Next Article in Journal
Geometric Characterization of the Numerical Ranges of Generalized Pencils of Pairs of Projections
Previous Article in Journal
Availability Analysis of an Unreliable Single Unit System Operating in a Doubly Stochastic Shock Environment
Previous Article in Special Issue
Genetic Algorithms for Pareto Optimization in Bayesian Cournot Games Under Incomplete Cost Information
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Statistical Privacy-Preserving Distributed Online Aggregative Games via Mirror Descent with Correlated Perturbations

1
Department of Control Science and Engineering, Tongji University, Shanghai 201804, China
2
The Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems, The Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province, Jiaxing University, Jiaxing 314001, China
*
Author to whom correspondence should be addressed.
Mathematics 2026, 14(10), 1731; https://doi.org/10.3390/math14101731
Submission received: 8 April 2026 / Revised: 9 May 2026 / Accepted: 10 May 2026 / Published: 18 May 2026
(This article belongs to the Special Issue AI in Game Theory: Theory and Applications)

Abstract

Distributed online aggregative games are widely used to model sequential decision-making problems in dynamic networked systems. However, the repeated information exchange required by distributed algorithms may disclose players’ sensitive local data. This paper investigates a privacy-preserving distributed online aggregative game over multi-agent networks. A distributed online mirror descent algorithm with correlated perturbations is developed to protect local private information. Under standard assumptions, an expected dynamic regret bound and a statistical privacy guarantee are established for the proposed algorithm. Numerical results demonstrate the effectiveness of the proposed algorithm and reveal the tradeoff between privacy protection and algorithmic performance.

1. Introduction

Sequential decision making over networks arises in resource allocation, energy coordination, communication systems, and other large-scale cyber-physical platforms. In such settings, each agent acts online: future objective functions are unknown, decisions are updated repeatedly, and only local information is available at each stage. Online optimization and online game models therefore provide a natural mathematical language for describing system evolution, while regret serves as the main performance criterion over a finite horizon [1,2,3,4]. When centralized computation is impractical, distributed algorithms are preferable because they require only local processing and neighbor-to-neighbor exchanges [5,6]. Recent application-oriented studies further highlight the broad relevance of online and dynamic decision making in networked engineering systems, including online knowledge seeking in technical R&D teams [7], online computation offloading for collaborative space/aerial-aided edge computing [8], and fine-grained air traffic flow prediction [9]. These studies show that online decision making, dynamic information processing, and networked coordination have found applications in a wide range of fields.
Among distributed interaction models, aggregative games are especially important because each player’s cost depends on its own decision and on an aggregate term generated by the entire population. This structure appears in charging coordination, congestion management, and shared-resource allocation. Distributed equilibrium computation for aggregative games has been widely studied [10,11,12,13]. The online case is more subtle: objective functions and equilibria may both vary with time, so the main issue is equilibrium tracking rather than convergence to a fixed point. Recent contributions published in Mathematics reflect this development from several complementary viewpoints. Yang et al. considered distributed online aggregative optimization in an unknown dynamic environment, Huo et al. studied sampled data average consensus tracking, He et al. proposed event-triggered Nash equilibrium seeking schemes, and Cao et al. investigated privacy-preserving distributed learning based on a Newton mechanism [14,15,16,17]. These results motivate a unified treatment of online game dynamics, consensus tracking, and privacy protection.
In distributed implementations, each player repeatedly communicates local estimates or auxiliary states. Even if a single message carries limited information, the entire communication history may reveal sensitive features of local objectives, decision trajectories, or underlying datasets. Differential privacy and noise injection mechanisms have therefore become standard ingredients in distributed learning, optimization, and consensus [18,19,20,21,22,23,24]. For online aggregative games, however, one still needs a perturbation mechanism that hides transmitted information without destroying the aggregate-tracking structure used by the distributed algorithm.
Among the existing studies on privacy-preserving online aggregative games, the work of Lin et al. [25] is relevant to our setting. In [25], a statistical privacy-preserving online distributed Nash equilibrium tracking algorithm was developed for aggregative games by using correlated perturbations and a privacy criterion based on the Kullback–Leibler divergence. The present paper follows the same statistical privacy viewpoint, but differs from [25] in the algorithmic framework and the corresponding theoretical analysis. Specifically, ref. [25] is based on a Euclidean projected gradient update, whereas this paper develops a distributed online mirror descent method with a general Bregman divergence. Moreover, many existing algorithms rely on Euclidean projection updates, which may be less suitable for structured feasible sets such as simplex or probability constraints [26,27,28]. Therefore, it is still necessary to develop a privacy-preserving distributed online aggregative-game algorithm that can simultaneously handle dynamic equilibrium tracking, non-Euclidean decision geometry, and statistical privacy protection. To further clarify the relationship between the present paper and representative related studies, Table 1 provides a structured comparison from the perspectives of problem setting, algorithmic method, privacy mechanism, and main distinction.
Motivated by the above considerations, this paper studies a distributed online aggregative game in which a subset of players may be compromised and the remaining players seek protection of their local information. We adopt a statistical privacy criterion based on the Kullback–Leibler divergence and design a distributed online mirror descent algorithm equipped with correlated perturbations. The perturbations mask the exchanged aggregate estimates while preserving a balancing identity that is crucial for dynamic average tracking. Compared with Euclidean projection-based methods, the proposed mirror-descent framework allows a general Bregman divergence and is therefore better suited to structured feasible sets.
The main contributions are summarized as follows.
  • We formulate a privacy-preserving distributed online aggregative game with corrupted players, where the goal is to track the time-varying Nash equilibrium while protecting the local information of the uncorrupted players. Statistical privacy is quantified by a Kullback–Leibler divergence criterion.
  • We propose a privacy-preserving distributed online mirror descent algorithm with correlated perturbations. The correlated perturbations mask the exchanged aggregate estimates, while their balancing property preserves the dynamic average-tracking structure required by the distributed algorithm.
  • We establish an expected dynamic regret bound for the proposed algorithm under a general Bregman geometry. Unlike Euclidean projection-based analyses, the proof relies on mirror descent updates and Bregman divergence arguments, and the resulting bound explicitly reflects the effects of the equilibrium path variation, the stepsizes, and the perturbation magnitudes.
  • We prove a statistical privacy guarantee for the proposed algorithm by bounding the Kullback–Leibler divergence between the observation distributions generated by different datasets. Numerical simulations further demonstrate the tradeoff between privacy level and performance, and the simplex-constrained experiment illustrates the advantage of using a KL-divergence mirror update.
The remainder of this paper is organized as follows. Section 2 introduces the notation, privacy model, game formulation, and standing assumptions. Section 3 presents the privacy-preserving distributed online mirror descent algorithm. Section 4 develops the regret and privacy analysis. Section 5 reports numerical examples. Section 6 discusses the proposed algorithm, and Section 7 concludes the paper.

2. Notation, Privacy Model, and Game Formulation

Consider an undirected communication graph
G = ( V , E ) ,
where V = { 1 , , N } is the player set and E V × V is the edge set. If e i j E , then players i and j can exchange information. For each player i, let
N i = { j V : e i j E }
be its neighbor set. Throughout this paper, the graph is assumed to be connected. Let W R N × N be the mixing matrix associated with G ; thus, [ W ] i j > 0 if e i j E and [ W ] i j = 0 otherwise.
For player i V at time k, the decision variable is denoted by x i , k X i R n , and the stacked action vector is
x k = col ( x 1 , k , , x N , k ) .
The aggregate term is written as σ ( x k ) . For notational convenience, we also use
x i , k = col ( x 1 , k , , x i 1 , k , x i + 1 , k , , x N , k )
for the profile of all players except player i.

