{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:19:14Z","timestamp":1771024754210,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032020"],"award-info":[{"award-number":["62032020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172350"],"award-info":[{"award-number":["62172350"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076214"],"award-info":[{"award-number":["62076214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23B2027"],"award-info":[{"award-number":["U23B2027"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2021YFB3101200"],"award-info":[{"award-number":["2021YFB3101200"]}]},{"name":"Postgraduate Scientific Research Innovation Project of Hunan Province","award":["CX20200618"],"award-info":[{"award-number":["CX20200618"]}]},{"DOI":"10.13039\/501100007930","name":"Xiangtan University","doi-asserted-by":"publisher","award":["XDCX2020B085"],"award-info":[{"award-number":["XDCX2020B085"]}],"id":[{"id":"10.13039\/501100007930","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1109\/tdsc.2024.3363507","type":"journal-article","created":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T19:04:07Z","timestamp":1707332647000},"page":"4861-4878","source":"Crossref","is-referenced-by-count":19,"title":["Data Poisoning Attacks and Defenses to LDP-Based Privacy-Preserving Crowdsensing"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3030-709X","authenticated-orcid":false,"given":"Zhirun","family":"Zheng","sequence":"first","affiliation":[{"name":"School of Mathematics and Computational Science, Xiangtan University, Xiangtan, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7804-0286","authenticated-orcid":false,"given":"Zhetao","family":"Li","sequence":"additional","affiliation":[{"name":"National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, and College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1335-2040","authenticated-orcid":false,"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7119-8673","authenticated-orcid":false,"given":"Saiqin","family":"Long","sequence":"additional","affiliation":[{"name":"National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, and College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9694-3294","authenticated-orcid":false,"given":"Mushu","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4140-287X","authenticated-orcid":false,"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3069944"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2705181"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3093552"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2958901"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610509"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186032"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209594"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450066"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3173642"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00037"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3253786"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3181855"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3154632"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3196091"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2941481"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3495160"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2753245"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403102"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2559481"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.27"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2919517"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref25","first-page":"947","article-title":"Data poisoning attacks to local differential privacy protocols","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Cao"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00001"},{"key":"ref27","first-page":"519","article-title":"Poisoning attacks to local differential privacy protocols for key-value data","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Wu"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219998"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3198283"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2848659"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384720"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3110052"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3003673"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013890"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2307\/2283137"},{"key":"ref36","first-page":"195","article-title":"Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse","volume-title":"Proc. 22nd USENIX Secur. Symp.","author":"Thomas"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23047"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1137\/15M1052172"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2008.927706"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008202821328"},{"key":"ref41","article-title":"Weather sentiment - Amazon mechanical turk dataset","author":"Venanzi","year":"2015"},{"key":"ref42","first-page":"2035","article-title":"Whose vote should count more: Optimal integration of labels from labelers of unknown expertise","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Whitehill"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10663874\/10423870.pdf?arnumber=10423870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:06:53Z","timestamp":1725484013000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10423870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":42,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3363507","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]}}}