{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T11:25:57Z","timestamp":1772450757796,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T00:00:00Z","timestamp":1529971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,26]]},"DOI":"10.1145\/3209582.3209594","type":"proceedings-article","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T20:15:46Z","timestamp":1529525746000},"page":"111-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":61,"title":["Towards Data Poisoning Attacks in Crowd Sensing Systems"],"prefix":"10.1145","author":[{"given":"Chenglin","family":"Miao","sequence":"first","affiliation":[{"name":"State University of New York at Buffalo, NY, USA"}]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, IL, USA"}]},{"given":"Houping","family":"Xiao","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, NY, USA"}]},{"given":"Wenjun","family":"Jiang","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, NY, USA"}]},{"given":"Mengdi","family":"Huai","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, NY, USA"}]},{"given":"Lu","family":"Su","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"AAAI","author":"Alfeld Scott","year":"2016","unstructured":"Scott Alfeld , Xiaojin Zhu , and Paul Barford . Data Poisoning Attacks against Autoregressive Models .. In AAAI , 2016 . Scott Alfeld, Xiaojin Zhu, and Paul Barford. Data Poisoning Attacks against Autoregressive Models.. In AAAI, 2016."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2836-1","volume-title":"Practical bilevel optimization: algorithms and applications","author":"Bard Jonathan F","year":"1998","unstructured":"Jonathan F Bard . Practical bilevel optimization: algorithms and applications . Kluwer Academic Publishers , 1998 . Jonathan F Bard. Practical bilevel optimization: algorithms and applications. Kluwer Academic Publishers, 1998."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"e_1_3_2_1_4_1","volume-title":"Nonlinear programming. Athena scientific Belmont","author":"Bertsekas Dimitri P","year":"1999","unstructured":"Dimitri P Bertsekas . Nonlinear programming. Athena scientific Belmont , 1999 . Dimitri P Bertsekas. Nonlinear programming. Athena scientific Belmont, 1999."},{"key":"e_1_3_2_1_5_1","volume-title":"ICML","author":"Biggio Battista","year":"2012","unstructured":"Battista Biggio , Blaine Nelson , and Pavel Laskov . Poisoning attacks against support vector machines . In ICML , 2012 . Battista Biggio, Blaine Nelson, and Pavel Laskov. Poisoning attacks against support vector machines. In ICML, 2012."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000016"},{"key":"e_1_3_2_1_7_1","volume-title":"Mobile Information Systems","author":"Chang Shih-Hao","year":"2016","unstructured":"Shih-Hao Chang and Zhi-Rong Chen . Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System . In Mobile Information Systems , 2016 . Shih-Hao Chang and Zhi-Rong Chen. Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System. In Mobile Information Systems, 2016."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2629338"},{"key":"e_1_3_2_1_9_1","volume":"201","author":"Duan Lingjie","unstructured":"Lingjie Duan , Alexander W Min , Jianwei Huang , and Kang G Shin . Attack prevention for collaborative spectrum sensing in cognitive radio networks. In JSAC , 201 2. Lingjie Duan, Alexander W Min, Jianwei Huang, and Kang G Shin. Attack prevention for collaborative spectrum sensing in cognitive radio networks. In JSAC, 2012.","journal-title":"JSAC"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702443"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218673"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2770876"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818184"},{"key":"e_1_3_2_1_15_1","volume-title":"Journal of Machine Learning Research","author":"Jagabathula Srikanth","year":"2016","unstructured":"Srikanth Jagabathula , Lakshminarayanan Subramanian , and Ashwin Venkataraman . Identifying Unreliable and Adversarial Workers in Crowdsourced Labeling Tasks . In Journal of Machine Learning Research , 2016 . Srikanth Jagabathula, Lakshminarayanan Subramanian, and Ashwin Venkataraman. Identifying Unreliable and Adversarial Workers in Crowdsourced Labeling Tasks. In Journal of Machine Learning Research, 2016."},{"key":"e_1_3_2_1_16_1","volume-title":"NIPS","author":"Jagabathula Srikanth","year":"2014","unstructured":"Srikanth Jagabathula , Lakshminarayanan Subramanian , and Ashwin Venkataraman . Reputation-based worker filtering in crowdsourcing . In NIPS , 2014 . Srikanth Jagabathula, Lakshminarayanan Subramanian, and Ashwin Venkataraman. Reputation-based worker filtering in crowdsourcing. In NIPS, 2014."