{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T22:34:00Z","timestamp":1769034840928,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (NSFC)","doi-asserted-by":"publisher","award":["62206320"],"award-info":[{"award-number":["62206320"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Guangdong Basic and Applied Basic Research Foundation","doi-asserted-by":"publisher","award":["2024A1515010118"],"award-info":[{"award-number":["2024A1515010118"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1109\/cloudcom67567.2025.11331386","type":"proceedings-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:37:16Z","timestamp":1768941436000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Combinatorial Multi-Armed Bandit-based Incentives in Privacy-Preserving Federated Crowdsourcing"],"prefix":"10.1109","author":[{"given":"Chenchen","family":"Lin","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence, Sun Yat-sen University,Zhuhai,China"}]},{"given":"Wenhao","family":"Yuan","sequence":"additional","affiliation":[{"name":"The University of Hong Kong,Department of Electrical and Electronic Engineering,Hong Kong,China"}]},{"given":"Xuehe","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Sun Yat-sen University,Zhuhai,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42836-9_25"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3031061"},{"key":"ref3","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017","journal-title":"Artificial intelligence and statistics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3246636"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS60048.2023.00034"},{"key":"ref6","article-title":"Deep leakage from gradients","volume":"32","author":"Zhu","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.09.015"},{"key":"ref9","volume-title":"Programming differential privacy","author":"Near","year":"2021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TON.2025.3554494"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i5.25744"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3342239"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3318862"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3342092"},{"key":"ref17","article-title":"Inference aided rein-forcement learning for incentive mechanism design in crowdsourcing","volume":"31","author":"Hu","year":"2018","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3251443"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322475"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2022.3157687"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46128-1_50"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3233\/faia250953"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN60899.2024.10651264"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4169\/college.math.j.43.3.244"},{"key":"ref25","article-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017","journal-title":"arXiv preprint"},{"key":"ref26","author":"Krizhevsky","year":"2009","journal-title":"Learning multiple layers of features from tiny images"},{"key":"ref27","article-title":"Cinic-10 is not imagenet or cifar-10","author":"Darlow","year":"2018","journal-title":"arXiv preprint"},{"key":"ref28","article-title":"Measuring the effects of non-identical data distribution for federated visual classification","author":"Hsu","year":"2019","journal-title":"arXiv preprint"},{"key":"ref29","first-page":"39879","article-title":"Feddisco: Fed-erated learning with discrepancy-aware collaboration","volume-title":"International Conference on Machine Learning","author":"Ye"},{"key":"ref30","article-title":"Optimal client sampling for federated learning","author":"Chen","year":"2022","journal-title":"Transactions on Machine Learning Research"},{"key":"ref31","first-page":"41 354","article-title":"Fed-CBS: A heterogeneity-aware client sampling mechanism for federated learning via class-imbalance reduction","volume-title":"Proceedings of the 40th International Conference on Machine Learning","author":"Zhang"}],"event":{"name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","location":"Shenzhen, China","start":{"date-parts":[[2025,11,14]]},"end":{"date-parts":[[2025,11,16]]}},"container-title":["2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11330195\/11331311\/11331386.pdf?arnumber=11331386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:17:18Z","timestamp":1768979838000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11331386\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cloudcom67567.2025.11331386","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]}}}