{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:41Z","timestamp":1773510941971,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012659","name":"Foundation for Innovative Research Groups of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802051, 61772121, 61728102, 61972094 and 61472065"],"award-info":[{"award-number":["61802051, 61772121, 61728102, 61972094 and 61472065"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangxi Key Laboratory of Cryptography and Information Security","award":["CIS201804"],"award-info":[{"award-number":["CIS201804"]}]},{"name":"Peng Cheng Laboratory Project of Guangdong Province","award":["PCL2018KP004"],"award-info":[{"award-number":["PCL2018KP004"]}]},{"name":"National Key R&D Program of China","award":["2017YFB0802300 and 2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802300 and 2017YFB0802000"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384720","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"178-192","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems"],"prefix":"10.1145","author":[{"given":"Guowen","family":"Xu","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Hongwei","family":"Li","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Shengmin","family":"Xu","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Hao","family":"Ren","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Yinghui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Jianfei","family":"Sun","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Annual Cryptology Conference. Springer, 649--666","author":"Abe M."},{"key":"e_1_3_2_2_2_1","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 533--556","author":"Boneh D."},{"key":"e_1_3_2_2_3_1","volume-title":"Annual Cryptology Conference. Springer, 361--379","author":"Boneh D."},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of IEEE ICDCS. 589--599","author":"Cai C."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44586-2_9"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"e_1_3_2_2_7_1","volume-title":"Differential privacy. Encyclopedia of Cryptography and Security","author":"Dwork Cynthia","year":"2011"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"M. Elhamshary M. Alzantot and M. Youssef. 2018. JustWalk: A Crowdsourcing Approach for the Automatic Construction of Indoor Floorplans. IEEE Transactions on Mobile Computing (2018).  M. Elhamshary M. Alzantot and M. Youssef. 2018. JustWalk: A Crowdsourcing Approach for the Automatic Construction of Indoor Floorplans. IEEE Transactions on Mobile Computing (2018).","DOI":"10.1109\/TMC.2018.2874251"},{"key":"e_1_3_2_2_9_1","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1304--1316","author":"Fiore D."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1600468"},{"key":"e_1_3_2_2_11_1","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 415--432","author":"Groth J."},{"key":"e_1_3_2_2_12_1","volume-title":"Electronic Communications in Probability","volume":"17","author":"Hsu D.","year":"2012"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2840098"},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the ESORICS. Springer, 152--171","author":"Keuffer J."},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of ACM SIGMOD. 1187--1198","author":"Li Q."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897350.2897352"},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of ACM SIGKDD. ACM, 1705--1714","author":"Li Y."},{"key":"e_1_3_2_2_18_1","unstructured":"Y. Li H. Xiao Z. Qin C. Miao L. Su J. Gao K. Ren and B. Ding. 2018b. Towards Differentially Private Truth Discovery for Crowd Sensing Systems. arXiv preprint arXiv:1810.04760 (2018).  Y. Li H. Xiao Z. Qin C. Miao L. Su J. Gao K. Ren and B. Ding. 2018b. Towards Differentially Private Truth Discovery for Crowd Sensing Systems. arXiv preprint arXiv:1810.04760 (2018)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1967.10482885"},{"key":"e_1_3_2_2_20_1","first-page":"94","article-title":"Mechanism Design via Differential Privacy","volume":"7","author":"McSherry F.","year":"2007","journal-title":"Proceedings of the FOCS"},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the ACM SenSys. ACM, 183--196","author":"Miao C."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311747"},{"key":"e_1_3_2_2_23_1","volume-title":"Proceedings of IEEE INFOCOM. IEEE, 1--9.","author":"Miao C."},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the IEEE Security and Privacy. 238--252","author":"Parno B."},{"key":"e_1_3_2_2_25_1","volume-title":"Theory of Cryptography Conference. Springer, 422--439","author":"Parno B."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700374"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2705628"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the IEEE INFOCOM. 1988--1996","author":"Tang X."},{"key":"e_1_3_2_2_29_1","volume-title":"Jian Weng, and Jianfeng Ma.","author":"Wang Xu An","year":"2019"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2868162"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2895834"},{"key":"e_1_3_2_2_32_1","volume-title":"Proceedings of ACM CCS. 2312--2314","author":"Xu G."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.014"},{"key":"e_1_3_2_2_34_1","unstructured":"L. Zhao and L. Chen. 2018. Sparse Matrix Masking-based Non-Interactive Verifiable (Outsourced) Computation Revisited. IEEE Transactions on Dependable and Secure Computing (2018).  L. Zhao and L. Chen. 2018. Sparse Matrix Masking-based Non-Interactive Verifiable (Outsourced) Computation Revisited. IEEE Transactions on Dependable and Secure Computing (2018)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819134"},{"key":"e_1_3_2_2_36_1","unstructured":"Y. Zheng H. Duan X. Yuan and C. Wang. 2017. Privacy-aware and efficient mobile crowdsensing with truth discovery. IEEE Transactions on Dependable and Secure Computing (2017).  Y. Zheng H. Duan X. Yuan and C. Wang. 2017. Privacy-aware and efficient mobile crowdsensing with truth discovery. IEEE Transactions on Dependable and Secure Computing (2017)."}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"ASIA CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384720","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:27Z","timestamp":1750200087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384720"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":36,"alternative-id":["10.1145\/3320269.3384720","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384720","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}