2.1. Statistical Privacy

We begin with two graph-theoretic objects that will be used in the privacy analysis.
Definition 1. 
A subset S V is called a vertex cut if removing the nodes in S together with their incident edges disconnects G .
Fix an arbitrary orientation of the edges of G and index them as e q , q = 1 , , | E | .
Definition 2. 
The oriented incidence matrix D R N × | E | is defined by
[ D ] i , q = 1 , if node i is the head of e q , 1 , if node i is the tail of e q , 0 , otherwise .
The graph Laplacian is L = D D . Its spectral decomposition can be written as
L = U diag ( λ 1 , λ 2 , , λ N ) U ,
where U is orthogonal and 0 = λ 1 < λ 2 λ N . The Moore–Penrose inverse is therefore
L = U diag 0 , 1 λ 2 , , 1 λ N U .
Let C and H denote the compromised-player set and the honest-player set, respectively. Over a time horizon T, the adversary collects an observation record
O = { O k } k = 1 T
from the compromised players, where O k is the information available at time k. The underlying dataset is denoted by D . Privacy is interpreted as indistinguishability: if two candidate datasets can generate the same observation record, then the adversary should find them difficult to distinguish. We measure this indistinguishability with the Kullback–Leibler divergence. For two probability measures P and Q, the Kullback–Leibler divergence is defined by
D KL ( P Q ) = log d P d Q d P , P Q , + , otherwise .
When P and Q admit densities h p and h p with respect to a common dominating measure, we also write
D KL ( h p , h p ) = h p ( z ) log h p ( z ) h p ( z ) d z .
Definition 3 
([25]). Given two datasets D 1 and D 2 , an algorithm A is said to preserve the statistical privacy of the honest players if
O = A ( D 1 ) = A ( D 2 )
and the quantity
D KL h O D 1 , h O D 2
is bounded.
Remark 1. 
The private information considered in this paper is the local information of the honest players. This information may determine their local cost functions, gradients, unmasked aggregate estimates, and local decision trajectories. Public system parameters, such as the communication graph, the stepsizes, and the perturbation magnitudes, are not regarded as private. The mechanism is also not intended to protect the corrupted players’ own data or internal states. Its purpose is to prevent the communication transcript from uniquely revealing the honest players’ local information.
Remark 2. 
The equality condition in Definition 3 should be understood as an observational compatibility condition rather than as equality of two output distributions. It means that the same realized observation record O available to the adversary can be generated by two different candidate datasets, possibly under different realizations of the hidden perturbations. The KL divergence then quantifies the statistical distinguishability of these two candidate explanations from the adversary’s viewpoint. For example, in an additive-noise mechanism O = θ + ξ , the same observed value can be compatible with two different values of θ, provided that the hidden noise takes different values. The privacy leakage is not zero in general; it is measured by the likelihood ratio, or equivalently by the KL divergence between the induced observation distributions.
Adversary model: The adversary is assumed to be honest-but-curious. The compromised players follow the prescribed algorithm, but share all their available information. At each time k, they know the algorithm and public parameters, observe their own local data and states, and observe the messages and perturbation variables on edges incident to them. However, they do not observe the honest players’ unmasked variables, nor the perturbation variables generated on edges whose two endpoints are both honest. Hence, after conditioning on the compromised players’ observations, the hidden perturbations among honest players provide the residual uncertainty used in the statistical privacy analysis.

2.2. Game Formulation

At each stage k, player i minimizes a time-varying cost f i , k that depends on its own action and on an aggregate of all players’ actions. Because the environment is dynamic, the stage game and its Nash equilibrium may change with k. The goal is to construct a distributed online algorithm that uses only local communication, tracks the time-varying equilibrium, and protects the information of the honest players.
For player i, we measure online performance by the expected dynamic regret over the horizon T,
Reg i ( T ) k = 1 T E f i , k x i , k , σ ( x i , k , x i , k ) f i , k x i , k , σ ( x k ) ,
where x k is the Nash equilibrium of the stage-k game and x i , k is the equilibrium profile of all players except player i.

2.3. Assumptions

Let ω be the mirror map, and let
D ( ξ , ζ ) ω ( ξ ) ω ( ζ ) ω ( ζ ) , ξ ζ
denote the associated Bregman divergence. For each player i V and each time k, define
g i , k ( x i , k , y i , k ) x i , k f i , k ( · , β ) + 1 N β f i , k ( x i , k , · ) | β = y i , k , ϕ i , k ( x k ) x i , k f i , k x i , k , σ ( x k ) , ϕ k ( x k ) col ϕ 1 , k ( x k ) , , ϕ N , k ( x k ) .
When y i , k = σ ( x k ) , the two quantities coincide; i.e.,
ϕ i , k ( x k ) = g i , k x i , k , σ ( x k ) .
The next assumptions are standard in analyses of aggregative games, mirror descent, and distributed online optimization [10,25,29].
Assumption 1. 
The mirror map ω is σ ω -strongly convex with respect to · , namely,
ω ( x ) ω ( y ) + ω ( y ) , x y + σ ω 2 x y 2 .
Assumption 2. 
There exists G > 0 such that
g i , k ( x i , k , y i , k ) G , y i , k R n ,
for all players i and all stages k.
Assumption 3. 
For every player i and every fixed x i X i , the mapping z g i , k ( x i , z ) is L i -Lipschitz on R n ; i.e.,
g i , k ( x i , z 1 ) g i , k ( x i , z 2 ) L i z 1 z 2 , z 1 , z 2 R n .
Assumption 4. 
The pseudo-gradient mapping ϕ k is μ-strongly monotone on X 1 × × X N for some μ > 0 , namely,
ϕ k ( x ) ϕ k ( y ) ( x y ) μ x y 2
for all x , y X 1 × × X N .
Assumption 5. 
For each i [ N ] and each ζ X i , the function D ( · , ζ ) is K-Lipschitz on X i ; i.e.,
| D ( ξ 1 , ζ ) D ( ξ 2 , ζ ) | K ξ 1 ξ 2 , ξ 1 , ξ 2 X i .
Assumption 6. 
The graph G is undirected and connected, and the weight matrix W is doubly stochastic:
W 1 N = 1 N , 1 N W = 1 N .

