{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T12:21:35Z","timestamp":1777378895081,"version":"3.51.4"},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Array"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.array.2026.100761","type":"journal-article","created":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T17:10:23Z","timestamp":1775495423000},"page":"100761","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Reliable, trustworthy sensor data collection for event detection in Cyber-Physical Systems using Genetic Algorithm and Differential Privacy"],"prefix":"10.1016","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9317-6296","authenticated-orcid":false,"given":"Muhammad","family":"Ejazulghaffar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7449-2701","authenticated-orcid":false,"given":"Muhammad","family":"Arif","sequence":"additional","affiliation":[]},{"given":"Arfan","family":"Jaffar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.array.2026.100761_b1","first-page":"239","article-title":"Objective-variable tour planning for mobile data collection in partitioned sensor networks","volume":"21","author":"Liu","year":"2020","journal-title":"IEEE Trans Mob Comput"},{"issue":"3","key":"10.1016\/j.array.2026.100761_b2","doi-asserted-by":"crossref","first-page":"757","DOI":"10.3390\/sym15030757","article-title":"Green IoT: A review and future research directions","volume":"15","author":"Alsharif","year":"2023","journal-title":"Symmetry"},{"key":"10.1016\/j.array.2026.100761_b3","doi-asserted-by":"crossref","first-page":"85454","DOI":"10.1109\/ACCESS.2020.2991067","article-title":"A multidirectional LSTM model for predicting the stability of a smart grid","volume":"8","author":"Alazab","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.array.2026.100761_b4","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.ins.2019.05.054","article-title":"A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services","volume":"527","author":"Zhang","year":"2020","journal-title":"Inform Sci"},{"key":"10.1016\/j.array.2026.100761_b5","series-title":"Smart city and informatization: 7th international conference, ISCI 2019, guangzhou, China, November 12\u201315, 2019, proceedings 7","first-page":"152","article-title":"Trustworthy data collection for cyber systems: a taxonomy and future directions","author":"Rahman","year":"2019"},{"issue":"5","key":"10.1016\/j.array.2026.100761_b6","doi-asserted-by":"crossref","first-page":"3311","DOI":"10.1109\/TII.2019.2950192","article-title":"TrustData: Trustworthy and secured data collection for event detection in industrial cyber-physical system","volume":"16","author":"Tao","year":"2019","journal-title":"IEEE Trans Ind Inform"},{"issue":"3","key":"10.1016\/j.array.2026.100761_b7","doi-asserted-by":"crossref","first-page":"1797","DOI":"10.1109\/TITS.2020.2997377","article-title":"Mobility based trust evaluation for heterogeneous electric vehicles network in smart cities","volume":"22","author":"Wang","year":"2020","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"1","key":"10.1016\/j.array.2026.100761_b8","doi-asserted-by":"crossref","first-page":"11","DOI":"10.3390\/jsan7010011","article-title":"IoT-based intelligent modeling of smart home environment for fire prevention and safety","volume":"7","author":"Saeed","year":"2018","journal-title":"J Sens Actuator Netw"},{"key":"10.1016\/j.array.2026.100761_b9","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.future.2020.07.047","article-title":"An intelligent healthcare monitoring framework using wearable sensors and social networking data","volume":"114","author":"Ali","year":"2021","journal-title":"Future Gener Comput Syst"},{"issue":"8","key":"10.1016\/j.array.2026.100761_b10","doi-asserted-by":"crossref","first-page":"1929","DOI":"10.3390\/s19081929","article-title":"Internet-of-Things and information fusion: Trust perspective survey","volume":"19","author":"Azzedin","year":"2019","journal-title":"Sensors"},{"issue":"2","key":"10.1016\/j.array.2026.100761_b11","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1109\/MNET.011.2000445","article-title":"Movement-based solutions to energy limitation in wireless sensor networks: State of the art and future trends","volume":"35","author":"Liu","year":"2020","journal-title":"IEEE Netw"},{"key":"10.1016\/j.array.2026.100761_b12","series-title":"It\u2019s still hot in here: Exploring the relationship between incentivization and climate related behaviors to combat climate change","author":"Matthews","year":"2022"},{"key":"10.1016\/j.array.2026.100761_b13","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s11307-017-1123-5","article-title":"Combined PET\/MRI: global warming\u2014summary report of the 6th international workshop on PET\/MRI, march 27\u201329, 2017, T\u00fcbingen, Germany","volume":"20","author":"Bailey","year":"2018","journal-title":"Mol Imaging Biol"},{"issue":"11","key":"10.1016\/j.array.2026.100761_b14","doi-asserted-by":"crossref","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","article-title":"Industrial internet of things: Challenges, opportunities, and directions","volume":"14","author":"Sisinni","year":"2018","journal-title":"IEEE Trans Ind Inform"},{"key":"10.1016\/j.array.2026.100761_b15","series-title":"Internet of things and