[Algorithmic Foundations] #2. Post-Processing proposition
I explain a proposal for post-processing differential privacy, and a theorem for size k.
I explain a proposal for post-processing differential privacy, and a theorem for size k.
Mechanism Design via Differential Privacy
Algorithmic Game Theory
There is no excerpt because this is a protected post.
Decision and Game Theory for Security: 12th International Conference, GameSec 2021 Virtual Event, October 25-27, 2021 Proceedings
Decision and Game Theory for Security: 13th International Conference, GameSec 2022 Pittsburgh, PA, USA, October 26-28, 2022 Proceedings
In this paper, we study a proactive defense mechanism against jamming in multi-hop relay networks, in which one or more network sources introduce a deceptive network flow along a disjoint routing path.
There is no excerpt because this is a protected post.
Game Theory | Types of Interactions, Equilibrium Concepts
Hazra, T.; Anjaria, K. Applications of game theory in deep learning: A survey. Multimed. Tools Appl. 2022, 81, 8963–8994.
Categorize the game theory of defensive deception for cybersecurity and privacy, and review papers that investigate it.