3. Our Proposed Algorithm

To track the time-varying Nash equilibrium while preserving the statistical privacy of the uncorrupted players, we propose a privacy-preserving distributed online mirror descent algorithm. The proposed method combines online mirror descent with dynamic average consensus, and incorporates a correlated perturbation mechanism to mask the exchanged aggregate estimates.
The detailed procedure is presented in Algorithm 1. For each player i V , let the initial action be x i , 0 R n and let the initial aggregate estimate satisfy y i , 0 = x i , 0 . At each iteration k, player i first generates independent Gaussian noises for all its neighbors and constructs a correlated perturbation by aggregating the differences between the received and transmitted noises. This perturbation is then added to the local aggregate estimate before communication, so that the exchanged message is masked from the adversary’s viewpoint.
Algorithm 1 Privacy-Preserving Distributed Online Algorithm
Initialization: For each player i V , initialize x i , 0 R n and y i , 0 = x i , 0 .
Iterations: For k = 0 , 1 , , T , each player i performs:
 1:  For each neighbor j N i , generate an independent Gaussian noise
η i j , k N ( 0 n , M k 2 I n ) ,
   and compute the correlated perturbation
η i , k = j N i ( η j i , k η i j , k ) .
 2:  Update the masked aggregate estimate:
y ˜ i , k = y i , k + η i , k .
 3:  Update the local action:
x i , k + 1 = arg min x X i x , g i , k ( x i , k , y i , k ) + 1 α k D ( x , x i , k ) .
 4:  Exchange y ˜ i , k with neighbors and update the aggregate estimate:
y i , k + 1 = j = 1 N [ W ] i j y ˜ j , k + x i , k + 1 x i , k .
More specifically, for each neighbor j N i , player i generates an independent Gaussian noise η i j , k N ( 0 n , M k 2 I n ) and computes the correlated perturbation
η i , k = j N i ( η j i , k η i j , k ) .
The masked aggregate estimate is then updated as
y ˜ i , k = y i , k + η i , k .
Based on the current local estimate y i , k , player i updates its action via the mirror-descent step
x i , k + 1 = arg min x X i x , g i , k ( x i , k , y i , k ) + 1 α k D ( x , x i , k ) .
After exchanging y ˜ i , k with its neighbors, player i updates its aggregate estimate according to
y i , k + 1 = j = 1 N [ W ] i j y ˜ j , k + x i , k + 1 x i , k .
The above mechanism preserves privacy by masking the communicated aggregate estimates, while still allowing each player to maintain an accurate estimate of the aggregate action through dynamic average consensus. In particular, the correlated perturbation is globally balanced, since
i = 1 N η i , k = i = 1 N j N i ( η j i , k η i j , k ) = 0 n .
Therefore, although the individual aggregate estimates are perturbed before transmission, the average of the aggregate estimates remains unchanged. This property is essential for achieving both privacy preservation and aggregate tracking performance.
For better readability, Figure 1 provides a visual summary of the proposed privacy-preserving distributed online algorithm. At each iteration, each player first generates pairwise Gaussian noises and constructs a correlated perturbation. The perturbation is added to the local aggregate estimate before communication, so that the exchanged message is masked. After forming the masked aggregate estimate, each player first computes the next decision by the mirror-descent update. Then the masked aggregate estimates are exchanged with neighboring players, and the local aggregate estimate is updated through the dynamic average consensus step. This process is repeated over the time horizon and jointly achieves online equilibrium tracking and privacy protection.
Remark 3. 
The pairwise noise-exchange step is an auxiliary protocol for implementing the correlated perturbation. For each ordered pair ( i , j ) and each time k, the variable η i j , k is sampled independently of all local private data, cost functions, gradients, decisions, and aggregate estimates. Hence, revealing η i j , k to its neighboring endpoint does not directly disclose private information. In the adversarial model considered in this paper, corrupted players may observe all messages and all pairwise noise variables on edges incident to them. These observed variables are therefore conditioned on in the privacy analysis. The privacy guarantee relies only on the residual randomness of pairwise noises on edges whose two endpoints are both honest.

4. Main Results

This section derives two theoretical properties of the proposed algorithm, including the regret bound and the statistical privacy guarantee.

