{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:16:47Z","timestamp":1770229007332,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819561957","type":"print"},{"value":"9789819561964","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6196-4_7","type":"book-chapter","created":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T05:59:01Z","timestamp":1770184741000},"page":"94-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Pursuit of\u00a0Truth: Incentive Mechanism Involving Privacy Demands in\u00a0Mobile Crowdsourcing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9259-8223","authenticated-orcid":false,"given":"Ping","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2428-8737","authenticated-orcid":false,"given":"Pengpeng","family":"Qiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6424-8633","authenticated-orcid":false,"given":"Yang","family":"Cao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1611-9017","authenticated-orcid":false,"given":"Tao","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,5]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Maisonneuve, N., Stevens, M., Niessen, M. E., Steels, L.: NoiseTube: measuring and mapping noise pollution with mobile phones, pp. 215\u2013228 (2009)","DOI":"10.1007\/978-3-540-88351-7_16"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Wang, Y., Liu, X., Wei, H., Forman, G., Chen, C., Zhu, Y.: CrowdAtlas: self-updating maps for cloud and personal use. In: Annual International Conference on Mobile Systems, Applications, and Services, pp. 469\u2013470 (2013)","DOI":"10.1145\/2462456.2465730"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Gao, R., et al.: Indoor floor plan reconstruction via mobile crowdsensing. In: Annual International Conference on Mobile Computing and Networking, pp. 249\u2013260 (2014)","DOI":"10.1145\/2639108.2639134"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Tian, S., Tan, Y., Wang, H., Liu, H., Li, Z.: ASDIA: an adversarial sample to preserve privacy program in federated learning. IEEE Trans. Dependable Secure Comput. (2025)","DOI":"10.1109\/TDSC.2025.3545599"},{"issue":"11","key":"7_CR5","doi-asserted-by":"publisher","first-page":"4214","DOI":"10.14778\/3749646.3749688","volume":"18","author":"X Wen","year":"2025","unstructured":"Wen, X., Qiao, P., Liu, S., Zheng, Z., Cao, Y., Li, Z.: Continuous publication of weighted graphs with local differential privacy. VLDB Endowment 18(11), 4214\u20134226 (2025)","journal-title":"VLDB Endowment"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Wang, Y., Chen, Y., Ye, F., Yang, J., Liu, H.: Towards understanding the advertiser\u2019s perspective of smartphone user privacy. In: IEEE International Conference on Distributed Computing Systems, pp. 288\u2013297 (2015)","DOI":"10.1109\/ICDCS.2015.37"},{"issue":"9","key":"7_CR7","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MCOM.001.1800674","volume":"57","author":"Z Wang","year":"2019","unstructured":"Wang, Z., et al.: When mobile crowdsensing meets privacy. IEEE Commun. Mag. 57(9), 72\u201378 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Agadakos, I., Polakis, J., Portokalidis, G.: Techu: open and privacy-preserving crowdsourced GPS for the masses, pp. 475\u2013487 (2017)","DOI":"10.1145\/3081333.3081345"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1016\/j.ins.2022.12.035","volume":"624","author":"L Yao","year":"2023","unstructured":"Yao, L., et al.: Scalable CCA-Secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing. Inf. Sci. 624, 777\u2013795 (2023)","journal-title":"Inf. Sci."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Yao, L., Hou, L., Weng, J., Zhao, F.: Provably secure attribute-based authenticated encryption with keyword search from ideal lattices. Sci. China Inf. Sci. 67(1) (2024)","DOI":"10.1007\/s11432-022-3808-7"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Ghosh, A., Roth, A.: Selling privacy at auction. In: ACM Conference on Electronic Commerce, pp. 199\u2013208 (2011)","DOI":"10.1145\/1993574.1993605"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Li, Y., Huang, L., Tian, S., Liu, H., Li, Z.: Robust generative adaptation network for open-set adversarial defense. IEEE Trans. Inf. Forensics Secur. (2025)","DOI":"10.1109\/TIFS.2025.3529311"},{"issue":"5","key":"7_CR13","doi-asserted-by":"publisher","first-page":"3760","DOI":"10.1109\/TNET.2024.3397309","volume":"32","author":"C Li","year":"2024","unstructured":"Li, C., Li, Z., Long, S., Qiao, P., Yuan, Y., Wang, G.: Robust data inference and cost-effective cell selection for sparse mobile crowdsensing. IEEE\/ACM Trans. Networking 32(5), 3760\u20133775 (2024)","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/JIOT.2019.2953278","volume":"7","author":"D Baek","year":"2020","unstructured":"Baek, D., Chen, J., Choi, B.J.: Small profits and quick returns: an incentive mechanism design for crowdsourcing under continuous platform competition. IEEE Internet Things J. 7(1), 349\u2013362 (2020)","journal-title":"IEEE Internet Things J."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Wen, Y., Tian, X., Gan, X., Wang, X.: Incentivize crowd labeling under budget constraint. In: IEEE Conference on Computer Communications, pp. 2812\u20132820 (2015)","DOI":"10.1109\/INFOCOM.2015.7218674"},{"issue":"9","key":"7_CR16","doi-asserted-by":"publisher","first-page":"4203","DOI":"10.1109\/TVT.2014.2363842","volume":"64","author":"Y Wen","year":"2015","unstructured":"Wen, Y., et al.: Quality-driven auction-based incentive mechanism for mobile crowd sensing. IEEE Trans. Veh. Technol. 