{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:12:24Z","timestamp":1775913144086,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072475"],"award-info":[{"award-number":["62072475"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tdsc.2024.3428405","type":"journal-article","created":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T19:23:43Z","timestamp":1721071423000},"page":"1098-1117","source":"Crossref","is-referenced-by-count":10,"title":["Truthful and Dual-Direction Combinatorial Multi-Armed Bandit Scheme to Maximize Profit for Mobile Crowd Sensing"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4001-7005","authenticated-orcid":false,"given":"Xiangwan","family":"Fu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7119-8673","authenticated-orcid":false,"given":"Saiqin","family":"Long","sequence":"additional","affiliation":[{"name":"National &#x0026; Local Joint Engineering, Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-4761","authenticated-orcid":false,"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2782-183X","authenticated-orcid":false,"given":"Ju","family":"Ren","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6097-2467","authenticated-orcid":false,"given":"Bin","family":"Guo","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7804-0286","authenticated-orcid":false,"given":"Zhetao","family":"Li","sequence":"additional","affiliation":[{"name":"National &#x0026; Local Joint Engineering, Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3431502"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.052"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119245"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2599873"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.31"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.043"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2894257"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3093552"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644048"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88351-7_16"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2449314"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.3015775"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1037\/tra0001235"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3041681"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3157687"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057111"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2955688"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3075741"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3019326"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3151190"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3057881"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.06.036"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3034590"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2992531"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155518"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3169180"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3023757"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v2i1.13151"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3052873"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2895834"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14778\/3055540.3055547"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2919517"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107482"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3108149"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102219"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.05.020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3088675"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3150765"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2570740"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3174044"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020462"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869807"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/10925471\/10598367.pdf?arnumber=10598367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T21:17:34Z","timestamp":1742246254000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10598367\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":42,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3428405","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}