4.1. Regret Analysis

We first give the deviation of the local action by mirror descent update.
Lemma 1. 
Under Assumptions 1 and 2, each player i V satisfies
x i , k + 1 x i , k α k G σ ω , k 0 .
Proof. 
Optimality of the mirror update implies that, for any x X i ,
g i , k ( x i , k , y i , k ) + 1 α k ω ( x i , k + 1 ) ω ( x i , k ) , x x i , k + 1 0 .
Choosing x = x i , k and using the σ ω -strong convexity of ω gives
σ ω α k x i , k + 1 x i , k 2 g i , k ( x i , k , y i , k ) x i , k + 1 x i , k .
Assumption 2 then yields the claim. □
The next lemma shows that the balancing property of the perturbations preserves the network average.
Lemma 2. 
Under Assumptions 1–6,
y ¯ k = x ¯ k , k 0 ,
where
y ¯ k 1 N i = 1 N y i , k , x ¯ k 1 N i = 1 N x i , k .
Proof. 
From Algorithm 1,
y i , k + 1 = j = 1 N w i j ( y j , k + η j , k ) + x i , k + 1 x i , k .
Summing over i and using the double stochasticity of W gives
i = 1 N y i , k + 1 = i = 1 N y i , k + i = 1 N η i , k + i = 1 N x i , k + 1 i = 1 N x i , k .
Because i = 1 N η i , k = 0 , we obtain
y ¯ k + 1 = y ¯ k + x ¯ k + 1 x ¯ k .
Since y i , 0 = x i , 0 for all i, we have y ¯ 0 = x ¯ 0 , and induction completes the proof. □
We next estimate the disagreement between a local aggregate estimate and the network average.
Lemma 3. 
Under Assumptions 1–6, for every player i V and every k 1 ,
E y i , k x ¯ k N γ k P 1 + N G σ ω l = 0 k 1 γ k l 1 α l + N l = 0 k 1 γ k l E η l ,
where P 1 max j V y j , 0 and γ ( 0 , 1 ) is the contraction factor associated with W.
Proof. 
Denote
y k = col ( y 1 , k , , y N , k ) , x k = col ( x 1 , k , , x N , k ) , η k = col ( η 1 , k , , η N , k ) .
In vector form, the update of the aggregate estimate can be written as
y k + 1 = W y k + W η k + x k + 1 x k .
By recursion,
y k = W k y 0 + l = 0 k 1 W k l η l + l = 0 k 1 W k l 1 ( x l + 1 x l ) .
On the other hand, by Lemma 2,
x ¯ k = y ¯ k = 1 N 1 N y k .
Hence,
y i , k x ¯ k = j = 1 N [ W k ] i j 1 N y j , 0 + j = 1 N l = 0 k 1 [ W k l ] i j 1 N η j , l + j = 1 N l = 0 k 1 [ W k l 1 ] i j 1 N ( x j , l + 1 x j , l ) .
Taking norms and expectations, and using the standard mixing estimate
j = 1 N [ W s ] i j 1 N N γ s , s 0 ,
we obtain
E y i , k x ¯ k N γ k P 1 + l = 0 k 1 N γ k l E η l + l = 0 k 1 N γ k l 1 E x l + 1 x l .
By Lemma 1,
E x l + 1 x l G σ ω α l .
Substituting this estimate into the above inequality yields the desired result. □
The following identity of the Bregman divergence will be used repeatedly.
Lemma 4. 
For any vectors a , b , c ,
a b , ω ( b ) ω ( c ) = D ( a , c ) D ( a , b ) D ( b , c ) .
Lemma 5. 
Under Assumption 5, for each player i V and each k > 0 ,
D ( x i , k , x i , k ) D ( x i , k , x i , k + 1 ) D ( x i , k , x i , k ) D ( x i , k + 1 , x i , k + 1 ) + K x i , k + 1 x i , k .
Proof. 
Insert and subtract D ( x i , k + 1 , x i , k + 1 ) :
D ( x i , k , x i , k ) D ( x i , k , x i , k + 1 ) = D ( x i , k , x i , k ) D ( x i , k + 1 , x i , k + 1 ) + D ( x i , k + 1 , x i , k + 1 ) D ( x i , k , x i , k + 1 ) .
The second term is bounded by the Lipschitz property of D ( · , x i , k + 1 ) from Assumption 5, which gives the result. □
We then give the regret bound.
Theorem 1. 
Suppose Assumptions 1–6 hold. Then the expected dynamic regret of Algorithm 1 satisfies
Reg i ( T ) = O T V T + 1 α T + k = 1 T α k + k = 1 T M k ,
where
V T k = 1 T 1 x k + 1 x k
denotes the path variation of the equilibrium sequence.
Proof. 
Denote
δ i , k = y i , k σ ( x k ) .
For the average aggregative game considered in this paper, σ ( x k ) = x ¯ k , and hence Lemma 3 can be applied to δ i , k .
By the convexity of f i , k and the boundedness of the corresponding gradient in Assumption 2, we have
f i , k x i , k , σ ( x i , k , x i , k ) f i , k x i , k , σ ( x k ) G x i , k x i , k .
Therefore,
Reg i ( T ) G k = 1 T E x i , k x i , k G T k = 1 T E x k x k 2 .
Thus, it remains to bound k = 1 T E x k x k 2 .
From the optimality condition of the mirror descent update, for any x X i ,
g i , k ( x i , k , y i , k ) + 1 α k ω ( x i , k + 1 ) ω ( x i , k ) , x x i , k + 1 0 .
Taking x = x i , k gives
α k g i , k ( x i , k , y i , k ) , x i , k + 1 x i , k x i , k x i , k + 1 , ω ( x i , k + 1 ) ω ( x i , k ) .
By the three-point identity of the Bregman divergence in Lemma 4,
α k g i , k ( x i , k , y i , k ) , x i , k + 1 x i , k D ( x i , k , x i , k ) D ( x i , k , x i , k + 1 ) D ( x i , k + 1 , x i , k ) .
Since
x i , k + 1 x i , k = x i , k x i , k + x i , k + 1 x i , k ,
we obtain
α k g i , k ( x i , k , y i , k ) , x i , k x i , k D ( x i , k , x i , k ) D ( x i , k , x i , k + 1 ) + α k g i , k ( x i , k , y i , k ) , x i , k x i , k + 1 .
Using Assumption 2 and Lemma 1, the last term satisfies
α k g i , k ( x i , k , y i , k ) , x i , k x i , k + 1 α k 2 G 2 σ ω .
Hence,
α k g i , k ( x i , k , y i , k ) , x i , k x i , k D ( x i , k , x i , k ) D ( x i , k , x i , k + 1 ) + α k 2 G 2 σ ω .
Applying Lemma 5 further gives
α k g i , k ( x i , k , y i , k ) , x i , k x i , k D ( x i , k , x i , k ) D ( x i , k + 1 , x i , k + 1 ) + K x i , k + 1 x i , k + α k 2 G 2 σ ω .
Next, we lower bound the left-hand side. Since
ϕ i , k ( x k ) = g i , k ( x i , k , σ ( x k ) ) ,
we have
i = 1 N g i , k ( x i , k , y i , k ) , x i , k x i , k = ϕ k ( x k ) , x k x k + i = 1 N g i , k ( x i , k , y i , k ) g i , k ( x i , k , σ ( x k ) ) , x i , k x i , k .
Since x k is the Nash equilibrium of the stage-k game, it satisfies the variational inequality
ϕ k ( x k ) , x x k 0 , x X 1 × × X N .
Taking x = x k and using the strong monotonicity of ϕ k yields
ϕ k ( x k ) , x k x k μ x k x k 2 .
Moreover, by Assumption 3,
g i , k ( x i , k , y i , k ) g i , k ( x i , k , σ ( x k ) ) L i δ i , k .
Let L max = max i V L i . By Assumption 2, ϕ k ( x ) N G for all feasible x . Combining this bound with the strong monotonicity of ϕ k gives a uniform tracking bound
x k x k 2 N G μ B e .
Therefore,
i = 1 N g i , k ( x i , k , y i , k ) , x i , k x i , k μ x k x k 2 L max B e i = 1 N δ i , k .
Combining the preceding upper and lower bounds and summing over all players gives, for k = 1 , , T 1 ,
μ x k x k 2 A k A k + 1 α k + K α k i = 1 N x i , k + 1 x i , k + N G 2 σ ω α k + L max B e i = 1 N δ i , k ,
where
A k = i = 1 N D ( x i , k , x i , k ) .
For the terminal index k = T , we do not introduce x T + 1 . Instead, using the inequality before applying Lemma 5 and the nonnegativity of the Bregman divergence, we obtain
μ x T x T 2 A T α T + N G 2 σ ω α T + L max B e i = 1 N δ i , T .
We now sum the above inequalities and take expectations. Since the stepsize sequence is nonincreasing,
k = 1 T 1 A k A k + 1 α k + A T α T = A 1 α 1 + k = 2 T A k 1 α k 1 α k 1 .
By the uniform boundedness of the Bregman divergence, there exists a constant B D > 0 such that A k B D for all k. Therefore,
k = 1 T 1 A k A k + 1 α k + A T α T B D α T .
Moreover,
k = 1 T 1 1 α k i = 1 N x i , k + 1 x i , k N α T k = 1 T 1 x k + 1 x k = N V T α T .
It remains to bound the aggregate-estimation error term. By Lemma 3,
E δ i , k = E y i , k x ¯ k N γ k P 1 + N G σ ω l = 0 k 1 γ k l 1 α l + N l = 0 k 1 γ k l E η l .
Since each perturbation component is Gaussian with standard deviation proportional to M l , there exists a constant C η > 0 , independent of l and T, such that
E η l C η M l .
Using the geometric summability of γ k , we obtain
k = 1 T i = 1 N E δ i , k = O 1 + k = 1 T α k + k = 1 T M k .
Combining the above estimates yields
k = 1 T E x k x k 2 = O V T + 1 α T + k = 1 T α k + k = 1 T M k .
Substituting this bound into the regret estimate at the beginning of the proof gives
Reg i ( T ) = O T V T + 1 α T + k = 1 T α k + k = 1 T M k .
This completes the proof. □
Remark 4. 
The effectiveness of Algorithm 1 in a rapidly changing environment can be interpreted through the path variation term
V T = k = 1 T 1 x k + 1 x k
in Theorem 1. This quantity measures the cumulative movement of the time-varying Nash equilibrium. A slowly varying environment corresponds to a small value of V T , whereas a rapidly changing environment leads to a larger V T .
From Theorem 1, the normalized dynamic regret satisfies
Reg i ( T ) T = O 1 T V T + 1 α T + k = 1 T α k + k = 1 T M k .
Therefore, the proposed algorithm can achieve vanishing average dynamic regret when
V T + 1 α T + k = 1 T α k + k = 1 T M k = o ( T ) .
For example, if α k = O ( k 1 / 2 ) and M k = O ( k β ) with 0 < β < 1 , then
Reg i ( T ) T = O V T + 1 T + T 1 / 2 + T β .
Hence, when V T = o ( T ) , the average dynamic regret converges to zero even though the equilibrium is time-varying. However, if the environment changes very rapidly so that V T = Θ ( T ) , the bound predicts a non-vanishing average regret. This is consistent with the intrinsic difficulty of tracking a fast-moving equilibrium using only causal online information. In such cases, the algorithm can still operate in a distributed and privacy-preserving manner, but the tracking error and regret are expected to increase.