64(9), 4203\u20134214 (2015)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Jin, H., Su, L., Ding, B., Nahrstedt, K., Borisov, N.: Enabling privacy-preserving incentives for mobile crowd sensing systems. In: IEEE International Conference on Distributed Computing Systems, pp. 344\u2013353 (2016)","DOI":"10.1109\/ICDCS.2016.50"},{"issue":"1","key":"7_CR18","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/TMC.2020.3003673","volume":"21","author":"P Sun","year":"2022","unstructured":"Sun, P., et al.: Towards personalized privacy-preserving incentive for truth discovery in mobile crowdsensing systems. IEEE Trans. Mob. Comput. 21(1), 352\u2013365 (2022)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Li, Q., Li, Y., Gao, J., Zhao, B., Fan, W., Han, J.: Resolving conflicts in heterogeneous data by truth discovery and source reliability estimation. In: ACM SIGMOD International Conference on Management of Data, pp. 1187\u20131198 (2014)","DOI":"10.1145\/2588555.2610509"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Wang, D., Kaplan, L., Le, H., Abdelzaher, T.: On truth discovery in social sensing: A maximum likelihood estimation approach. In: 2012 ACM\/IEEE 11th International Conference on Information Processing in Sensor Networks, pp. 233\u2013244 (2012)","DOI":"10.1109\/IPSN.2012.6920960"},{"issue":"1","key":"7_CR21","doi-asserted-by":"publisher","first-page":"550","DOI":"10.14778\/1687627.1687690","volume":"2","author":"XL Dong","year":"2009","unstructured":"Dong, X.L., Berti-Equille, L., Srivastava, D.: Integrating conflicting data: the role of source dependence. Proc. VLDB Endow. 2(1), 550\u2013561 (2009)","journal-title":"Proc. VLDB Endow."},{"issue":"6","key":"7_CR22","doi-asserted-by":"publisher","first-page":"550","DOI":"10.14778\/2168651.2168656","volume":"5","author":"B Zhao","year":"2012","unstructured":"Zhao, B., Rubinstein, B.I., Gemmell, J., Han, J.: A Bayesian approach to discovering truth from conflicting sources for data integration. Proc. VLDB Endow. 5(6), 550\u2013561 (2012)","journal-title":"Proc. VLDB Endow."},{"issue":"8","key":"7_CR23","doi-asserted-by":"publisher","first-page":"1986","DOI":"10.1109\/TKDE.2016.2559481","volume":"28","author":"Y Li","year":"2016","unstructured":"Li, Y., Li, Q., Jing Gao, L.S., Zhao, B., Fan, W., Han, J.: Conflicts to harmony: a framework for resolving conflicts in heterogeneous data by truth discovery. IEEE Trans. Knowl. Data Eng. 28(8), 1986\u20131999 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR24","unstructured":"Wang, P., Li, Z., Guo, B., Long, S., Guo, S., Cao, J.: A UAV-assisted truth discovery approach with incentive mechanism design in mobile crowd sensing. IEEE\/ACM Trans. Networking, 1\u201315 (2023)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Snow, R., O\u2019connor, B., Jurafsky, D., Ng, A.Y.: Cheap and fast\u2014but is it good? evaluating non-expert annotations for natural language tasks. In: Conference on Empirical Methods in Natural Language Processing, pp. 254\u2013263 (2008)","DOI":"10.3115\/1613715.1613751"},{"key":"7_CR26","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.cose.2011.02.004","volume":"30","author":"DH Shih","year":"2011","unstructured":"Shih, D.H., Yen, D.C., Cheng, C.H., Shih, M.H.: A secure multi-item e-auction mechanism with bid privacy. Comput. Secur. 30, 273\u2013287 (2011)","journal-title":"Comput. Secur."},{"issue":"5","key":"7_CR27","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1109\/TNET.2018.2840098","volume":"26","author":"LS Haiming Jin","year":"2018","unstructured":"Haiming Jin, L.S., Xiao, H., Nahrstedt, K.: Incentive mechanism for privacy-aware data aggregation in mobile crowd sensing systems. IEEE\/ACM Trans. Netw. 26(5), 2019\u20132032 (2018)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Wang, Z., Li, J., Hu, J., Ren, J., Li, Z., Li, Y.: Towards privacy-preserving incentive for mobile crowdsensing under an untrusted platform. In: IEEE Conference on Computer Communications, pp. 2053\u20132061 (2019)","DOI":"10.1109\/INFOCOM.2019.8737594"},{"issue":"12","key":"7_CR29","doi-asserted-by":"publisher","first-page":"2995","DOI":"10.1109\/TIFS.2018.2834232","volume":"13","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., He, S., Chen, J., Zhang, J.: REAP: an efficient incentive mechanism for reconciling aggregation accuracy and individual privacy in crowdsensing. IEEE Trans. Inf. Forensics Secur. 13(12), 2995\u20133007 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Cuff, P., Yu, L.: Differential privacy as a mutual information constraint. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 43\u201354 (2016)","DOI":"10.1145\/2976749.2978308"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Li, Y., et al.: Towards differentially private truth discovery for crowd sensing systems. In: IEEE International Conference on Distributed Computing Systems, pp. 1156\u20131166 (2020)","DOI":"10.1109\/ICDCS47774.2020.00037"}],"container-title":["Lecture Notes in Computer Science","Databases Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6196-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T05:59:11Z","timestamp":1770184751000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6196-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819561957","9789819561964"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6196-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"5 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Database Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adc-conference.github.io\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}