{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:05:54Z","timestamp":1775912754962,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T00:00:00Z","timestamp":1585094400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T00:00:00Z","timestamp":1585094400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Independent Exploration and Innovation Project for Graduate Students of Central South University","award":["2019zzts589"],"award-info":[{"award-number":["2019zzts589"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["6177255461602398,61672447"],"award-info":[{"award-number":["6177255461602398,61672447"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hunan Provincial National Natural Science Foundation of China","award":["2017JJ3316, 2019JJ50592"],"award-info":[{"award-number":["2017JJ3316, 2019JJ50592"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s12083-020-00898-2","type":"journal-article","created":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T04:48:08Z","timestamp":1585111688000},"page":"2300-2323","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":60,"title":["A trust-based minimum cost and quality aware data collection scheme in P2P network"],"prefix":"10.1007","volume":"13","author":[{"given":"Yingying","family":"Ren","sequence":"first","affiliation":[]},{"given":"Zhiwen","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shaobo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Guoming","family":"Zhi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,25]]},"reference":[{"issue":"7","key":"898_CR1","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645\u20131660","journal-title":"Futur Gener Comput Syst"},{"key":"898_CR2","doi-asserted-by":"crossref","unstructured":"Saad S, Traore I, Ghorbani A, Sayed B, Zhao D, Lu W, ... & Hakimian, P (2011) Detecting P2P botnets through network behavior analysis and machine learning. In 2011 Ninth annual international conference on privacy, security and trust IEEE:174\u2013180","DOI":"10.1109\/PST.2011.5971980"},{"key":"898_CR3","doi-asserted-by":"crossref","unstructured":"Liu Y, Ma M, Liu X, Xiong N, Liu A, Zhu Y (2020) Design and Analysis of Probing Route to Defense Sink-hole Attacks for Internet of Things Security. IEEE Trans Netw Sci Eng 7(1):356\u2013372","DOI":"10.1109\/TNSE.2018.2881152"},{"key":"898_CR4","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.future.2018.11.039","volume":"94","author":"H Teng","year":"2019","unstructured":"Teng H, Liu Y, Liu A, Xiong NN, Cai Z, Wang T, Liu X (2019) A novel code data dissemination scheme for internet of things through mobile vehicle of smart cities. Futur Gener Comput Syst 94:351\u2013367","journal-title":"Futur Gener Comput Syst"},{"key":"898_CR5","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.ins.2018.12.028","volume":"480","author":"Y Liu","year":"2019","unstructured":"Liu Y, Liu A, Liu X, Huang X (2019) A statistical approach to participant selection in location-based social networks for offline event marketing. Inf Sci 480:90\u2013108","journal-title":"Inf Sci"},{"issue":"10","key":"898_CR6","doi-asserted-by":"crossref","first-page":"3846","DOI":"10.1109\/JSEN.2013.2263379","volume":"13","author":"SDT Kelly","year":"2013","unstructured":"Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sensors J 13(10):3846\u20133853","journal-title":"IEEE Sensors J"},{"issue":"3","key":"898_CR7","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1007\/s12083-015-0386-3","volume":"9","author":"K Chung","year":"2016","unstructured":"Chung K, Park RC (2016) P2P cloud network services for IoT based disaster situations information. Peer-to-Peer Networking and Applications 9(3):566\u2013577","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"898_CR8","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.bjp.2013.12.020","volume":"61","author":"L Sanchez","year":"2014","unstructured":"Sanchez L, Mu\u00f1oz L, Galache JA, Sotres P, Santana JR, Gutierrez V et al (2014) SmartSantander: IoT experimentation over a smart city testbed. Comput Netw 61:217\u2013238","journal-title":"Comput