4.2. Statistical Privacy Guarantee

Assumption 7. 
The set of corrupted players C is not a vertex cut of the communication graph G . Hence, the subgraph induced by the uncorrupted players, denoted by G H , is connected.
We first characterize the distribution of the correlated perturbation.
Lemma 6. 
Suppose that the communication graph G is undirected and connected. For each edge e q = ( i , j ) with i < j , define
η e q , k = η j i , k η i j , k .
Let η E , k = col ( η e 1 , k , , η e | E | , k ) , and let D be the oriented incidence matrix of G . Then, for each coordinate [ n ] ,
[ η k ] N 0 N , 2 M k 2 L ,
where
η k = col ( η 1 , k , , η N , k ) ,
L = D D is the Laplacian matrix of G , and N denotes the degenerate Gaussian distribution.
Proof. 
For each edge e q = ( i , j ) with i < j , since η i j , k and η j i , k are independent and both follow N ( 0 n , M k 2 I n ) , one has
η e q , k = η j i , k η i j , k N ( 0 n , 2 M k 2 I n ) .
Hence, for each coordinate [ n ] ,
[ η e q , k ] N ( 0 , 2 M k 2 ) .
By the definition of the correlated perturbation,
η i , k = j N i ( η j i , k η i j , k ) ,
and thus, in vector form,
η k = D η E , k .
Therefore,
[ η k ] = D [ η E , k ] .
Since all edge noises are independent, it follows that
E [ η k ] = 0 N ,
and
Cov [ η k ] = D Cov [ η E , k ] D = 2 M k 2 D D = 2 M k 2 L .
Hence,
[ η k ] N 0 N , 2 M k 2 L .
This completes the proof. □
The next lemma shows that the Kullback–Leibler divergence between two candidate observations can be bounded by the distance between the corresponding aggregate-estimate vectors.
Lemma 7. 
Let y k and y k be two candidate aggregate-estimate vectors that lead to the same masked observation y ˜ k , that is,
y ˜ k = y k + η k = y k + η k .
Then, for each coordinate [ n ] ,
D KL h [ y ˜ k ] [ y k ] , h [ y ˜ k ] [ y k ] [ y k ] [ y k ] 2 4 M k 2 λ ̲ ( L ) ,
where λ ̲ ( L ) denotes the smallest nonzero eigenvalue of L. Consequently,
D KL h y ˜ k y k , h y ˜ k y k y k y k 2 4 M k 2 λ ̲ ( L ) .
Proof. 
Since G is connected, we have
R ( L ) = { z R N : 1 N z = 0 } .
By Lemma 6, for each coordinate [ n ] , both [ η k ] and [ η k ] are supported on R ( L ) . Hence the conditional laws of [ y ˜ k ] given [ y k ] and [ y k ] are supported on
[ y k ] + R ( L ) and [ y k ] + R ( L ) ,
respectively. Since the two candidate aggregate-estimate vectors lead to the same masked observation,
y ˜ k = y k + η k = y k + η k ,
we have, for each [ n ] ,
[ y k ] [ y k ] = [ η k ] [ η k ] R ( L ) .
Therefore,
[ y k ] + R ( L ) = [ y k ] + R ( L ) ,
which means that the two singular Gaussian measures have the same affine support. The densities below are understood with respect to the ( N 1 ) -dimensional Lebesgue measure on this common affine support.
By Lemma 6, for each [ n ] , the random vector [ η k ] follows the degenerate Gaussian distribution
N ( 0 N , 2 M k 2 L ) .
Hence, the conditional density of [ y ˜ k ] given [ y k ] is
h [ y ˜ k ] [ y k ] ( z ) = 1 det ( 4 π M k 2 L ) exp ( z [ y k ] ) L ( z [ y k ] ) 4 M k 2 ,
and similarly,
h [ y ˜ k ] [ y k ] ( z ) = 1 det ( 4 π M k 2 L ) exp ( z [ y k ] ) L ( z [ y k ] ) 4 M k 2 .
Substituting the above densities into the definition of KLD yields
D KL h [ y ˜ k ] [ y k ] , h [ y ˜ k ] [ y k ] = 1 4 M k 2 ( [ y k ] [ y k ] ) L ( [ y k ] [ y k ] ) .
Since [ y k ] [ y k ] R ( L ) and the eigenvalues of L on R ( L ) are 1 / λ 2 ( L ) , , 1 / λ N ( L ) , we have
( [ y k ] [ y k ] ) L ( [ y k ] [ y k ] ) [ y k ] [ y k ] 2 λ 2 ( L ) .
Then, we obtain
D KL h [ y ˜ k ] [ y k ] , h [ y ˜ k ] [ y k ] [ y k ] [ y k ] 2 4 M k 2 λ ̲ ( L ) .
Summing over all coordinates [ n ] gives
D KL h y ˜ k y k , h y ˜ k y k y k y k 2 4 M k 2 λ ̲ ( L ) .
This completes the proof. □
We are now ready to establish the statistical privacy guarantee of Algorithm 1.
Theorem 2 (Statistical Privacy).
Suppose Assumptions 1–7 hold. Then, during the time horizon T, Algorithm 1 preserves the statistical privacy of the uncorrupted players. Specifically, for any k T ,
D KL h y ˜ H , k y H , k , h y ˜ H , k y H , k N G 2 α k 2 σ ω 2 λ ̲ ( L H ) M k 2 ,
where L H is the Laplacian matrix of the subgraph G H induced by the uncorrupted players, and λ ̲ ( L H ) denotes its smallest nonzero eigenvalue.
Proof. 
For each honest player i H , decompose its perturbation as
η i , k = b i , k + ξ i , k ,
where
b i , k = j N i C ( η j i , k η i j , k )
is the contribution from edges incident to corrupted players, and
ξ i , k = j N i H ( η j i , k η i j , k )
is the contribution from edges whose two endpoints are honest.
The variables b i , k are observed by the adversary and are therefore conditioned on in the privacy analysis. They act only as known deterministic shifts. Let
y ^ H , k = y ˜ H , k b H , k .
Then
y ^ H , k = y H , k + ξ H , k .
Since Assumption 7 guarantees that the honest-player subgraph G H is connected, Lemma 6 applied to G H gives, for each coordinate [ n ] ,
[ ξ H , k ] N ( 0 , 2 M k 2 L H ) ,
and
[ ξ H , k ] R ( L H ) .
Now consider two candidate honest-player datasets that generate the same observation record. Since b H , k is part of the conditioned adversarial observation, the same realization of b H , k is used for both candidates. Hence
y ^ H , k = y H , k + ξ H , k = y H , k + ξ H , k .
Therefore, by Lemma 7 applied to the honest-player subgraph G H ,
D KL h y ^ H , k | y H , k , h y ^ H , k | y H , k y H , k y H , k 2 4 M k 2 λ 2 ( L H ) .
Since y ^ H , k = y ˜ H , k b H , k differs from y ˜ H , k only by a known translation, the same KL bound holds for the conditional laws of y ˜ H , k .
It remains to bound y H , k y H , k .
From Algorithm 1, the aggregate-estimate update is
y k + 1 = W y ˜ k + x k + 1 x k .
Hence, for two candidate datasets generating the same masked estimate y ˜ k , one has
y k + 1 y k + 1 = ( x k + 1 x k ) ( x k + 1 x k ) .
Restricting the above equality to the uncorrupted players gives
y H , k + 1 y H , k + 1 = ( x H , k + 1 x H , k ) ( x H , k + 1 x H , k ) .
Therefore,
y H , k + 1 y H , k + 1 x H , k + 1 x H , k + x H , k + 1 x H , k .
By Lemma 1, for each i H ,
x i , k + 1 x i , k α k G σ ω , x i , k + 1 x i , k α k G σ ω .
Thus,
x H , k + 1 x H , k 2 | H | α k 2 G 2 σ ω 2 N α k 2 G 2 σ ω 2 ,
and similarly,
x H , k + 1 x H , k 2 N α k 2 G 2 σ ω 2 .
Hence,
y H , k + 1 y H , k + 1 2 N α k G σ ω ,
which implies
y H , k + 1 y H , k + 1 2 4 N α k 2 G 2 σ ω 2 .
Replacing k + 1 by k in the above bound, we obtain
y H , k y H , k 2 4 N α k 2 G 2 σ ω 2 .
Substituting this estimate into the KLD inequality yields
D KL h y ˜ H , k y H , k , h y ˜ H , k y H , k N α k 2 G 2 M k 2 σ ω 2 λ ̲ ( L H ) .
According to Definition 3, Algorithm 1 preserves the statistical privacy of the uncorrupted players. □
Remark 5. 
The quantity bounded in Theorem 2 has a direct statistical interpretation. For two candidate honest-player datasets, the KL divergence can be written as
D KL P O | D H P O | D H = E O P O | D H log d P O | D H d P O | D H ,
which is the expected log-likelihood ratio available to the adversary for distinguishing the two candidate datasets. Therefore, a small KL divergence means that the observation record provides limited statistical evidence for distinguishing these two candidates. Moreover, by Pinsker’s inequality, if the KL divergence is bounded by ρ, then the total variation distance between the two observation distributions is at most ρ / 2 .
For each stage k, Theorem 2 gives the privacy leakage bound
ρ k = N G 2 α k 2 σ ω 2 λ ( L H ) M k 2 .
Thus, increasing the perturbation magnitude M k or improving the algebraic connectivity λ ( L H ) of the honest subgraph reduces the statistical leakage, while larger stepsizes may increase it. This interpretation also explains the privacy-performance tradeoff: larger perturbations improve privacy but may increase the estimation error and regret.
The above KL-based notion is different from the standard ( ϵ , δ ) -differential privacy [19,20]. Differential privacy imposes a worst-case output likelihood-ratio bound for adjacent datasets. In contrast, the present criterion controls the average log-likelihood ratio, namely the KL divergence, between two candidate observation distributions.

