{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T10:27:51Z","timestamp":1748514471914,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,5]]},"DOI":"10.1109\/ssci50451.2021.9660043","type":"proceedings-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T21:09:51Z","timestamp":1643058591000},"page":"01-08","source":"Crossref","is-referenced-by-count":3,"title":["Estimating crowd-worker's reliability with interval-valued labels to improve the quality of crowdsourced work"],"prefix":"10.1109","author":[{"given":"Makenzie","family":"Spurling","sequence":"first","affiliation":[]},{"given":"Chenyi","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Huixin","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Victor S.","family":"Sheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9491-9"},{"key":"ref38","first-page":"2853","article-title":"CEKA: A Tool for Mining the Wisdom of Crowds","volume":"16","author":"zhang","year":"2015","journal-title":"Journal of Machine Learning Research"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983830"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2659740"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019837"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401965"},{"journal-title":"Wikipedia Confusion matrix en wikipedia org\/wiki\/Confusion_matrix","year":"0","key":"ref37"},{"key":"ref36","first-page":"2035","article-title":"Whose Vote Should Count More: Optimal Integration of Labels from Labelers of Unknown Expertise","volume":"22","author":"whitehill","year":"2008","journal-title":"Advances in neural information processing systems"},{"key":"ref35","first-page":"239","article-title":"Man vs. machine: practical adversarial detection of malicious crowdsourcing workers","author":"wang","year":"2014","journal-title":"Proc of the 23rd USENIX Security Symposium"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-020-01475-y"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/s10614-008-9159-x","article-title":"Impacts of interval computing on stock market forecasting","volume":"33","author":"he","year":"2009","journal-title":"Computational Economics"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF02385256"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009946531786"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77664-2_26"},{"journal-title":"Knowledge Processing with Interval and Soft Computing","year":"2008","author":"hu","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11155-007-9039-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2331684.2331689"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50153-2_31"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50153-2_32"},{"key":"ref19","first-page":"166","article-title":"Managing uncertainties in crowdsourcing with interval-valued labeling","volume":"258","author":"hu","year":"2021","journal-title":"Explainable AI and Other Applications of Fuzzy Techniques NAFIPS 2021 Lecture Notes in Networks and Systems"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.118"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.06.047"},{"key":"ref27","article-title":"POMDP-Based Worker Pool Selection for Crowdsourcing","author":"rajpal","year":"2015","journal-title":"Proceedings of The 32nd International Conference on Machine Learning"},{"key":"ref3","article-title":"Rigorous Global Search - Executive Summary","author":"corliss","year":"1997","journal-title":"Technical Report"},{"key":"ref6","first-page":"1444","article-title":"Enhancing network intrusion detection systems with interval methods, SAC &#x2018;05","author":"duan","year":"0","journal-title":"Proceedings of the 2005 ACM symposium on Applied computing"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref5","first-page":"20","article-title":"Maximum likelihood estimation of observer error-rates using the EM algorithm","volume":"28","author":"dawid","year":"1979","journal-title":"Journal of the Royal Statistical Society Series C (Applied Statistics)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8191(94)90036-1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.11332"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1007\/s00181-009-0286-6","article-title":"Midpoint method and accuracy of variability forecasting","volume":"38","author":"he","year":"2009","journal-title":"Empirical Economics"},{"key":"ref1","first-page":"82","article-title":"Learning to predict from crowdsourced data, UAI&#x2019;14","author":"bi","year":"0","journal-title":"Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligenc"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FOCI.2007.372158"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/978-3-540-28651-6_41","article-title":"Generating and applying rules for interval valued fuzzy observations","volume":"3177","author":"korvin","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISMVL.2009.65"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2184512.2184562"},{"journal-title":"Cheaper and Better Selecting Good Workers for Crowdsourcing","year":"2015","author":"li","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajog.2010.05.037"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.87"}],"event":{"name":"2021 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2021,12,5]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2021,12,7]]}},"container-title":["2021 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9659537\/9659538\/09660043.pdf?arnumber=9660043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:56:45Z","timestamp":1652201805000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9660043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,5]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/ssci50451.2021.9660043","relation":{},"subject":[],"published":{"date-parts":[[2021,12,5]]}}}