},{"key":"e_1_3_2_1_17_1","volume-title":"Scalable Mobile Crowdsensing via Peer-to-Peer Data Sharing. In arXiv preprint arXiv:1705.05343","author":"Jiang Changkun","year":"2017","unstructured":"Changkun Jiang , Lin Gao , Lingjie Duan , and Jianwei Huang . Scalable Mobile Crowdsensing via Peer-to-Peer Data Sharing. In arXiv preprint arXiv:1705.05343 , 2017 . Changkun Jiang, Lin Gao, Lingjie Duan, and Jianwei Huang. Scalable Mobile Crowdsensing via Peer-to-Peer Data Sharing. In arXiv preprint arXiv:1705.05343, 2017."},{"key":"e_1_3_2_1_18_1","volume":"201","author":"Le Anh","unstructured":"Anh Le and Athina Markopoulou . Cooperative defense against pollution attacks in network coding using spacemac. In JSAC , 201 2. Anh Le and Athina Markopoulou. Cooperative defense against pollution attacks in network coding using spacemac. In JSAC, 2012.","journal-title":"JSAC"},{"key":"e_1_3_2_1_19_1","volume-title":"NIPS","author":"Li Bo","year":"2016","unstructured":"Bo Li , Yining Wang , Aarti Singh , and Yevgeniy Vorobeychik . Data Poisoning Attacks on Factorization-Based Collaborative Filtering . In NIPS , 2016 . Bo Li, Yining Wang, Aarti Singh, and Yevgeniy Vorobeychik. Data Poisoning Attacks on Factorization-Based Collaborative Filtering. In NIPS, 2016."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.73"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735496.2735505"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610509"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897350.2897352"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2559481"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057033"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809719"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186032"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2714668"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.041913.120516"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2091277"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2316816"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2014.40"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906420"},{"key":"e_1_3_2_1_35_1","volume-title":"Usenix Security","author":"Wang Gang","year":"2014","unstructured":"Gang Wang , Tianyi Wang , Haitao Zheng , and Ben Y Zhao . Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers .. In Usenix Security , 2014 . Gang Wang, Tianyi Wang, Haitao Zheng, and Ben Y Zhao. Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers.. In Usenix Security, 2014."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737095.2737114"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2014.19"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2398446"},{"key":"e_1_3_2_1_39_1","volume-title":"ICML","author":"Xiao Huang","year":"2015","unstructured":"Huang Xiao , Battista Biggio , Gavin Brown , Giorgio Fumera , Claudia Eckert , and Fabio Roli . Is feature selection secure against training data poisoning? . In ICML , 2015 . Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, and Fabio Roli. Is feature selection secure against training data poisoning?. In ICML, 2015."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348567"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2421897"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2676898"},{"key":"e_1_3_2_1_43_1","volume":"201","author":"Zhang Kuan","unstructured":"Kuan Zhang , Xiaohui Liang , Rongxing Lu , and Xuemin Shen . Sybil attacks and their defenses in the internet of things. In IEEE Internet of Things Journal , 201 4. Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin Shen. Sybil attacks and their defenses in the internet of things. In IEEE Internet of Things Journal, 2014.","journal-title":"Things Journal"},{"key":"e_1_3_2_1_44_1","volume-title":"GLOBECOM","author":"Zhang Mengyuan","year":"2016","unstructured":"Mengyuan Zhang , Lei Yang , Xiaowen Gong , and Junshan Zhang . Privacy-Preserving Crowdsensing : Privacy Valuation, Network Effect, and Profit Maximization . In GLOBECOM , 2016 . Mengyuan Zhang, Lei Yang, Xiaowen Gong, and Junshan Zhang. Privacy-Preserving Crowdsensing: Privacy Valuation, Network Effect, and Profit Maximization. In GLOBECOM, 2016."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567059"}],"event":{"name":"Mobihoc '18: The Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing","location":"Los Angeles CA USA","acronym":"Mobihoc '18","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209582.3209594","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209582.3209594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:02:49Z","timestamp":1750215769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209582.3209594"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,26]]},"references-count":45,"alternative-id":["10.1145\/3209582.3209594","10.1145\/3209582"],"URL":"https:\/\/doi.org\/10.1145\/3209582.3209594","relation":{},"subject":[],"published":{"date-parts":[[2018,6,26]]},"assertion":[{"value":"2018-06-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}