{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:59:29Z","timestamp":1742921969653,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819947515"},{"type":"electronic","value":"9789819947522"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-4752-2_22","type":"book-chapter","created":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T16:02:10Z","timestamp":1690732930000},"page":"261-275","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Clustering-Based Collusion Detection in Crowdsourcing"],"prefix":"10.1007","author":[{"given":"Ruoyu","family":"Xu","sequence":"first","affiliation":[]},{"given":"Gaoxiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Austin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Victor S.","family":"Sheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,31]]},"reference":[{"issue":"6","key":"22_CR1","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1080\/1369118X.2013.808362","volume":"17","author":"SA Adams","year":"2014","unstructured":"Adams, S.A.: Maintaining the collision of accounts: crowdsourcing sites in health care as brokers in the co-production of pharmaceutical knowledge. Inf. Commun. Soc. 17(6), 657\u2013669 (2014)","journal-title":"Inf. Commun. Soc."},{"doi-asserted-by":"publisher","unstructured":"Campello, R.J., Moulavi, D., Sander, J.: Density-based clustering based on hierarchical density estimates. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 160\u2013172. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-642-37456-2_14","key":"22_CR2","DOI":"10.1007\/978-3-642-37456-2_14"},{"doi-asserted-by":"crossref","unstructured":"Celis, L.E., Reddy, S.P., Singh, I.P., Vaya, S.: Assignment techniques for crowdsourcing sensitive tasks. In: Proceedings of the 19th ACM Conference on Computer-Supported Co-operative Work & Social Computing, pp. 836\u2013847 (2016)","key":"22_CR3","DOI":"10.1145\/2818048.2835202"},{"doi-asserted-by":"crossref","unstructured":"Chang, J.C., Amershi, S., Kamar, E.: Revolt: Collaborative crowdsourcing for labeling ma- chine learning datasets. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 2334\u20132346 (2017)","key":"22_CR4","DOI":"10.1145\/3025453.3026044"},{"issue":"2","key":"22_CR5","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s11390-018-1823-6","volume":"33","author":"PP Chen","year":"2018","unstructured":"Chen, P.P., Sun, H.L., Fang, Y.L., Huai, J.P.: Collusion-proof result inference in crowdsourc- ing. J. Comput. Sci. Technol. 33(2), 351\u2013365 (2018)","journal-title":"J. Comput. Sci. Technol."},{"doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, pp. 248\u2013255. IEEE (2009)","key":"22_CR6","DOI":"10.1109\/CVPR.2009.5206848"},{"unstructured":"Ester, M., Kriegel, H.P., Sander, J., Xu, X., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, vol. 96, pp. 226\u2013231 (1996)","key":"22_CR7"},{"doi-asserted-by":"publisher","unstructured":"Fang, Y., Sun, H., Li, G., Zhang, R., Huai, J.: Effective result inference for context-sensitive tasks in crowdsourcing.\u00a0In: Navathe, S., Wu, W., Shekhar, S., Du, X., Wang, X., Xiong, H. (eds.) Database Systems for Advanced Applications. DASFAA 2016. Lecture Notes in Computer Science, vol. 9642, pp. 33\u201348. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-32025-0_3","key":"22_CR8","DOI":"10.1007\/978-3-319-32025-0_3"},{"doi-asserted-by":"crossref","unstructured":"Gadiraju, U., Kawase, R., Dietze, S., Demartini, G.: Understanding malicious behavior in crowdsourcing platforms: the case of online surveys. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 1631\u20131640 (2015)","key":"22_CR9","DOI":"10.1145\/2702123.2702443"},{"issue":"6","key":"22_CR10","first-page":"1","volume":"14","author":"J Howe","year":"2006","unstructured":"Howe, J., et al.: The rise of crowdsourcing. Wired Mag. 14(6), 1\u20134 (2006)","journal-title":"Wired Mag."},{"doi-asserted-by":"crossref","unstructured":"KhudaBukhsh, A.R., Carbonell, J.G., Jansen, P.J.: Detecting non-adversarial collusion in crowdsourcing. In: Second AAAI Conference on Human Computation and Crowdsourcing (2014)","key":"22_CR11","DOI":"10.1609\/hcomp.v2i1.13157"},{"issue":"3","key":"22_CR12","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1002\/widm.30","volume":"1","author":"HP Kriegel","year":"2011","unstructured":"Kriegel, H.P., Kr\u00f6ger, P., Sander, J., Zimek, A.: Density-based clustering. