{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T08:48:54Z","timestamp":1747385334054,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819712731"},{"type":"electronic","value":"9789819712748"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-1274-8_1","type":"book-chapter","created":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:20:02Z","timestamp":1710271202000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Bilateral Personalized Information Fusion in\u00a0Mobile Crowdsensing"],"prefix":"10.1007","author":[{"given":"Zheqi","family":"Feng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1653-4501","authenticated-orcid":false,"given":"Tao","family":"Peng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9875-4182","authenticated-orcid":false,"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kejian","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,13]]},"reference":[{"issue":"2","key":"1_CR1","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002). https:\/\/doi.org\/10.1109\/4235.996017","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"2","key":"1_CR2","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1109\/TMC.2021.3093552","volume":"22","author":"Z Wang","year":"2023","unstructured":"Wang, Z., et al.: Towards privacy-driven truthful incentives for mobile crowdsensing under untrusted platform. IEEE Trans. Mob. Comput. 22(2), 1198\u20131212 (2023). https:\/\/doi.org\/10.1109\/TMC.2021.3093552","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"12","key":"1_CR3","doi-asserted-by":"publisher","first-page":"3351","DOI":"10.1109\/TMC.2020.2999923","volume":"20","author":"B Zhao","year":"2021","unstructured":"Zhao, B., Tang, S., Liu, X., Zhang, X., Chen, W.-N.: iTAM: bilateral privacy-preserving task assignment for mobile crowdsensing. IEEE Trans. Mob. Comput. 20(12), 3351\u20133366 (2021). https:\/\/doi.org\/10.1109\/TMC.2020.2999923","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1_CR4","doi-asserted-by":"publisher","unstructured":"Peng, T., Zhong, W., Wang, G., Zhang, S., Luo, E., Wang, T.: Spatiotemporal-aware privacy-preserving task matching in mobile crowdsensing. IEEE Internet Things J. (2023) https:\/\/doi.org\/10.1109\/JIOT.2023.3292284","DOI":"10.1109\/JIOT.2023.3292284"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Liu, Q., et al.: SlimBox: lightweight packet inspection over encrypted traffic. IEEE Trans. Dependable Secure Comput. (2022). https:\/\/doi.org\/10.1109\/TDSC.2022.3222533","DOI":"10.1109\/TDSC.2022.3222533"},{"issue":"3","key":"1_CR6","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1109\/TDSC.2022.3163752","volume":"20","author":"Y Cheng","year":"2023","unstructured":"Cheng, Y., Ma, J., Liu, Z., Wu, Y., Wei, K., Dong, C.: A lightweight privacy preservation scheme with efficient reputation management for mobile crowdsensing in vehicular networks. IEEE Trans. Dependable Secure Comput. 20(3), 1771\u20131788 (2023). https:\/\/doi.org\/10.1109\/TDSC.2022.3163752","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"9","key":"1_CR7","doi-asserted-by":"publisher","first-page":"3250","DOI":"10.1109\/TMC.2021.3050147","volume":"21","author":"L Li","year":"2022","unstructured":"Li, L., et al.: Privacy preserving participant recruitment for coverage maximization in location aware mobile crowdsensing. IEEE Trans. Mob. Comput. 21(9), 3250\u20133262 (2022). https:\/\/doi.org\/10.1109\/TMC.2021.3050147","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Li, Z., Zheng, Z., Guo, S., Guo, B., Xiao, F., Ren, K.: Disguised as privacy: data poisoning attacks against differentially private crowdsensing systems. IEEE Trans. Mob. Comput. (2022). https:\/\/doi.org\/10.1109\/TMC.2022.3173642","DOI":"10.1109\/TMC.2022.3173642"},{"issue":"3","key":"1_CR9","doi-asserted-by":"publisher","first-page":"1352","DOI":"10.1109\/TNET.2022.3141582","volume":"30","author":"J An","year":"2022","unstructured":"An, J., Wang, Z., He, X., Gui, X., Cheng, J., Gui, R.: PPQC: a blockchain-based privacy-preserving quality control mechanism in crowdsensing applications. IEEE\/ACM Trans. Netw. 30(3), 1352\u20131367 (2022). https:\/\/doi.org\/10.1109\/TNET.2022.3141582","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"11","key":"1_CR10","doi-asserted-by":"publisher","first-page":"90","DOI":"10.11959\/j.issn.1000-436x.2022208","volume":"43","author":"T Peng","year":"2022","unstructured":"Peng, T., Zhong, W., Wang, G., et al.: Privacy-preserving precise profile matching in mobile social network. J. Commun. 43(11), 90\u2013103 (2022). https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2022208","journal-title":"J. Commun."},{"issue":"10","key":"1_CR11","doi-asserted-by":"publisher","first-page":"2961","DOI":"10.1109\/TMC.2020.2993963","volume":"20","author":"F Wu","year":"2021","unstructured":"Wu, F., Yang, S., Zheng, Z., Tang, S., Chen, G.: Fine-grained user profiling for personalized task matching in mobile crowdsensing. IEEE Trans. Mob. Comput. 