{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:58:09Z","timestamp":1729637889134,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/wmnc.2013.6549016","type":"proceedings-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T14:59:11Z","timestamp":1373381951000},"page":"1-8","source":"Crossref","is-referenced-by-count":32,"title":["Improving location reliability in crowd sensed data with minimal efforts"],"prefix":"10.1109","author":[{"given":"M.","family":"Talasila","sequence":"first","affiliation":[]},{"given":"R.","family":"Curtmola","sequence":"additional","affiliation":[]},{"given":"C.","family":"Borcea","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Intel Labs the Mobile Phone That Breathes","year":"0","key":"19"},{"year":"0","key":"17"},{"journal-title":"Sensordrone The 6th Sense of Your Smartphone","year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0304-8"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/957044.957046"},{"journal-title":"Google Play Android App Store","year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2009.10.006"},{"key":"11","article-title":"Secure localization with hidden and mobile base stations","author":"apkun","year":"2006","journal-title":"Proceedings of IEEE Infocom Citeseer"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/WMCSA.2006.11"},{"journal-title":"Amazon Mechanical Turk","year":"0","key":"21"},{"key":"20","article-title":"Assessing the spoofing threat: Development of a portable gps civilian spoofer","author":"humphreys","year":"2008","journal-title":"Proc ION GNSS Int Technical Meeting of the Satellite Division"},{"journal-title":"Mcsense Android Smartphone Application","year":"0","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.90"},{"key":"24","first-page":"117","article-title":"Participatory sensing","author":"burke","year":"2006","journal-title":"Workshop on World-Sensor-Web (WSW06) Mobile Device Centric Sensor Networks and Applications"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.11"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070961"},{"key":"27","article-title":"Towards trustworthy participatory sensing","author":"dua","year":"2009","journal-title":"HotSec'09 Proceedings of the Usenix Workshop on Hot Topics in Security"},{"key":"28","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1145\/1357010.1352625","article-title":"Flicker: An execution infrastructure for tcb minimization","volume":"42","author":"mccune","year":"2008","journal-title":"SIGOPS Operating Systems Review"},{"key":"29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-13869-0_1","article-title":"Beyond kernellevel integrity measurement: Enabling remote attestation for the android platform","author":"nauman","year":"2010","journal-title":"Trust and Trustworthy Computing"},{"journal-title":"Urban Sensing Research Ucla","year":"0","key":"3"},{"journal-title":"Smart Phone Sensing Research Dartmouth College","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2007.46"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952990"},{"journal-title":"Trusted Platform Module","year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753688"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734593"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307668"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734592"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644094"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941313"},{"key":"8","first-page":"210","article-title":"Link: Location verification through immediate neighbors knowledge","author":"talasila","year":"2010","journal-title":"Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systemse (MobiQuitous '10)"}],"event":{"name":"2013 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2013)","start":{"date-parts":[[2013,4,23]]},"location":"Dubai","end":{"date-parts":[[2013,4,25]]}},"container-title":["6th Joint IFIP Wireless and Mobile Networking Conference (WMNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6533891\/6548948\/06549016.pdf?arnumber=6549016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:33:30Z","timestamp":1602689610000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6549016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/wmnc.2013.6549016","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}