Netw"},{"issue":"2","key":"898_CR9","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MCOM.2017.1600435CM","volume":"55","author":"P Schulz","year":"2017","unstructured":"Schulz P, Matthe M, Klessig H, Simsek M, Fettweis G, Ansari J et al (2017) Latency critical IoT applications in 5G: perspective on the design of radio interface and network architecture. IEEE Commun Mag 55(2):70\u201378","journal-title":"IEEE Commun Mag"},{"issue":"6","key":"898_CR10","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/MNET.2018.1700374","volume":"32","author":"H Ren","year":"2018","unstructured":"Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: challenges, solutions and opportunities. IEEE Netw 32(6):144\u2013151","journal-title":"IEEE Netw"},{"key":"898_CR11","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.inffus.2019.06.020","volume":"53","author":"X Liu","year":"2020","unstructured":"Liu X, Zhao M, Liu A, Wong KKL (2020) Adjusting forwarder nodes and duty cycle using packet aggregation routing for body sensor networks. Information Fusion 53:183\u2013195","journal-title":"Information Fusion"},{"key":"898_CR12","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.comcom.2019.12.054","volume":"151","author":"M Chen","year":"2019","unstructured":"Chen M, Wang T, Ota K, Dong M, Zhao M, Liu A (2019) Intelligent resource allocation Management for Vehicles Network: an A3C learning approach. Comput Commun 151:485\u2013494","journal-title":"Comput Commun"},{"key":"898_CR13","doi-asserted-by":"publisher","unstructured":"Wang J, Wang F, Wang Y, Wang L, Qiu Z, Zhang D et al (2019) HyTasker: hybrid task allocation in Mobile crowd sensing. IEEE Trans Mob Comput. https:\/\/doi.org\/10.1109\/TMC.2019.2898950","DOI":"10.1109\/TMC.2019.2898950"},{"key":"898_CR14","doi-asserted-by":"publisher","unstructured":"Zhang G, Wang T, Wang G, Liu A, Jia W (2018) Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Practice and Experience, Concurrency and Computation. https:\/\/doi.org\/10.1002\/cpe.5109","DOI":"10.1002\/cpe.5109"},{"issue":"8","key":"898_CR15","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1109\/JPROC.2019.2920341","volume":"107","author":"F Liu","year":"2019","unstructured":"Liu F, Tang G, Li Y, Cai Z, Zhang X, Zhou T (2019) A survey on edge computing systems and tools. Proc IEEE 107(8):1537\u20131562","journal-title":"Proc IEEE"},{"issue":"31","key":"898_CR16","doi-asserted-by":"crossref","first-page":"15407","DOI":"10.1073\/pnas.1801378116","volume":"116","author":"M Wu","year":"2019","unstructured":"Wu M, He S, Zhang Y, Chen J, Sun Y, Liu Y, Zhang J, Poor V (2019) A tensor-based framework for studying eigenvector multicentrality in multilayer networks. Proceedings of the National Academy of Sciences of the United States of America (PNAS) 116(31):15407\u201315413","journal-title":"Proceedings of the National Academy of Sciences of the United States of America (PNAS)"},{"key":"898_CR17","doi-asserted-by":"publisher","unstructured":"Hao M., Li H., Luo X., Xu G., Yang H., & Liu S. (2019). Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Transactions on Industrial Informatics DOI: https:\/\/doi.org\/10.1109\/TII.2019.2945367","DOI":"10.1109\/TII.2019.2945367"},{"key":"898_CR18","doi-asserted-by":"crossref","first-page":"19238","DOI":"10.1109\/ACCESS.2019.2897062","volume":"7","author":"Y Ren","year":"2019","unstructured":"Ren Y, Liu W, Wang T, Li X, Xiong N, Liu A (2019) A collaboration platform for effective task and data reporter selection in crowdsourcing network. IEEE Access 7:19238\u201319257","journal-title":"IEEE Access"},{"key":"898_CR19","doi-asserted-by":"publisher","unstructured":"Liu Q, Tian Y, Wu J, Peng T, Wang G (2019) Enabling verifiable and dynamic ranked search over outsourced data. IEEE Trans Serv Comput. https:\/\/doi.org\/10.1109\/TSC.2019.2922177","DOI":"10.1109\/TSC.2019.2922177"},{"issue":"2","key":"898_CR20","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1109\/JIOT.2019.2894257","volume":"6","author":"X Liu","year":"2019","unstructured":"Liu X, Liu Y, Zhang N, Wu W, Liu A (2019) Optimizing trajectory