(1)
Duong, Q.; LeFevre, K.; Wellman, M. Strategic Modeling of Information Sharing Among Data Privacy Attackers. IJCAI 34.