5. Numerical Case Study: Privacy-Preserving EV Charging Coordination

In this section, we validate the proposed privacy-preserving distributed online algorithm through a practical electric vehicle (EV) charging coordination case study. The case study is motivated by residential or workplace charging networks, where a group of EV users repeatedly update their charging powers according to time-varying electricity prices, charging preferences, and the aggregate load of the network. In such systems, the charging profile of an individual user may reveal private information, such as daily routines, travel habits, and energy consumption patterns. Therefore, privacy-preserving distributed coordination is important for enabling cooperative charging control without directly exposing users’ local information.
In the considered EV charging network, each player corresponds to one EV user. The decision variable represents the charging power, the aggregate term represents the average charging load, and the local cost captures both the price-related payment and the deviation from the user’s preferred charging demand. This application naturally fits the online aggregative game model because the charging environment varies over time and each user’s cost depends on both its own charging action and the aggregate behavior of the charging population.
Consider a charging network with N = 20 users. For each user i V , let x i ( k ) R denote the charging power at iteration k, and let the local feasible set be
X i = [ 0 , x ¯ i ] , i = 1 , , N ,
where x ¯ i = 6 . The aggregative term is defined as
σ ( x ( k ) ) = 1 N j = 1 N x j ( k ) .
For each user i, the time-varying local cost function is given by
J i , k ( x i ( k ) , σ ( x ( k ) ) ) = a k σ ( x ( k ) ) + b k x i ( k ) + c i x i ( k ) r i , k 2 ,
where a k = 0.35 + 0.10 sin ( k / 90 ) , b k = 0.40 + 0.08 cos ( k / 110 ) , r i , k = 2.2 + i 25 + 0.40 sin k 120 + i 7 , c i = 1 + i 40 .
The communication graph is chosen as an undirected ring graph, and the mixing matrix W is constructed by the Metropolis rule. Since each node in the ring graph has degree two, the nonzero weights are w i i = 1 / 3 and w i j = 1 / 3 for j N i . The proposed algorithm is implemented under the Euclidean Bregman divergence D ( x , z ) = 1 2 x z 2 . The simulation horizon is T = 800 , and the iteration index is k = 1 , , T . The stepsize is α k = α 0 k + 1 , where α 0 = 0.35 . For the Gaussian perturbation mechanism, the perturbation magnitude is M k = M 0 ( k + 1 ) β , with β = 0.25 and M 0 = 0.45 . For the Laplace-noise benchmark, the Laplace scale is M k L = 1.60 ( k + 1 ) 0.25 . The privacy-free baseline corresponds to M k = 0 . The initial action of each user is sampled uniformly from [ 0 , 6 ] , and the initial aggregate estimate is chosen as y i ( 0 ) = x i ( 0 ) .
All reported curves are averaged over 20 independent Monte Carlo runs. For Figure 2 and Figure 3, the random seeds are 1000–1019 for the privacy-free baseline, 2000–2019 for the Gaussian perturbation mechanism, and 3000–3019 for the Laplace-noise benchmark. The corrupted-player set used for the privacy interpretation is fixed as C = { 1 , 2 } , and hence | C | = 2 and H = { 3 , , 20 } . Removing nodes 1 and 2 from the ring graph leaves the honest-player subgraph connected, so Assumption 7 is satisfied.
For the experiment with different privacy calibrations in Figure 4, we set a calibration constant Δ = 7.5 . For positive ϵ { 5 , 10 , 15 } , the Gaussian perturbation parameter is chosen as M 0 = Δ ϵ , which gives M 0 = 1.50 , 0.75 , 0.50 , respectively. The case ϵ = 0 denotes the privacy-free no-noise baseline. The random seeds are 4000–4019, 4100–4119, 4200–4219, and 4300–4319 for ϵ = 0 , 5 , 10 , 15 , respectively. The plotted curves are Monte Carlo means. For a plotted quantity z ( k ) , the corresponding 95 % confidence interval is computed as z ¯ ( k ) ± 1.96 s z ( k ) 20 , where z ¯ ( k ) and s z ( k ) are the sample mean and sample standard deviation over the 20 Monte Carlo runs.
The practical interpretation of the main variables and parameters in the EV charging case study is summarized in Table 2. This interpretation shows how the abstract online aggregative game model corresponds to a concrete charging coordination problem.
To evaluate the algorithm performance, we consider the maximum average estimate error
e est ( k ) = max i V y i ( k ) x ¯ ( k ) , x ¯ ( k ) = 1 N j = 1 N x j ( k ) ,
and the normalized regret Reg ( T ) / T , where
Reg ( T ) = k = 1 T i = 1 N J i , k ( x i ( k ) , σ ( x ( k ) ) ) i = 1 N J i , k ( x i ( k ) , σ ( x ( k ) ) ) ,
and x ( k ) is the time-varying Nash equilibrium at iteration k.
Figure 2 compares the maxima of average estimate errors for three algorithms, namely, the privacy-free distributed online algorithm, the proposed algorithm with correlated Gaussian perturbation, and the proposed algorithm with correlated Laplace perturbation. It can be observed that the privacy-free algorithm achieves the smallest estimate error, while both privacy-preserving algorithms lead to slightly larger errors due to the injected perturbations. Moreover, the Gaussian perturbation yields slightly better tracking accuracy than the Laplace perturbation.
Figure 3 shows the corresponding curves of Reg ( T ) / T for the above three algorithms. The privacy-free algorithm gives the smallest normalized regret. After introducing privacy-preserving perturbations, the regret becomes slightly larger, but all curves still decrease as the iteration proceeds. This shows that the proposed method can preserve satisfactory online decision performance while protecting the exchanged aggregate estimates.
To further evaluate the robustness of the proposed algorithm, we provide a statistical summary of the numerical results over 20 independent Monte Carlo runs. For each run, we compute the time-averaged maximum estimation error and the time-averaged normalized regret over the horizon T = 800 . Table 3 reports the mean, sample standard deviation, and median of these quantities. The results show that Algorithm 1 has a slightly larger estimation error and regret than the privacy-free baseline due to the injected perturbations, but it remains stable across different random trials. Compared with the Laplace-noise benchmark, the proposed correlated Gaussian perturbation achieves smaller average estimation error and smaller normalized regret, which further supports the reliability of the proposed mechanism.
To further illustrate the influence of privacy levels, Figure 4 plots the curves of Reg ( T ) / T for different privacy values. It is seen that higher privacy level magnitudes generally lead to larger regret, which reveals the tradeoff between privacy protection and online performance.
Finally, we modify the feasible set from an interval to a simplex set and compare the Euclidean-distance-based algorithm with the KL-divergence-based algorithm. Specifically, for each user i, the decision variable is changed to
x i ( k ) = x i 1 ( k ) , x i 2 ( k ) , , x i d ( k ) R d ,
with d = 3 , and the feasible set is
Δ = x R d | x 0 , = 1 d x = 1 .
To examine the influence of network topology, we compare the proposed algorithm under three connected communication graphs: a ring graph, a ring graph with additional chordal edges, and a star graph. For the star graph, the hub node is selected outside the corrupted-player set to keep the honest-player subgraph connected. Figure 5 compares the aggregate-estimation error under these communication graphs. The results show that the proposed algorithm remains effective under all tested topologies and is not restricted to a single ring graph. The graph with additional chordal edges generally gives a smaller estimation error, indicating that better network connectivity improves the information-mixing ability of the dynamic average consensus step.
Figure 6 presents the corresponding curves of Reg ( T ) / T . It is observed that both methods can solve the problem over the simplex set, while the KL-divergence algorithm achieves better regret performance, which indicates that the induced non-Euclidean geometry is more suitable for simplex constrained charging allocation problems.

