{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:50:32Z","timestamp":1772905832241,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Intramural Grants Program","award":["190599"],"award-info":[{"award-number":["190599"]}]},{"name":"National Science Foundation Project of P. R. China","award":["61931001"],"award-info":[{"award-number":["61931001"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20A20159"],"award-info":[{"award-number":["U20A20159"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972432"],"award-info":[{"award-number":["61972432"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program for Guangdong Introducing Innovative and Entrepreneurial Teams","award":["2017ZT07X355"],"award-info":[{"award-number":["2017ZT07X355"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/tmc.2021.3133365","type":"journal-article","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T20:37:34Z","timestamp":1638909454000},"page":"2569-2581","source":"Crossref","is-referenced-by-count":41,"title":["Data Poisoning Attacks and Defenses in Dynamic Crowdsourcing With Online Data Quality Learning"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4131-4009","authenticated-orcid":false,"given":"Yuxi","family":"Zhao","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Auburn University, Auburn, AL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5124-7941","authenticated-orcid":false,"given":"Xiaowen","family":"Gong","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Auburn University, Auburn, AL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5287-5226","authenticated-orcid":false,"given":"Fuhong","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9943-6020","authenticated-orcid":false,"given":"Xu","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, Guangdong, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2346775"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555823"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791226"},{"key":"ref8","article-title":"SmartRoadSense: A crowd sensing application for the continued monitoring of road quality"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997235"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120180"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2745844.2745874"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2746285.2746310"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2942358.2942375"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057111"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/WIOPT.2017.7959903"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209599"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2019.8824888"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2745844.2745871"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2559481"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2019.8824861"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209594"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450066"},{"issue":"8","key":"ref23","first-page":"1","article-title":"Dual control for approximate Bayesian reinforcement learning","volume":"17","author":"Klenske","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/9780470980033"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1023\/A:1013689704352","article-title":"Finite-time analysis of the multiarmed bandit problem","volume":"47","author":"Auer","year":"2002","journal-title":"Mach. Learn."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/11564096_42"},{"key":"ref28","first-page":"39","article-title":"Analysis of thompson sampling for the multi-armed bandit problem","volume-title":"Proc. Conf. Learn. Theory","author":"Agrawal"},{"key":"ref29","first-page":"4042","article-title":"Data poisoning attacks on stochastic bandits","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Liu"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01554-1_11"},{"key":"ref31","first-page":"3640","article-title":"Adversarial attacks on stochastic bandits","volume-title":"Proc. Advances Neural Inf. Process. Syst.","author":"Jun"},{"key":"ref32","article-title":"Poisoning attacks against support vector machines","volume-title":"Proc. 29th Int. Cof. Int. Conf. Mach. Learn.","author":"Biggio"},{"key":"ref33","article-title":"Data poisoning attacks against online learning","author":"Wang","year":"2018"},{"key":"ref34","first-page":"1885","article-title":"Data poisoning attacks on factorization-based collaborative filtering","volume-title":"Proc. Advances Neural Inf. Process. Syst.","author":"Li"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10237"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053495"},{"key":"ref37","first-page":"14362","article-title":"Adversarial attacks on linear contextual bandits","volume":"33","author":"Garcelon"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186032"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195541"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.041913.120516"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49669-2_18"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.39"},{"key":"ref43","article-title":"Data sets for data fusion experiments","author":"Berti-Equille","year":"2010"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00097"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/10091958\/09640529.pdf?arnumber=9640529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T02:20:00Z","timestamp":1710382800000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9640529\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":40,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2021.3133365","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,1]]}}}