of unmanned aerial vehicles for efficient data acquisition: A matrix completion approach. IEEE Internet Things J 6(2):1829\u20131840","journal-title":"IEEE Internet Things J"},{"key":"898_CR21","first-page":"562","volume-title":"Mobile application for noise pollution monitoring through gamification techniques","author":"IG Mart\u00ed","year":"2012","unstructured":"Mart\u00ed IG, Rodr\u00edguez LE, Benedito M, Trilles S, Beltr\u00e1n A, D\u00edaz L, Huerta J (2012) Mobile application for noise pollution monitoring through gamification techniques. In International Conference on Entertainment Computing Springer, Berlin, Heidelberg, pp 562\u2013571"},{"issue":"1","key":"898_CR22","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MWC.2018.1700193","volume":"25","author":"N Zhang","year":"2018","unstructured":"Zhang N, Yang P, Ren J, Chen D, Yu L, Shen X (2018) Synergy of big data and 5g wireless networks: opportunities, approaches, and challenges. IEEE Wirel Commun 25(1):12\u201318","journal-title":"IEEE Wirel Commun"},{"key":"898_CR23","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jnca.2019.01.022","volume":"131","author":"Y Liu","year":"2019","unstructured":"Liu Y, Liu A, Zhang N, Liu X, Ma M, Hu Y (2019) DDC: dynamic duty cycle for improving delay and energy efficiency in wireless sensor networks. J Netw Comput Appl 131:16\u201327","journal-title":"J Netw Comput Appl"},{"key":"898_CR24","doi-asserted-by":"crossref","unstructured":"Thiagarajan A, Ravindranath L, LaCurts K, Madden S, Balakrishnan H, Toledo S, Eriksson J (2009) VTrack: accurate, energy-aware road traffic delay estimation using mobile phones. In proceedings of the 7th ACM conference on embedded networked sensor systems: 85-98.","DOI":"10.1145\/1644038.1644048"},{"key":"898_CR25","doi-asserted-by":"crossref","unstructured":"Yu H, Shen Z, Miao C, An B (2012) Challenges and opportunities for trust management in crowdsourcing. In proceedings of the the 2012 IEEE\/WIC\/ACM international joint conferences on web intelligence and intelligent agent technology IEEE computer society, 02: 486-493.","DOI":"10.1109\/WI-IAT.2012.104"},{"key":"898_CR26","unstructured":"Hu L., Liu A., Xie M., & Wang T. (2019). UAVs joint vehicles as data mules for fast codes dissemination for edge networking in smart city. Peer-to-Peer Networking and Applications:1\u201325"},{"issue":"10","key":"898_CR27","doi-asserted-by":"crossref","first-page":"1946","DOI":"10.1109\/TSMC.2019.2898982","volume":"49","author":"Y Liu","year":"2019","unstructured":"Liu Y, Liu A, Xiong NN, Wang T, Gui W (2019) Content propagation for content-centric networking systems from location-based social networks. IEEE Transactions on Systems, Man, and Cybernetics: Systems 49(10):1946\u20131960","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"898_CR28","doi-asserted-by":"publisher","unstructured":"Li H, Yang Y, Dai Y, Yu S, Xiang Y (2017) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Transactions on Cloud Computing. https:\/\/doi.org\/10.1109\/TCC.2017.2769645","DOI":"10.1109\/TCC.2017.2769645"},{"issue":"6","key":"898_CR29","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/JIOT.2015.2441031","volume":"2","author":"X Zhang","year":"2015","unstructured":"Zhang X, Xue G, Yu R, Yang D, Tang J (2015) Keep your promise: mechanism design against free-riding and false-reporting in crowdsourcing. IEEE Internet Things J 2(6):562\u2013572","journal-title":"IEEE Internet Things J"},{"key":"898_CR30","doi-asserted-by":"crossref","unstructured":"Zhang Y, Van der Schaar M (2012) Reputation-based incentive protocols in crowdsourcing applications. In 2012 proceedings IEEE INFOCOM: 2140-2148.","DOI":"10.1109\/INFCOM.2012.6195597"},{"issue":"4","key":"898_CR31","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/TIFS.2018.2868162","volume":"14","author":"G Xu","year":"2019","unstructured":"Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Transactions on Information Forensics and Security 14(4):870\u2013885","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"898_CR32","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.jpdc.2019.06.012","volume":"133","author":"Q