{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:50:37Z","timestamp":1768524637742,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T00:00:00Z","timestamp":1678147200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T00:00:00Z","timestamp":1678147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2018YFB2100400"],"award-info":[{"award-number":["2018YFB2100400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100015401","name":"Key Research and Development Program of Shaanxi","doi-asserted-by":"crossref","award":["2019ZDLGY13-03-01"],"award-info":[{"award-number":["2019ZDLGY13-03-01"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100015401","name":"Key Research and Development Program of Shaanxi","doi-asserted-by":"crossref","award":["2021ZDLGY07-05"],"award-info":[{"award-number":["2021ZDLGY07-05"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Innovation Capability Support Program of Shaanxi","award":["2020CGXNG-002"],"award-info":[{"award-number":["2020CGXNG-002"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["JB210306"],"award-info":[{"award-number":["JB210306"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11036-023-02100-2","type":"journal-article","created":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T14:03:00Z","timestamp":1678197780000},"page":"1647-1657","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Task-based Personalized Privacy-Preserving Participant Selection Mechanism for Mobile Crowdsensing"],"prefix":"10.1007","volume":"28","author":[{"given":"Lele","family":"Zheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5739-8038","authenticated-orcid":false,"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Bowen","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Ze","family":"Tong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,7]]},"reference":[{"issue":"3","key":"2100_CR1","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MWC.2018.1700299","volume":"25","author":"C Zhao","year":"2018","unstructured":"Zhao C, Yang S, Yan P, Yang Q, Yang X, McCann J (2018) Data quality guarantee for credible caching device selection in mobile crowdsensing systems. IEEE Wirel Commun 25(3):58\u201364","journal-title":"IEEE Wirel Commun"},{"issue":"3","key":"2100_CR2","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1109\/TDSC.2018.2791432","volume":"17","author":"J Ni","year":"2018","unstructured":"Ni J, Zhang K, Yu Y, Lin X, Shen XS (2018) Providing task allocation and secure deduplication for mobile crowdsensing via fog computing. IEEE Trans Depend Secure Comput 17(3):581\u2013594","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"2","key":"2100_CR3","doi-asserted-by":"publisher","first-page":"922","DOI":"10.1109\/TII.2019.2957130","volume":"17","author":"J Xiong","year":"2019","unstructured":"Xiong J, Zhao M, Bhuiyan MZA, Chen L, Tian Y (2019) An ai-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of iot. IEEE Trans Industr Inf 17(2):922\u2013933","journal-title":"IEEE Trans Industr Inf"},{"issue":"6","key":"2100_CR4","doi-asserted-by":"publisher","first-page":"4231","DOI":"10.1109\/TII.2019.2948068","volume":"16","author":"J Xiong","year":"2019","unstructured":"Xiong J, Ma R, Chen L, Tian Y, Li Q, Liu X, Yao Z (2019) A personalized privacy protection framework for mobile crowdsensing in iiot. IEEE Trans Industr Inf 16(6):4231\u20134241","journal-title":"IEEE Trans Industr Inf"},{"key":"2100_CR5","doi-asserted-by":"publisher","unstructured":"Hu Y, Dai G, Fan J, Wu Y, Zhang H (2016) Blueaer: A fine-grained urban pm2.5 3d monitoring system using mobile sensing. In: IEEE Conference on Computer Communications (IEEE INFOCOM), pp 1\u20139. https:\/\/doi.org\/10.1109\/INFOCOM.2016.7524479","DOI":"10.1109\/INFOCOM.2016.7524479"},{"issue":"3","key":"2100_CR6","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1109\/TMM.2019.2891417","volume":"21","author":"T Cheng","year":"2019","unstructured":"Cheng T, Liu G, Yang Q, Sun J (2019) Trust assessment in vehicular social network based on three-valued subjective logic. IEEE Trans Multimed 21(3):652\u2013663","journal-title":"IEEE Trans Multimed"},{"issue":"2","key":"2100_CR7","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/JIOT.2018.2842773","volume":"6","author":"J Xiong","year":"2018","unstructured":"Xiong J, Ren J, Chen L, Yao Z, Lin M, Wu D, Niu B (2018) Enhancing privacy and availability