join and leave coalition flexibly, which makes the coalition structure stable with reduced delay. ...
doi:10.1016/j.future.2017.10.051
fatcat:55v7cpi64ndb3apj4ngbkin5ue
A Bayesian Approach to Privacy Enforcement in Smartphones
2014
USENIX Security Symposium
The traditional approach of information-flow (or taint) tracking applies "binary" classification, whereby information release is legitimate iff there is no data flow from a privacy source to sink arguments ...
Specifically, we propose a Bayesian notion of statistical classification, which conditions the judgment whether a release point is legitimate on the evidence arising at that point. ...
Our approach is more flexible than taint tracking by permitting statistical weighting of different features as the basis for privacy judgments. ...
dblp:conf/uss/TrippR14
fatcat:2fpqoflkezhmxfoifasbkc6hxe
2020 Index IEEE Transactions on Mobile Computing Vol. 19
2021
IEEE Transactions on Mobile Computing
., +, TMC Nov. 2020 2489-2504
A Control Theoretic Approach to ABR Video Streaming: A Fresh Look at
PID-Based Rate Adaptation. ...
., +, TMC Nov. 2020 2505-2519
A Cost-Driven Approach to Caching-as-a-Service in Cloud-Based 5G
Mobile Networks. ...
doi:10.1109/tmc.2020.3036773
fatcat:6puiux5lp5bfvjo47ey7ycwyfu
Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory
2020
Wireless Communications and Mobile Computing
In the proposed method, the attacker infiltration mode and the behavior of the intrusion detection system as a two-player and nonparticipatory dynamic game are completely analyzed and Nash equilibrium ...
In this research, game theory is used to develop the performance of intrusion detection systems. ...
system with theoretical calculation of the Bayesian game. ...
doi:10.1155/2020/8819545
fatcat:bfxrtttgpvg6bpuwjvwi3lio3m
Stackelberg Security Games: Looking Beyond a Decade of Success
2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence
The Stackelberg Security Game (SSG) model has been immensely influential in security research since it was introduced roughly a decade ago. ...
Furthermore, deployed SSG-based applications are one of most successful examples of game theory applications in the real world. ...
Broadly, privacy issues with any software system always involve a trade-off between privacy and usefulness of the system such as location privacy in social networks. ...
doi:10.24963/ijcai.2018/775
dblp:conf/ijcai/SinhaFAKT18
fatcat:vdiyb6i46jfwhm5dlhjph4cjme
The (Co-)Location Sharing Game
2019
Proceedings on Privacy Enhancing Technologies
Yet, they also represent a severe threat to the users' privacy, as co-location information introduces interdependences between users. ...
We propose the first game-theoretic framework for analyzing the strategic behaviors, in terms of information sharing, of users of OSNs. ...
This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors. ...
doi:10.2478/popets-2019-0017
dblp:journals/popets/OlteanuHHH19
fatcat:awveon3vnrbw7iyyconavhr7ru
Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions
2020
Scientific Programming
This paper presents the security for cloud computing models with a new aspect. ...
Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. ...
Security-as-a-Service. e Bayesian game is between the CSPs and CSUs. ...
doi:10.1155/2020/8871315
fatcat:z7shzh55lnai5m4s5pygr7u4oq
A survey on security issues in cognitive radio based cooperative sensing
2021
IET Communications
Active mechanisms are suitable for an immediate defence in a limited time span, while passive mechanisms are suitable for flexible CSS systems that are ready to detect the attacks over a period of time ...
An in-depth tutorial on both the defence mechanisms is provided from the perspectives of the secondary users throughput and the interference to the primary user. ...
Game theoretic approach In the game theoretic approaches, the CR communication systems are analysed with game theory [64] [65] [66] . ...
doi:10.1049/cmu2.12131
fatcat:ivw2dsepevfi5izquylly65jg4
When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges
2022
IEEE Open Journal of the Communications Society
(SSDF) attacks, jamming attacks, eavesdropping attacks, and privacy issues. ...
In this article, we provide a comprehensive survey of the recent development of ML based SS methods, the most critical security issues, and corresponding defense mechanisms. ...
A game-theoretic approach and interference graph were employed to solve this problem. ...
doi:10.1109/ojcoms.2022.3146364
fatcat:ffx3xbq5qzb6hcserskljb4o7u
« Previous
Showing results 1 — 15 out of 1,529 results