6. Discussion

The simulation results show that the proposed method can balance privacy protection and online decision performance in distributed online aggregative games. After introducing perturbations into the exchanged aggregate estimates, the estimate errors and normalized regret become slightly larger than those of the privacy-free algorithm. However, the overall performance remains stable, which indicates that the correlated perturbation mechanism does not destroy the online tracking ability of the algorithm.
The results also show that the perturbation distribution affects performance. In the considered setting, the correlated Gaussian perturbation achieves slightly better estimate accuracy and regret performance than the correlated Laplace perturbation. In addition, the experiments under different privacy levels reveal a clear relationship between privacy strength and online performance. Stronger privacy protection requires larger perturbations, which improves privacy but also increases the regret.
The simplex constrained experiment provides another useful observation. Compared with the Euclidean distance based update, the KL-divergence update achieves better performance. This result suggests that when the feasible set has a simplex structure, choosing a geometry that matches the constraint set is beneficial. Overall, the proposed method provides an effective way to protect privacy while maintaining satisfactory online performance.
The EV charging case study also illustrates the practical relevance of the proposed framework. In a distributed charging network, users may be unwilling to share their charging states or aggregate-load estimates directly, since such information can be linked to personal mobility and energy consumption habits. Therefore, the method is suitable for privacy-sensitive networked resource allocation problems in which local decisions are coupled through an aggregate quantity. Beyond EV charging, similar structures appear in demand response, shared energy management, communication resource allocation, congestion control, and cloud resource allocation. In these applications, each agent optimizes its own online decision while being affected by the aggregate behavior of the whole population, and privacy protection is needed during repeated information exchange.

7. Conclusions

This paper studied statistical privacy preservation in distributed online aggregative games with time-varying costs. To protect sensitive local information during repeated communication, we proposed a privacy-preserving distributed online mirror descent algorithm with correlated perturbations. The correlated perturbations mask the exchanged aggregate estimates while preserving a global balancing property, which allows the dynamic average-tracking mechanism to be maintained. Under the stated assumptions, we established an expected dynamic regret bound and a Kullback–Leibler divergence statistical privacy guarantee. The numerical simulations on electric vehicle charging further illustrate the effectiveness of the proposed algorithm, the tradeoff between privacy protection and online performance, and the advantage of using a KL-divergence-based mirror geometry for simplex-constrained problems.
The proposed framework can be applied to broader distributed online decision-making problems, such as energy management, communication networks, traffic control, and resource allocation. Several directions remain open for future research. First, it would be meaningful to extend the method to directed, time-varying, lossy, or asynchronous communication networks. Second, adaptive choices of stepsizes and perturbation magnitudes may further improve the tradeoff between privacy and regret performance. Finally, stronger adversarial or collusion models, extensions to coupled constraints, stochastic feedback, and large-scale practical applications deserve further investigation.