Liu","year":"2019","unstructured":"Liu Q, Hou P, Wang G, Peng T, Zhang S (2019) Intelligent route planning on large road networks with efficiency and privacy. Journal of Parallel and Distributed Computing 133:93\u2013106","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"898_CR33","doi-asserted-by":"publisher","unstructured":"Tan J, Liu W, Wang T, Zhao M, Liu A, Zhang S (2020) A high-accurate content popularity prediction computational modelling for Mobile edge computing by using matrix completion technology. Trans Emerg Telecommun Technol. https:\/\/doi.org\/10.1002\/ett.3871","DOI":"10.1002\/ett.3871"},{"issue":"12","key":"898_CR34","doi-asserted-by":"crossref","first-page":"6593","DOI":"10.1109\/TII.2019.2931394","volume":"15","author":"Y Liu","year":"2019","unstructured":"Liu Y, Liu A, Liu X, Ma M (2019) A trust-based active detection for cyber-physical security in industrial environments. IEEE Transactions on Industrial Informatics 15(12):6593\u20136603","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"898_CR35","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1007\/s12083-015-0386-3","volume":"9","author":"K Chung","year":"2016","unstructured":"Chung K, Park RC (2016) P2P cloud network services for IoT based disaster situations information. Peer-to-Peer Networking and Applications 9(3):566\u2013577","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"1","key":"898_CR36","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","volume":"15","author":"G Xu","year":"2020","unstructured":"Xu G, Li H, Liu S, Yang K, Lin X (2020) VerifyNet: secure and verifiable federated learning. IEEE Transactions on Information Forensics and Security 15(1):911\u2013926","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"898_CR37","doi-asserted-by":"publisher","unstructured":"Huang M, Liu W, Wang T, Liu A, Zhang S (2019) A cloud-MEC collaborative task offloading scheme with service orchestration. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2019.2952767","DOI":"10.1109\/JIOT.2019.2952767"},{"issue":"3","key":"898_CR38","doi-asserted-by":"crossref","first-page":"800","DOI":"10.3758\/s13428-011-0081-0","volume":"43","author":"TS Behrend","year":"2011","unstructured":"Behrend TS, Sharek DJ, Meade AW, Wiebe EN (2011) The viability of crowdsourcing for survey research. Behav Res Methods 43(3):800","journal-title":"Behav Res Methods"},{"issue":"8","key":"898_CR39","doi-asserted-by":"crossref","first-page":"4265","DOI":"10.1109\/TWC.2015.2418316","volume":"14","author":"N Zhang","year":"2015","unstructured":"Zhang N, Cheng N, Lu N, Zhang X, Mark JW, Shen XS (2015) Partner selection and incentive mechanism for physical layer security. IEEE Trans Wirel Commun 14(8):4265\u20134276","journal-title":"IEEE Trans Wirel Commun"},{"key":"898_CR40","doi-asserted-by":"crossref","unstructured":"Xu G, Li H, Liu S, Yang K, Lin X (2019) VerifyNet: secure and verifiable federated learning. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"898_CR41","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.ins.2019.05.055","volume":"498","author":"Y Zheng","year":"2019","unstructured":"Zheng Y, Lu R, Li B, Shao J, Yang H, Choo KKR (2019) Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Inf Sci 498:91\u2013105","journal-title":"Inf Sci"},{"key":"898_CR42","doi-asserted-by":"crossref","unstructured":"Nabil M, Sherif A, Mahmoud M, Alsharif A, Abdallah M (2019) Efficient and privacy-preserving ridesharing Organization for Transferable and non-transferable services. