2012
DOI: 10.1007/978-3-642-35311-6_23
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Auctions for Recommender Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
27
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(27 citation statements)
references
References 14 publications
0
27
0
Order By: Relevance
“…The example in this section of using differential privacy to obtain exactly truthful mechanisms is taken directly from [69]. The sensitive surveyors problem was first considered by Ghosh and Roth [36], and expanded on by [56,34,75,16]. Fleischer and Lyu [34] consider the Bayesian setting discussed in this section, and Ligett and Roth [56] consider the worst-case setting with take-it-or-leave-it offers, both in an attempt to get around the impossibility result of [36].…”
Section: Bibliographical Notesmentioning
confidence: 99%
See 1 more Smart Citation
“…The example in this section of using differential privacy to obtain exactly truthful mechanisms is taken directly from [69]. The sensitive surveyors problem was first considered by Ghosh and Roth [36], and expanded on by [56,34,75,16]. Fleischer and Lyu [34] consider the Bayesian setting discussed in this section, and Ligett and Roth [56] consider the worst-case setting with take-it-or-leave-it offers, both in an attempt to get around the impossibility result of [36].…”
Section: Bibliographical Notesmentioning
confidence: 99%
“…Algorithm16 The Multiplicative Weights (or Randomized Weighted Majority (RWM)) algorithm, rephrased. It takes as input a stream of losses 1 , 2 , .…”
mentioning
confidence: 99%
“…An alternative notion is that of budget feasible mechanism design initiated by Singer [2010] where the goal is to optimize a utility function under a hard budget constraint. This concept enables surprisingly positive results and has been studied in algorithmic mechanism design [Chen et al 2011;Dobzinski et al 2011;Badanidiyuru et al 2012;Bei et al 2012;Anari et al 2014] and used in various application domains that include social network analysis [Singer 2012], crowdsourcing [Yang et al 2012;Singer and Mittal 2013;Singla and Krause 2013b] and privacy auctions [Dandekar et al 2013;Singla and Krause 2013a]. The setting that we study most resembles that of budget feasible mechanism design.…”
Section: Related Workmentioning
confidence: 90%
“…Auctions have been recognized in the literature as an effective way to facilitate exchange of personal information and payment (Preibusch, 2013; Dandekar, Fawaz, & Ioannidis, 2014; Ghosh & Roth 2015). An experimental auction to study the monetary value of people's age and weight information was conducted in Huberman, Adar, and Fine (2005).…”
Section: Related Workmentioning
confidence: 99%