data analytics handbook","author":"Geng","year":"2017"},{"key":"10.1016\/j.array.2026.100761_b16","doi-asserted-by":"crossref","first-page":"10332","DOI":"10.1109\/ACCESS.2018.2799879","article-title":"Secure quantum steganography protocol for fog cloud internet of things","volume":"6","author":"Abd El-Latif","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.array.2026.100761_b17","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.107819","article-title":"SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles","volume":"187","author":"Kumar","year":"2021","journal-title":"Comput Netw"},{"key":"10.1016\/j.array.2026.100761_b18","doi-asserted-by":"crossref","first-page":"34564","DOI":"10.1109\/ACCESS.2020.2975142","article-title":"Security and privacy in smart farming: Challenges and opportunities","volume":"8","author":"Gupta","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.array.2026.100761_b19","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.inffus.2020.03.004","article-title":"DependData: Data collection dependability through three-layer decision-making in BSNs for healthcare monitoring","volume":"62","author":"Hai","year":"2020","journal-title":"Inf Fusion"},{"key":"10.1016\/j.array.2026.100761_b20","series-title":"Information and communication technology for competitive strategies (ICTCS 2020) ICT: applications and social interfaces","first-page":"133","article-title":"Cyber-Physical system\u2014An architectural review","author":"Ramanathan","year":"2021"},{"issue":"2","key":"10.1016\/j.array.2026.100761_b21","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1109\/JIOT.2017.2720635","article-title":"Policy-based secure and trustworthy sensing for internet of things in smart cities","volume":"5","author":"Li","year":"2017","journal-title":"IEEE Internet Things J"},{"issue":"15","key":"10.1016\/j.array.2026.100761_b22","doi-asserted-by":"crossref","first-page":"6446","DOI":"10.1109\/JSEN.2018.2848205","article-title":"Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks","volume":"18","author":"Firoozi","year":"2018","journal-title":"IEEE Sens J"},{"key":"10.1016\/j.array.2026.100761_b23","series-title":"2017 IEEE trustcom\/bigDataSE\/ICESS","first-page":"909","article-title":"Sensor data modeling for data trustworthiness","author":"Karthik","year":"2017"},{"issue":"4","key":"10.1016\/j.array.2026.100761_b24","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/MCC.2018.111122026","article-title":"Secure data collection, storage and access in cloud-assisted IoT","volume":"5","author":"Wang","year":"2018","journal-title":"IEEE Cloud Comput"},{"issue":"6","key":"10.1016\/j.array.2026.100761_b25","first-page":"3359","article-title":"A hybrid machine learning model for detecting cybersecurity threats in IoT applications","volume":"15","author":"Usoh","year":"2023","journal-title":"Int J Inf Technol"},{"key":"10.1016\/j.array.2026.100761_b26","doi-asserted-by":"crossref","DOI":"10.1016\/j.foodcont.2020.107495","article-title":"Exploring the impact of blockchain on the performance of agri-food supply chains","volume":"119","author":"Stranieri","year":"2021","journal-title":"Food Control"},{"key":"10.1016\/j.array.2026.100761_b27","first-page":"1","article-title":"A blockchain model for trustworthiness in the internet of things (IoT)-based smart-cities","author":"Ali","year":"2020","journal-title":"Trends Cloud-Based IoT"},{"key":"10.1016\/j.array.2026.100761_b28","series-title":"2018 IEEE smartWorld, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, cloud & big data computing, internet of people and smart city innovation (smartWorld\/SCALCOM\/UIC\/aTC\/cBDCom\/IOP\/sCI)","first-page":"991","article-title":"Secure data provenance in cloud-centric internet of things via blockchain smart contracts","author":"Ali","year":"2018"},{"key":"10.1016\/j.array.2026.100761_b29","series-title":"2019 wireless days","first-page":"1","article-title":"Will blockchain technology become a reality in sensor networks?","author":"Marchang","year":"2019"},{"key":"10.1016\/j.array.2026.100761_b30","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119870","article-title":"Differential privacy may have a potential optimization effect on some swarm intelligence algorithms besides privacy-preserving","volume":"654","author":"Zhang","year":"2024","journal-title":"Inform Sci"},{"issue":"3","key":"10.1016\/j.array.2026.100761_b31","doi-asserted-by":"crossref","first-page":"3005","DOI":"10.1007\/s11227-022-04756-1","article-title":"Privacy-preserving edge computing offloading scheme based on whale optimization algorithm","volume":"79","author":"Liu","year":"2023","journal-title":"J Supercomput"},{"key":"10.1016\/j.array.2026.100761_b32","doi-asserted-by":"crossref","DOI":"10.3389\/fnbot.2022.981390","article-title":"Robot location privacy protection based on Q-learning particle swarm optimization algorithm in mobile crowdsensing","volume":"16","author":"Ma","year":"2022","journal-title":"Front Neurorobotics"},{"issue":"11","key":"10.1016\/j.array.2026.100761_b33","doi-asserted-by":"crossref","first-page":"5219","DOI":"10.3390\/s23115219","article-title":"An efficient differential privacy-based method for location privacy protection in location-based services","volume":"23","author":"Wang","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.array.2026.100761_b34","article-title":"Federated