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2019.2920647"},{"key":"898_CR43","doi-asserted-by":"publisher","unstructured":"Wang T, Cao Z, Wang S, Wang J, Qi l.; Liu A.; Xie M.; Li X. (2019) Privacy-enhanced data collection based on deep learning for internet of vehicles. IEEE Transactions on Industrial Informatics. https:\/\/doi.org\/10.1109\/TII.2019.2962844","DOI":"10.1109\/TII.2019.2962844"},{"issue":"7","key":"898_CR44","doi-asserted-by":"crossref","first-page":"3069","DOI":"10.1109\/TVT.2013.2251374","volume":"62","author":"KA Hafeez","year":"2013","unstructured":"Hafeez KA, Zhao L, Ma B, Mark JW (2013) Performance analysis and enhancement of the DSRC for VANET's safety application. IEEE Tran on Vehicular Technology 62(7):3069\u20133083","journal-title":"IEEE Tran on Vehicular Technology"},{"issue":"1","key":"898_CR45","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TETC.2015.2511457","volume":"6","author":"H Li","year":"2018","unstructured":"Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in Mobile clouds. IEEE Trans Emerg Top Comput 6(1):97\u2013109","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"898_CR46","doi-asserted-by":"publisher","unstructured":"Wang T, Wang P, Cai S, Ma Y, Liu A, Xie M (2019) A unified trustworthy environment based on edge computing in industrial IoT. IEEE Transactions on Industrial Informatics. https:\/\/doi.org\/10.1109\/TII.2019.2955152","DOI":"10.1109\/TII.2019.2955152"},{"key":"898_CR47","doi-asserted-by":"crossref","unstructured":"Lin J, Amini S, Hong JI, Sadeh N, Lindqvist J, Zhang J (2012) Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In proceedings of the 2012 ACM conference on ubiquitous computing: 501-510.","DOI":"10.1145\/2370216.2370290"},{"key":"898_CR48","doi-asserted-by":"crossref","unstructured":"Agarwal Y, Hall M (2013) ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In proceeding of the 11th annual international conference on Mobile systems, applications, and services ACM: 97-110.","DOI":"10.1145\/2462456.2464460"},{"issue":"1","key":"898_CR49","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s00779-012-0632-0","volume":"18","author":"E Toch","year":"2014","unstructured":"Toch E (2014) Crowdsourcing privacy preferences in context-aware applications. Pers Ubiquit Comput 18(1):129\u2013141","journal-title":"Pers Ubiquit Comput"},{"issue":"10","key":"898_CR50","doi-asserted-by":"crossref","first-page":"919","DOI":"10.14778\/2732951.2732966","volume":"7","author":"G Ghinita","year":"2014","unstructured":"To H, Ghinita G, Shahabi C (2014) A framework for protecting worker location privacy in spatial crowdsourcing. Proceedings of the VLDB Endowment 7(10):919\u2013930","journal-title":"Proceedings of the VLDB Endowment"},{"key":"898_CR51","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.comnet.2016.03.016","volume":"102","author":"Y Wang","year":"2016","unstructured":"Wang Y, Cai Z, Yin G, Gao Y, Tong X, Wu G (2016) An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput Netw 102:157\u2013171","journal-title":"Comput Netw"},{"key":"898_CR52","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.future.2019.01.026","volume":"96","author":"W Jiang","year":"2019","unstructured":"Jiang W, Li H, Xu G, Wen M, Dong G, Lin X (2019) PTAS: privacy-preserving thin-client authentication scheme in blockchain-based PKI. Futur Gener Comput Syst 96:185\u2013195","journal-title":"Futur Gener Comput Syst"},{"key":"898_CR53","doi-asserted-by":"publisher","unstructured":"Liu X, Wang T, Jia W, Liu A, Chi K (2019) Quick convex hull-based rendezvous planning for delay-harsh mobile data gathering in disjoint sensor networks. IEEE Transactions on System, Man, and Cybernetics: Systems, DoI. https:\/\/doi.org\/10.1109\/TSMC.2019.2938790","DOI":"10.1109\/TSMC.2019.2938790"},{"issue":"5","key":"898_CR54","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MNET.2017.1700030","volume":"31","author":"J Ren","year":"2017","unstructured":"Ren J, Guo H, Xu C, Zhang Y (2017) Serving at the edge: A scalable IoT architecture based on transparent computing. IEEE Netw 31(5):96\u2013105","journal-title":"IEEE Netw"},{"key":"898_CR55","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.comcom.2020.01.034","volume":"152","author":"T Li","year":"2020","unstructured":"Li T, Zhao M, Won K (2020) Machine learning based code dissemination by selection of reliability Mobile vehicles in 5G networks. Comput Commun 152:109\u2013118","journal-title":"Comput Commun"},{"key":"898_CR56","doi-asserted-by":"crossref","unstructured":"Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. In proceedings of the 2014 IEEE\/ACM international conference on computer-aided design IEEE press: 417-423.","DOI":"10.1109\/ICCAD.2014.7001385"},{"key":"898_CR57","unstructured":"Venanzi M, Rogers A, Jennings NR (2013) Trust-based fusion of untrustworthy information in crowdsourcing applications. In proceedings of the 2013 international conference on autonomous agents and multi-agent systems: 829-836."