Obfuscation

Jeffrey Pawlick, Quanyan Zhu

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

As data ecosystems grow in size due to the IoT, researchers are developing obfuscation techniques that issue fake search engine queries, undermine location tracking algorithms, or evade government surveillance. These techniques raise two conflicts: one between each user and the machine learning algorithms which track the users, and one between the users themselves.

Original languageEnglish (US)
Title of host publicationStatic and Dynamic Game Theory
Subtitle of host publicationFoundations and Applications
PublisherBirkhauser
Pages49-58
Number of pages10
DOIs
StatePublished - 2021

Publication series

NameStatic and Dynamic Game Theory: Foundations and Applications
ISSN (Print)2363-8516
ISSN (Electronic)2363-8524

ASJC Scopus subject areas

  • Statistics and Probability
  • Statistics, Probability and Uncertainty
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Obfuscation'. Together they form a unique fingerprint.

Cite this