Author Contributions

Conceptualization, M.Y.; methodology, M.Y.; software, M.Y.; validation, M.Y.; formal analysis, M.Y.; investigation, M.Y.; writing—original draft, M.Y.; writing—review & editing, R.Y.; visualization, R.Y.; supervision, R.Y.; project administration, R.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors upon request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Hazan, E. Introduction to Online Convex Optimization. Found. Trends Optim. 2016, 2, 157–325. [Google Scholar] [CrossRef]
  2. Shalev-Shwartz, S. Online Learning and Online Convex Optimization. Found. Trends Mach. Learn. 2012, 4, 107–194. [Google Scholar] [CrossRef]
  3. Li, X.; Xie, L.; Li, N. A Survey on Distributed Online Optimization and Game. arXiv 2023, arXiv:2205.00473. [Google Scholar] [CrossRef]
  4. Yi, X.; Li, X.; Xie, L.; Johansson, K.H. Distributed Online Convex Optimization with Time-Varying Coupled Inequality Constraints. IEEE Trans. Signal Process. 2020, 68, 731–746. [Google Scholar] [CrossRef]
  5. Nedić, A.; Ozdaglar, A. Distributed Subgradient Methods for Multi-Agent Optimization. IEEE Trans. Autom. Control 2009, 54, 48–61. [Google Scholar] [CrossRef]
  6. Nedić, A.; Olshevsky, A. Stochastic Gradient-Push for Strongly Convex Functions on Time-Varying Directed Graphs. IEEE Trans. Autom. Control 2016, 61, 3936–3947. [Google Scholar] [CrossRef]
  7. Zhang, W.; Jiang, Y.; Zhang, W. Antecedents of Online Knowledge Seeking of Employees in Technical R&D Team: An Empirical Study in China. IEEE Trans. Eng. Manag. 2023, 70, 523–532. [Google Scholar] [CrossRef]
  8. Liu, Y.; Jiang, L.; Qi, Q.; Xie, K.; Xie, S. Online Computation Offloading for Collaborative Space/Aerial-Aided Edge Computing Toward 6G System. IEEE Trans. Veh. Technol. 2024, 73, 2495–2505. [Google Scholar] [CrossRef]
  9. Liu, H.; Hu, M.; Yang, L. A Directional Flow Pattern-Driven Framework for Fine-Grained Air Traffic Flow Prediction. Aerosp. Sci. Technol. 2026, 168, 111029. [Google Scholar] [CrossRef]
  10. Koshal, J.; Nedić, A.; Shanbhag, U.V. Distributed Algorithms for Aggregative Games on Graphs. Oper. Res. 2016, 64, 680–704. [Google Scholar] [CrossRef]
  11. Belgioioso, G.; Nedić, A.; Grammatico, S. Distributed Generalized Nash Equilibrium Seeking in Aggregative Games on Time-Varying Networks. IEEE Trans. Autom. Control 2021, 66, 2061–2075. [Google Scholar] [CrossRef]
  12. Salehisadaghiani, F.; Pavel, L. Distributed Nash Equilibrium Seeking: A Gossip-Based Algorithm. Automatica 2016, 72, 209–216. [Google Scholar] [CrossRef]
  13. Pavel, L. Game Theory for Control of Optical Networks; Birkhäuser: Cham, Switzerland, 2012. [Google Scholar]
  14. Yang, C.; Wang, S.; Zhang, S.; Lin, S.; Huang, B. A Class of Distributed Online Aggregative Optimization in Unknown Dynamic Environment. Mathematics 2024, 12, 2460. [Google Scholar] [CrossRef]
  15. Huo, B.; Ma, J.; Du, M.; Yin, L. Average Consensus Tracking of Weight-Balanced Multi-Agent Systems via Sampled Data. Mathematics 2024, 12, 674. [Google Scholar] [CrossRef]
  16. He, L.; Cheng, H.; Zhang, Y. Centralized and Decentralized Event-Triggered Nash Equilibrium-Seeking Strategies for Heterogeneous Multi-Agent Systems. Mathematics 2025, 13, 419. [Google Scholar] [CrossRef]
  17. Cao, Z.; Guo, X.; Zhang, H. Privacy-Preserving Distributed Learning via Newton Algorithm. Mathematics 2023, 11, 3807. [Google Scholar] [CrossRef]
  18. Duchi, J.C.; Jordan, M.I.; Wainwright, M.J. Privacy-Aware Learning. J. ACM 2014, 61, 38. [Google Scholar] [CrossRef]
  19. Dwork, C.; Roth, A. The Algorithmic Foundations of Differential Privacy. Found. Trends Theor. Comput. Sci. 2014, 9, 211–407. [Google Scholar] [CrossRef]
  20. Kairouz, P.; Oh, S.; Viswanath, P. The Composition Theorem for Differential Privacy. IEEE Trans. Inf. Theory 2017, 63, 4037–4049. [Google Scholar] [CrossRef]
  21. Huang, Z.; Mitra, S.; Dullerud, G.E. Differentially Private Iterative Synchronous Consensus. In Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, Raleigh, NC, USA, 15 October 2012; pp. 81–90. [Google Scholar]
  22. Nozari, E.; Tallapragada, P.; Cortés, J. Differentially Private Average Consensus: Obstructions, Trade-Offs, and Optimal Algorithm Design. Automatica 2017, 81, 221–231. [Google Scholar] [CrossRef]
  23. Zhang, K.; Li, Z.; Wang, Y.; Louati, A.; Chen, J. Privacy-Preserving Dynamic Average Consensus via State Decomposition: Case Study on Multi-Robot Formation Control. Automatica 2022, 136, 110182. [Google Scholar] [CrossRef]
  24. Wang, Y. A Robust Dynamic Average Consensus Algorithm that Ensures Both Differential Privacy and Accurate Convergence. In Proceedings of the 62nd IEEE Conference on Decision and Control (CDC), Singapore, 13–15 December 2023; pp. 1130–1137. [Google Scholar]
  25. Lin, Y.; Liu, K.; Han, D.; Xia, Y. Statistical Privacy-Preserving Online Distributed Nash Equilibrium Tracking in Aggregative Games. IEEE Trans. Autom. Control 2024, 69, 323–330. [Google Scholar]
  26. Yuan, D.; Hong, Y.; Ho, D.W.C.; Xu, S. Distributed Mirror Descent for Online Composite Optimization. IEEE Trans. Autom. Control 2021, 66, 714–729. [Google Scholar] [CrossRef]
  27. Beck, A.; Teboulle, M. Mirror Descent and Nonlinear Projected Subgradient Methods for Convex Optimization. Oper. Res. Lett. 2003, 31, 167–175. [Google Scholar] [CrossRef]
  28. Bubeck, S. Convex Optimization: Algorithms and Complexity. Found. Trends Mach. Learn. 2015, 8, 231–357. [Google Scholar] [CrossRef]
  29. Yuan, M.; Lei, J.; Hong, Y. Differentially Private Distributed Online Mirror Descent Algorithm. Neurocomputing 2023, 551, 126531. [Google Scholar] [CrossRef]
Figure 1. Flow chart of the proposed privacy-preserving distributed online mirror descent algorithm.
Figure 1. Flow chart of the proposed privacy-preserving distributed online mirror descent algorithm.
Mathematics 14 01731 g001
Figure 2. Comparison of maxima of average estimate errors for the privacy-free algorithm, the proposed algorithm with correlated Gaussian perturbation, and the proposed algorithm with correlated Laplace perturbation.
Figure 2. Comparison of maxima of average estimate errors for the privacy-free algorithm, the proposed algorithm with correlated Gaussian perturbation, and the proposed algorithm with correlated Laplace perturbation.
Mathematics 14 01731 g002
Figure 3. Comparison of Reg ( T ) / T for the privacy-free algorithm, the proposed algorithm with correlated Gaussian perturbation, and the algorithm with correlated Laplace perturbation.
Figure 3. Comparison of Reg ( T ) / T for the privacy-free algorithm, the proposed algorithm with correlated Gaussian perturbation, and the algorithm with correlated Laplace perturbation.
Mathematics 14 01731 g003
Figure 4. Comparison of Reg ( T ) / T for the proposed algorithm under different privacy protection levels.
Figure 4. Comparison of Reg ( T ) / T for the proposed algorithm under different privacy protection levels.
Mathematics 14 01731 g004
Figure 5. Maximum aggregate-estimation error under different communication graphs.
Figure 5. Maximum aggregate-estimation error under different communication graphs.
Mathematics 14 01731 g005
Figure 6. Comparison of Reg ( T ) / T under simplex constraints for the Euclidean distance algorithm and the KL-divergence algorithm.
Figure 6. Comparison of Reg ( T ) / T under simplex constraints for the Euclidean distance algorithm and the KL-divergence algorithm.
Mathematics 14 01731 g006
Table 1. Comparison with representative related works.
Table 1. Comparison with representative related works.
WorkProblem SettingMethod and Privacy FeatureMain Distinction
Yang et al. [14]Distributed online
aggregative optimization
Distributed online update with performance analysis; privacy is not the main focusDoes not address privacy-preserving online aggregative games.
Cao et al. [17]Privacy-preserving
distributed learning
Newton method with a privacy-preserving
mechanism
Does not study online game equilibrium tracking.
Lin et al. [25]Privacy-preserving online aggregative gamesEuclidean projected gradient update; privacy with
correlated perturbations
Closest to this paper, but only relies on Euclidean projection.
This paperPrivacy-preserving
distributed online
aggregative games
Distributed online mirror descent; privacy with
correlated perturbations and KL-divergence-based statistical privacy
Integrates dynamic equilibrium tracking, non-Euclidean decision geometry, and statistical privacy protection.
Table 2. Practical interpretation of the EV charging case study.
Table 2. Practical interpretation of the EV charging case study.
Symbol or ParameterPractical Meaning
i V EV user in the distributed charging network.
x i ( k ) Charging power selected by user i at iteration k.
X i = [ 0 , x ¯ i ] Physical charging-power limit of user i.
σ ( x ( k ) ) Average charging load of all users, reflecting the aggregate demand level.
a k and b k Time-varying price or grid-condition coefficients.
r i , k Preferred charging demand of user i at time k.
c i User penalty weight for deviating from the preferred charging demand.
Table 3. Statistical summary over 20 independent Monte Carlo runs.
Table 3. Statistical summary over 20 independent Monte Carlo runs.
AlgorithmTime-Averaged Estimation ErrorTime-Averaged Reg ( T ) / T
Mean ± Std.MedianMean ± Std.Median
Privacy-free 0.0657 ± 0.0013 0.0655 0.1430 ± 0.0124 0.1408
Gaussian perturbation 0.1897 ± 0.0055 0.1899 0.1555 ± 0.0105 0.1544
Laplace perturbation 0.8633 ± 0.0215 0.8674 0.2246 ± 0.0279 0.2174
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yuan, M.; Yu, R. Statistical Privacy-Preserving Distributed Online Aggregative Games via Mirror Descent with Correlated Perturbations. Mathematics 2026, 14, 1731. https://doi.org/10.3390/math14101731

AMA Style

Yuan M, Yu R. Statistical Privacy-Preserving Distributed Online Aggregative Games via Mirror Descent with Correlated Perturbations. Mathematics. 2026; 14(10):1731. https://doi.org/10.3390/math14101731

Chicago/Turabian Style

Yuan, Meng, and Rui Yu. 2026. "Statistical Privacy-Preserving Distributed Online Aggregative Games via Mirror Descent with Correlated Perturbations" Mathematics 14, no. 10: 1731. https://doi.org/10.3390/math14101731

APA Style

Yuan, M., & Yu, R. (2026). Statistical Privacy-Preserving Distributed Online Aggregative Games via Mirror Descent with Correlated Perturbations. Mathematics, 14(10), 1731. https://doi.org/10.3390/math14101731

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop