[1]
Q. Duong, K. LeFevre, and M. Wellman, “Strategic Modeling of Information Sharing among Data Privacy Attackers”, IJCAI, vol. 34, no. 2.