for data clustering in intelligent electrical service of iot. IEEE Internet Things J 6(2):1530\u20131540","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"2100_CR8","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1007\/s11277-020-07131-6","volume":"112","author":"TTN Le","year":"2020","unstructured":"Le TTN, Phuong TVX (2020) Privacy preserving jaccard similarity by cloud-assisted for classification. Wirel Pers Commun 112(3):1875\u20131892","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"2100_CR9","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/TNSE.2019.2940958","volume":"7","author":"J Xiong","year":"2019","unstructured":"Xiong J, Chen X, Yang Q, Chen L, Yao Z (2019) A task-oriented user selection incentive mechanism in edge-aided mobile crowdsensing. IEEE Trans Netw Sci Eng 7(4):2347\u20132360","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2100_CR10","doi-asserted-by":"publisher","unstructured":"Wang Z, Li J, Hu J, Ren J, Li Z, Li Y (2019) Towards privacy-preserving incentive for mobile crowdsensing under an untrusted platform. In: IEEE Conference on Computer Communicationsv. IEEE INFOCOM, pp\u00a02053\u20132061. https:\/\/doi.org\/10.1109\/INFOCOM.2019.8737594","DOI":"10.1109\/INFOCOM.2019.8737594"},{"issue":"9","key":"2100_CR11","doi-asserted-by":"publisher","first-page":"3250","DOI":"10.1109\/TMC.2021.3050147","volume":"21","author":"L Li","year":"2021","unstructured":"Li L, Shi D, Zhang X, Hou R, Yue H, Li H, Pan M (2021) Privacy preserving participant recruitment for coverage maximization in location aware mobile crowdsensing. IEEE Trans Mob Comput 21(9):3250\u20133262. https:\/\/doi.org\/10.1109\/TMC.2021.3050147","journal-title":"IEEE Trans Mob Comput"},{"issue":"7","key":"2100_CR12","doi-asserted-by":"publisher","first-page":"5511","DOI":"10.1109\/JIOT.2021.3111088","volume":"9","author":"T Zhang","year":"2022","unstructured":"Zhang T, Song A, Dong X, Shen Y, Ma J (2022) Privacy-preserving asynchronous grouped federated learning for iot. IEEE Internet Things J 9(7):5511\u20135523","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"2100_CR13","doi-asserted-by":"publisher","first-page":"3437","DOI":"10.1109\/TII.2021.3109090","volume":"18","author":"Q Li","year":"2022","unstructured":"Li Q, Xia B, Huang H, Zhang Y, Zhang T (2022) TRAC: traceable and revocable access control scheme for mhealth in 5g-enabled iiot. IEEE Trans Ind Informatics 18(5):3437\u20133448","journal-title":"IEEE Trans Ind Informatics"},{"issue":"6","key":"2100_CR14","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TMC.2018.2861393","volume":"18","author":"Z Wang","year":"2018","unstructured":"Wang Z, Hu J, Lv R, Wei J, Wang Q, Yang D, Qi H (2018) Personalized privacy-preserving task allocation for mobile crowdsensing. IEEE Trans Mob Comput 18(6):1330\u20131341","journal-title":"IEEE Trans Mob Comput"},{"key":"2100_CR15","doi-asserted-by":"publisher","unstructured":"Sun J, Ma H (2014) A behavior-based incentive mechanism for crowd sensing with budget constraints. In: 2014 IEEE International Conference on Communications (ICC). IEEE, pp 1314\u20131319. https:\/\/doi.org\/10.1109\/ICC.2014.6883503","DOI":"10.1109\/ICC.2014.6883503"},{"key":"2100_CR16","doi-asserted-by":"crossref","unstructured":"Feng Z, Zhu Y, Zhang Q, Ni LM, Vasilakos AV (2014) Trac: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In: IEEE INFOCOM 2014 IEEE conference on computer communications. IEEE, pp 1231\u20131239","DOI":"10.1109\/INFOCOM.2014.6848055"},{"issue":"2","key":"2100_CR17","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TMC.2016.2546900","volume":"16","author":"Y Li","year":"2016","unstructured":"Li Y, Gao J, Lee PP, Su L, He C, He C, Yang F, Fan W (2016) A weighted crowdsourcing approach for network quality measurement in cellular data networks. IEEE Trans Mob Comput 16(2):300\u2013313","journal-title":"IEEE Trans Mob Comput"},{"key":"2100_CR18","doi-asserted-by":"publisher","unstructured":"Zhang T, Han Y, Dong X, Xu Y, Shen Y (2021) Dual-target cross domain bundle recommendation. In: 2021 IEEE International Conference on Services Computing (SCC). IEEE, pp 183\u2013192. https:\/\/doi.org\/10.1109\/SCC53864.2021.00031","DOI":"10.1109\/SCC53864.2021.00031"},{"key":"2100_CR19","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","volume":"5","author":"R Lu","year":"2017","unstructured":"Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy