{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T10:53:42Z","timestamp":1753181622804,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/globecom38437.2019.9013890","type":"proceedings-article","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T04:59:24Z","timestamp":1582865964000},"page":"1-6","source":"Crossref","is-referenced-by-count":14,"title":["Robust Truth Discovery against Data Poisoning in Mobile Crowdsensing"],"prefix":"10.1109","author":[{"given":"Zonghao","family":"Huang","sequence":"first","affiliation":[]},{"given":"Miao","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Yanmin","family":"Gong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1689","article-title":"Is feature selection secure against training data poisoning?","author":"xiao","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013539"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963439"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"932","DOI":"10.14778\/3402707.3402731","article-title":"Online data fusion","volume":"4","author":"liu","year":"0","journal-title":"Proceedings of the VLDB Endowment"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14778\/2535568.2448938"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1921008"},{"key":"ref37","first-page":"3233","article-title":"Identifying unreliable and adversarial workers in crowdsourced labeling tasks","volume":"18","author":"jagabathula","year":"2017","journal-title":"The Journal of Machine Learning Research"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/6506341"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2017.8117556"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488476"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228639"},{"key":"ref40","first-page":"1452","article-title":"Data poisoning attacks against autoregressive models","author":"alfeld","year":"2016","journal-title":"AAAI"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2018.00064"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/TKDE.2007.190745","article-title":"Truth discovery with multiple conflicting information providers on the web","volume":"20","author":"yin","year":"2008","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14778\/2535568.2448943"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718504"},{"key":"ref15","first-page":"877","article-title":"Knowing what to believe (when you already know something)","author":"pasternack","year":"0","journal-title":"Proceedings of the 23rd International Conference on Computational Linguistics"},{"key":"ref16","article-title":"A probabilistic model for estimating real-valued truth from conflicting sources","author":"zhao","year":"0","journal-title":"Proc QDB"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14778\/2168651.2168656"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2185677.2185737"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610509"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14778\/2735496.2735505"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433181"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783277"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069707"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2512282"},{"key":"ref29","volume":"30","author":"bard","year":"2013","journal-title":"Practical Bilevel Optimization Algorithms and Applications"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036871"},{"key":"ref8","article-title":"Dp-admm: Admm-based distributed learning with differential privacy","author":"huang","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2773087"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6309-2_9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228652"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/00045608.2015.1018773"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/090748196"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1209\/epl\/i2006-10204-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2316816"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209594"},{"key":"ref41","first-page":"1885","article-title":"Data poisoning attacks on factorization-based collaborative filtering","author":"li","year":"0","journal-title":"Advances in neural information processing systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref26","first-page":"2946","article-title":"Crowdsourcing for multiple-choice question answering","author":"aydin","year":"0","journal-title":"AAAI"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186032"}],"event":{"name":"GLOBECOM 2019 - 2019 IEEE Global Communications Conference","start":{"date-parts":[[2019,12,9]]},"location":"Waikoloa, HI, USA","end":{"date-parts":[[2019,12,13]]}},"container-title":["2019 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8968653\/9013108\/09013890.pdf?arnumber=9013890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:48:10Z","timestamp":1658080090000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9013890\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/globecom38437.2019.9013890","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}