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 1(3), 231\u2013240 (2011)","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"unstructured":"Lev, O., Polukarov, M., Bachrach, Y., Rosenschein, J.S.: Mergers and collusion in all-pay auctions and crowdsourcing contests. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems, pp. 675\u2013682 (2013)","key":"22_CR13"},{"doi-asserted-by":"crossref","unstructured":"Liu, X., Lu, M., Ooi, B.C., Shen, Y., Wu, S., Zhang, M.: Cdas: A crowdsourcing data analytics system. arXiv preprint arXiv:1207.0143 (2012)","key":"22_CR14","DOI":"10.14778\/2336664.2336676"},{"issue":"2","key":"22_CR15","doi-asserted-by":"publisher","first-page":"109","DOI":"10.14778\/2535568.2448944","volume":"6","author":"A Marcus","year":"2012","unstructured":"Marcus, A., Karger, D., Madden, S., Miller, R., Oh, S.: Counting with the crowd. Proceed. VLDB Endow. 6(2), 109\u2013120 (2012)","journal-title":"Proceed. VLDB Endow."},{"issue":"1","key":"22_CR16","first-page":"9","volume":"1","author":"M Niazi Torshiz","year":"2018","unstructured":"Niazi Torshiz, M., Amintoosi, H.: Collusion-resistant worker selection in social crowdsensing systems. Comput. Knowl. Eng. 1(1), 9\u201320 (2018)","journal-title":"Comput. Knowl. Eng."},{"doi-asserted-by":"crossref","unstructured":"Nouri, Z., Wachsmuth, H., Engels, G.: Mining crowdsourcing problems from discussion forums of workers. In: Proceedings of the 28th International Conference on Computational Linguistics, pp. 6264\u20136276 (2020)","key":"22_CR17","DOI":"10.18653\/v1\/2020.coling-main.551"},{"doi-asserted-by":"crossref","unstructured":"Sheng, V.S., Provost, F., Ipeirotis, P.G.: Get another label? improving data quality and data mining using multiple, noisy labelers. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 614\u2013622 (2008)","key":"22_CR18","DOI":"10.1145\/1401890.1401965"},{"issue":"190","key":"22_CR19","first-page":"1","volume":"22","author":"C Song","year":"2021","unstructured":"Song, C., Liu, K., Zhang, X.: Collusion detection and ground truth inference in crowdsourcing for labeling tasks. J. Mach. Learn. Res. 22(190), 1\u201345 (2021)","journal-title":"J. Mach. Learn. Res."},{"doi-asserted-by":"crossref","unstructured":"Sun, H., Dong, B., Zhang, B., Wang, W.H., Kantarcioglu, M.: Sensitive task assignments in crowdsourcing markets with colluding workers. In: 2018 IEEE 34th International Conference on Data Engineering (ICDE), pp. 377\u2013388. IEEE (2018)","key":"22_CR20","DOI":"10.1109\/ICDE.2018.00042"},{"issue":"5895","key":"22_CR21","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1126\/science.1160379","volume":"321","author":"L Von Ahn","year":"2008","unstructured":"Von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: recaptcha: human-based character recognition via web security measures. Science 321(5895), 1465\u20131468 (2008)","journal-title":"Science"},{"doi-asserted-by":"crossref","unstructured":"Wang, G., et al.: Serf and turf: crowdturfing for fun and profit. In: Proceedings of the 21st international conference on World Wide Web, pp. 679\u2013688 (2012)","key":"22_CR22","DOI":"10.1145\/2187836.2187928"},{"unstructured":"Xiang, Q., Nevat, I., Zhang, P., Zhang, J.: Collusion-resistant spatial phenomena crowdsourcing via mixture of gaussian processes regression. In: TRUST@ AAMAS, pp. 19\u201330 (2016)","key":"22_CR23"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-4752-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T23:09:35Z","timestamp":1690931375000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-4752-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819947515","9789819947522"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-4752-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhengzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2023a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2023\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}