preserving data aggregation scheme for fog computing-enhanced iot. IEEE Access 5:3302\u20133312","journal-title":"IEEE Access"},{"key":"2100_CR20","doi-asserted-by":"publisher","first-page":"111889","DOI":"10.1109\/ACCESS.2020.3003373","volume":"8","author":"J Zhang","year":"2020","unstructured":"Zhang J, Hu S, Jiang ZL (2020) Privacy-preserving similarity computation in cloud-based mobile social networks. IEEE Access 8:111889\u2013111898","journal-title":"IEEE Access"},{"key":"2100_CR21","doi-asserted-by":"crossref","unstructured":"Zheng L, Zhang T, Qin R, Shen Y, Mu X (2021) Privacy-preserving subset aggregation with local differential privacy in fog-based iot. In: International conference on mobile multimedia communications. Springer, pp 399\u2013412","DOI":"10.1007\/978-3-030-89814-4_29"},{"issue":"11","key":"2100_CR22","doi-asserted-by":"publisher","first-page":"5140","DOI":"10.1109\/TKDE.2021.3054409","volume":"34","author":"J Tang","year":"2021","unstructured":"Tang J, Fu S, Liu X, Luo Y, Xu M (2021) Achieving privacy-preserving and lightweight truth discovery in mobile crowdsensing. IEEE Trans Knowl Data Eng 34(11):5140\u20135153. https:\/\/doi.org\/10.1109\/TKDE.2021.3054409","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2100_CR23","doi-asserted-by":"publisher","unstructured":"Miao C, Jiang W, Su L, Li Y, Guo S, Qin Z, Xiao H, Gao J, Ren K (2015) Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. In: Proceedings of the 13th ACM conference on embedded networked sensor systems (SenSys). pp 183\u2013196. https:\/\/doi.org\/10.1145\/2809695.2809719","DOI":"10.1145\/2809695.2809719"},{"key":"2100_CR24","doi-asserted-by":"publisher","unstructured":"Li Y, Xiao H, Qin Z, Miao C, Su L, Gao J, Ren K, Ding B (2020) Towards differentially private truth discovery for crowd sensing systems. In: 2020 IEEE 40th international conference on distributed computing systems (ICDCS). IEEE, pp 1156\u20131166. https:\/\/doi.org\/10.1109\/ICDCS47774.2020.00037","DOI":"10.1109\/ICDCS47774.2020.00037"},{"key":"2100_CR25","doi-asserted-by":"publisher","unstructured":"Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Theory of cryptography conference. Springer, pp 265\u2013284. https:\/\/doi.org\/10.1007\/11681878_14","DOI":"10.1007\/11681878_14"},{"key":"2100_CR26","unstructured":"Riazi MS, Chen B, Shrivastava A, Wallach DS, Koushanfar F (2019) Sub-linear privacy-preserving near-neighbor search. IACR Cryptol. ePrint Arch 1222. https:\/\/eprint.iacr.org\/2019\/1222"},{"key":"2100_CR27","doi-asserted-by":"publisher","first-page":"184438","DOI":"10.1109\/ACCESS.2019.2961270","volume":"7","author":"H Mahdikhani","year":"2019","unstructured":"Mahdikhani H, Mahdavifar S, Lu R, Zhu H, Ghorbani AA (2019) Achieving privacy-preserving subset aggregation in fog-enhanced iot. IEEE Access 7:184438\u2013184447","journal-title":"IEEE Access"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02100-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-023-02100-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02100-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T11:15:08Z","timestamp":1725275708000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-023-02100-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,7]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["2100"],"URL":"https:\/\/doi.org\/10.1007\/s11036-023-02100-2","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,7]]},"assertion":[{"value":"20 September 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This paper concerns an expansion of previous work []. Building on previous work, we explore a task-based personalized privacy-preserving participant selection mechanism for mobile crowdsensing, which can securely select participating users based on the attribute vector of the task while providing personalized privacy protection for users. There are numerous major additions to this work as compared to the preliminary version: 1)During the aggregation process, we completely address the unique privacy protection requirements of distinct users and demonstrate the efficacy of our solution. 2) We run simulations to evaluate and compare our suggested solution to existing ones.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"There are no conflicts of interest declared by the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}]}}