},{"issue":"11","key":"898_CR58","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/MCOM.001.1900091","volume":"57","author":"G Xu","year":"2019","unstructured":"Xu G, Li H, Ren H, Yang K, Deng RH (2019) Data security issues in deep learning: attacks, countermeasures and opportunities. IEEE Commun Mag 57(11):116\u2013122","journal-title":"IEEE Commun Mag"},{"key":"898_CR59","first-page":"1","volume":"2020","author":"M Peng","year":"2020","unstructured":"Peng M, Liu W, Wang T, Zeng Z (2020) Relay selection joint consecutive packet routing scheme to improve performance for wake-up radio-enabled WSNs. Wirel Commun Mob Comput 2020:1\u201332","journal-title":"Wirel Commun Mob Comput"},{"key":"898_CR60","doi-asserted-by":"publisher","unstructured":"Liu Y, Zeng Z, Liu X, Zhu X, Bhuiyan M (2019) A novel load balancing and low response delay framework for edge-cloud network based on SDN. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2019.2951857","DOI":"10.1109\/JIOT.2019.2951857"},{"key":"898_CR61","doi-asserted-by":"crossref","unstructured":"Ye B, Wang Y, Liu L (2015) Crowd trust: A context-aware trust model for worker selection in crowdsourcing environments. In 2015 IEEE international conference on web services : 121-128.","DOI":"10.1109\/ICWS.2015.26"},{"issue":"3","key":"898_CR62","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1109\/JSAC.2017.2672379","volume":"35","author":"X Gan","year":"2017","unstructured":"Gan X, Li Y, Wang W, Fu L, Wang X (2017) Social crowdsourcing to friends: An incentive mechanism for multi-resource sharing. IEEE Journal on Selected Areas in Communications 35(3):795\u2013808","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"898_CR63","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","volume":"15","author":"G Xu","year":"2020","unstructured":"Xu G, Li H, Liu S, Yang K, Lin X (2020) VerifyNet: secure and verifiable federated learning. IEEE Transactions on Information Forensics and Security 15(1):911\u2013926","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"898_CR64","doi-asserted-by":"crossref","first-page":"1364","DOI":"10.1109\/JIOT.2016.2600634","volume":"3","author":"X Zhu","year":"2016","unstructured":"Zhu X, An J, Yang M, Xiang L, Yang Q, Gui X (2016) A fair incentive mechanism for crowdsourcing in crowd sensing. IEEE Internet Things J 3(6):1364\u20131372","journal-title":"IEEE Internet Things J"},{"key":"898_CR65","doi-asserted-by":"crossref","unstructured":"Zhang Y, Van der Schaar M (2012) Reputation-based incentive protocols in crowdsourcing applications. In 2012 proceedings IEEE INFOCOM: 2140-2148.","DOI":"10.1109\/INFCOM.2012.6195597"},{"issue":"2","key":"898_CR66","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1109\/TNET.2014.2379281","volume":"24","author":"D Zhao","year":"2016","unstructured":"Zhao D, Li XY, Ma H (2016) Budget-feasible online incentive mechanisms for crowdsourcing tasks truthfully. IEEE\/ACM Transactions on Networking (TON) 24(2):647\u2013661","journal-title":"IEEE\/ACM Transactions on Networking (TON)"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00898-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-020-00898-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00898-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T00:12:08Z","timestamp":1616631128000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-020-00898-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,25]]},"references-count":66,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["898"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-00898-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,25]]},"assertion":[{"value":"27 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}