genetic optimization for secure and Privacy-Preserving sensor localization in consumer IoT applications","author":"Jain","year":"2025","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"10.1016\/j.array.2026.100761_b35","doi-asserted-by":"crossref","first-page":"3338","DOI":"10.1038\/s41598-025-87454-1","article-title":"Privacy-preserving approach for IoT networks using statistical learning with optimization algorithm on high-dimensional big data environment","volume":"15","author":"Alrayes","year":"2025","journal-title":"Sci Rep"},{"issue":"1","key":"10.1016\/j.array.2026.100761_b36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13677-023-00532-5","article-title":"Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics","volume":"13","author":"Wang","year":"2024","journal-title":"J Cloud Comput"},{"issue":"1","key":"10.1016\/j.array.2026.100761_b37","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1038\/s41612-025-01145-2","article-title":"Dynamic calibration of low-cost PM2. 5 sensors using trust-based consensus mechanisms","volume":"8","author":"Mahajan","year":"2025","journal-title":"Npj Clim Atmospheric Sci"},{"issue":"10","key":"10.1016\/j.array.2026.100761_b38","doi-asserted-by":"crossref","first-page":"630","DOI":"10.3390\/info15100630","article-title":"Protecting infinite data streams from wearable devices with local differential privacy techniques","volume":"15","author":"Zhao","year":"2024","journal-title":"Information"},{"issue":"1","key":"10.1016\/j.array.2026.100761_b39","doi-asserted-by":"crossref","first-page":"30009","DOI":"10.1038\/s41598-025-15462-2","article-title":"Energy-aware cluster head optimization and secure blockchain integration for heterogeneous 6G-enabled IoMT networks","volume":"15","author":"Yuvarani","year":"2025","journal-title":"Sci Rep"},{"key":"10.1016\/j.array.2026.100761_b40","article-title":"Trust-Aware federated learning with differential privacy for secure AIoT in critical infrastructures","volume":"11","author":"Kadiyala","year":"2024","journal-title":"EAI Endorsed Trans Internet Things"},{"key":"10.1016\/j.array.2026.100761_b41","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2021.107277","article-title":"GAPORE: Boolean network inference using a genetic algorithm with novel polynomial representation and encoding scheme","volume":"228","author":"Liu","year":"2021","journal-title":"Knowl-Based Syst"},{"key":"10.1016\/j.array.2026.100761_b42","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107189","article-title":"Provenance-enabled packet path tracing in the RPL-based internet of things","volume":"173","author":"Suhail","year":"2020","journal-title":"Comput Netw"},{"key":"10.1016\/j.array.2026.100761_b43","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/OJCS.2021.3058291","article-title":"Privacy preserved cyber-physical searching for information-centric intelligent agriculture","volume":"2","author":"Ding","year":"2021","journal-title":"IEEE Open J Comput Soc"},{"key":"10.1016\/j.array.2026.100761_b44","first-page":"167","article-title":"Differential privacy: An umbrella review","author":"Kilpala","year":"2022","journal-title":"Artif Intell Cybersecur: Theory Appl"},{"issue":"6","key":"10.1016\/j.array.2026.100761_b45","first-page":"1","article-title":"Fire dynamics simulator user\u2019s guide","volume":"1019","author":"McGrattan","year":"2013","journal-title":"NIST Spec Publ"},{"key":"10.1016\/j.array.2026.100761_b46","doi-asserted-by":"crossref","unstructured":"Li Q, Li Y, Gao J, Zhao B, Fan W, Han J. Resolving conflicts in heterogeneous data by truth discovery and source reliability estimation. In: Proceedings of the 2014 ACM SIGMOD international conference on management of data. 2014, p. 1187\u201398.","DOI":"10.1145\/2588555.2610509"},{"issue":"7","key":"10.1016\/j.array.2026.100761_b47","first-page":"24","article-title":"A fast-voting assurance for data fusion in wireless sensor network","volume":"154","author":"Huang","year":"2013","journal-title":"Sens Transducers"},{"key":"10.1016\/j.array.2026.100761_b48","doi-asserted-by":"crossref","DOI":"10.7717\/peerj-cs.504","article-title":"In-network generalized trustworthy data collection for event detection in cyber-physical systems","volume":"7","author":"Rahman","year":"2021","journal-title":"PeerJ Comput Sci"}],"container-title":["Array"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590005626000846?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590005626000846?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T09:12:35Z","timestamp":1777367555000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2590005626000846"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":48,"alternative-id":["S2590005626000846"],"URL":"https:\/\/doi.org\/10.1016\/j.array.2026.100761","relation":{},"ISSN":["2590-0056"],"issn-type":[{"value":"2590-0056","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Reliable, trustworthy sensor data collection for event detection in Cyber-Physical Systems using Genetic Algorithm and Differential Privacy","name":"articletitle","label":"Article Title"},{"value":"Array","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.array.2026.100761","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"100761"}}