{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:42:59Z","timestamp":1765438979256,"version":"3.37.3"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB3101201"],"award-info":[{"award-number":["2021YFB3101201"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032020","U23B2027","62172350"],"award-info":[{"award-number":["62032020","U23B2027","62172350"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2024A1515010214"],"award-info":[{"award-number":["2024A1515010214"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007930","name":"Xiangtan University","doi-asserted-by":"publisher","award":["XDCX2021B105"],"award-info":[{"award-number":["XDCX2021B105"]}],"id":[{"id":"10.13039\/501100007930","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tmc.2024.3412214","type":"journal-article","created":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T18:49:02Z","timestamp":1718131742000},"page":"12461-12476","source":"Crossref","is-referenced-by-count":5,"title":["Propagation Verification Under Social Relationship Privacy Awareness in Mobile Crowdsourcing"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9259-8223","authenticated-orcid":false,"given":"Ping","family":"Wang","sequence":"first","affiliation":[{"name":"School of Mathematics and Computational Science, Xiangtan University, Xiangtan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7119-8673","authenticated-orcid":false,"given":"Saiqin","family":"Long","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3192-6378","authenticated-orcid":false,"given":"Haolin","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Xiangtan University, Xiangtan, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9420-4719","authenticated-orcid":false,"given":"Kun","family":"Jiang","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9434-3968","authenticated-orcid":false,"given":"Qingyong","family":"Deng","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining &amp; Security, Guangxi Normal University, Guilin, Guangxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7804-0286","authenticated-orcid":false,"given":"Zhetao","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, Guangzhou, China"}]}],"member":"263","reference":[{"issue":"6","key":"ref1","first-page":"176","article-title":"The rise of crowdsourcing","volume":"14","author":"Howe","year":"2006","journal-title":"Wired"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88351-7_16"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2465730"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791226"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2865355"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2973958"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3162108"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3063380"},{"key":"ref9","first-page":"983","article-title":"Locally differentially private analysis of graph statistics","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Imola"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134086"},{"key":"ref11","first-page":"3241","article-title":"PrivGraph: Differentially private graph data publication by exploiting community information","volume-title":"Proc. 32nd USENIX Conf. Secur. Symp., USENIX Assoc.","author":"Yuan"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133972"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2896926"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2421897"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2877459"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2868106"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2777481"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3002586"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3173642"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3181855"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3363507"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-442450-0.50025-0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00206"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524471"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560630"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/10746253\/10553369.pdf?arnumber=10553369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:26:21Z","timestamp":1732667181000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10553369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":28,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2024.3412214","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}