Obfuscation

1Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As data ecosystems grow in size due to the IoT, researchers are developing obfuscation techniques that issue fake search engine queries, undermine location tracking algorithms, or evade government surveillance. These techniques raise two conflicts: one between each user and the machine learning algorithms which track the users, and one between the users themselves.

Cite

CITATION STYLE

APA

Pawlick, J., & Zhu, Q. (2021). Obfuscation. In Static and Dynamic Game Theory: Foundations and Applications (pp. 49–58). Birkhauser. https://doi.org/10.1007/978-3-030-66065-9_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free