20(10), 2961\u20132976 (2021). https:\/\/doi.org\/10.1109\/TMC.2020.2993963","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/TMC.2020.3003673","volume":"21","author":"P Sun","year":"2022","unstructured":"Sun, P., et al.: Towards personalized privacy-preserving incentive for truth discovery in mobile crowdsensing systems. IEEE Trans. Mob. Comput. 21(1), 352\u2013365 (2022). https:\/\/doi.org\/10.1109\/TMC.2020.3003673","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"5","key":"1_CR13","doi-asserted-by":"publisher","first-page":"2080","DOI":"10.1109\/TMC.2020.2973990","volume":"20","author":"Z Wang","year":"2021","unstructured":"Wang, Z., et al.: Towards personalized task-oriented worker recruitment in mobile crowdsensing. IEEE Trans. Mob. Comput. 20(5), 2080\u20132093 (2021). https:\/\/doi.org\/10.1109\/TMC.2020.2973990","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"6","key":"1_CR14","doi-asserted-by":"publisher","first-page":"4231","DOI":"10.1109\/TII.2019.2948068","volume":"16","author":"J Xiong","year":"2020","unstructured":"Xiong, J., et al.: A personalized privacy protection framework for mobile crowdsensing in IIoT. IEEE Trans. Industr. Inf. 16(6), 4231\u20134241 (2020). https:\/\/doi.org\/10.1109\/TII.2019.2948068","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"1_CR15","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1109\/TMC.2019.2943468","volume":"20","author":"C Zhao","year":"2021","unstructured":"Zhao, C., Yang, S., McCann, J.A.: On the data quality in privacy-preserving mobile crowdsensing systems with untruthful reporting. IEEE Trans. Mob. Comput. 20(2), 647\u2013661 (2021). https:\/\/doi.org\/10.1109\/TMC.2019.2943468","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"1_CR16","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1109\/TMC.2018.2889458","volume":"19","author":"S Bhattacharjee","year":"2020","unstructured":"Bhattacharjee, S., Ghosh, N., Shah, V.K., Das, S.K.: $$QnQ$$QnQ: quality and quantity based unified approach for secure and trustworthy mobile crowdsensing. IEEE Trans. Mob. Comput. 19(1), 200\u2013216 (2020). https:\/\/doi.org\/10.1109\/TMC.2018.2889458","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? Personalized differential privacy. In: IEEE ICDE (2015)","DOI":"10.1109\/ICDE.2015.7113353"},{"issue":"8","key":"1_CR20","doi-asserted-by":"publisher","first-page":"1986","DOI":"10.1109\/TKDE.2016.2559481","volume":"28","author":"Y Li","year":"2016","unstructured":"Li, Y., et al.: Conflicts to harmony: a framework for resolving conflicts in heterogeneous data by truth discovery. IEEE Trans. Knowl. Data Eng. 28(8), 1986\u20131999 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"8","key":"1_CR21","doi-asserted-by":"publisher","first-page":"2379","DOI":"10.1109\/TMC.2016.262098","volume":"16","author":"B Guo","year":"2017","unstructured":"Guo, B., Chen, H., Han, Q., Yu, Z., Zhang, D., Wang, Y.: Worker-contributed data utility measurement for visual crowdsensing systems. IEEE Trans. Mob. Comput. 16(8), 2379\u20132391 (2017). https:\/\/doi.org\/10.1109\/TMC.2016.262098","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Wang, H., Uddin, M., Qi, G.-J. , Huang, T., Abdelzaher, T., Cao, G.: PhotoNet: a similarity-aware image delivery service for situation awareness. In: Proceedings of the 10th ACM\/IEEE International Conference on Information Processing in Sensor Networks, pp. 135\u2013136 (2011)","DOI":"10.1109\/RTSS.2011.36"},{"key":"1_CR23","unstructured":"Dong, L., Berti-Equille, L.: Weather (2010). http:\/\/lunadong.com\/fusionDataSets.htm"},{"key":"1_CR24","unstructured":"Li, X., Dong, L.: Stock (2013). http:\/\/lunadong.com\/fusionDataSets.htm"},{"key":"1_CR25","first-page":"24","volume":"2","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 2, 24\u201330 (2005)","journal-title":"IEEE Secur. Priv."}],"container-title":["Communications in Computer and Information Science","Ubiquitous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-1274-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:20:11Z","timestamp":1710271211000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-1274-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819712731","9789819712748"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-1274-8_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UbiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Exeter","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ubisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hpcn.exeter.ac.uk\/ubisec2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"MyReview","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"91","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}