{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:13:25Z","timestamp":1755998005700,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072344, 62172303, 62132009, and U20A20177"],"award-info":[{"award-number":["62072344, 62172303, 62132009, and U20A20177"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1145\/3492866.3549715","type":"proceedings-article","created":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T16:34:33Z","timestamp":1663778073000},"page":"211-220","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Online incentive mechanism for task offloading with privacy-preserving in UAV-assisted mobile edge computing"],"prefix":"10.1145","author":[{"given":"Ruiting","family":"Zhou","sequence":"first","affiliation":[{"name":"Wuhan University"}]},{"given":"Renli","family":"Zhang","sequence":"additional","affiliation":[{"name":"Wuhan University"}]},{"given":"Yufeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Wuhan University"}]},{"given":"Haisheng","family":"Tan","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China"}]},{"given":"Kun","family":"He","sequence":"additional","affiliation":[{"name":"Wuhan University"}]}],"member":"320","published-online":{"date-parts":[[2022,10,3]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2934027"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098056"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigCom53800.2021.00004"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155397"},{"key":"e_1_3_2_2_6_1","unstructured":"DJI. 2021. emergency-response. https:\/\/enterprise.dji.com\/cn\/public-safety"},{"key":"e_1_3_2_2_7_1","unstructured":"DJI. 2022. DJI Mavic 2 Pro. www.dji.com\/cn\/mavic-2-enterprise-advanced"},{"key":"e_1_3_2_2_8_1","volume-title":"Vasilakos","author":"Feng Zhenni","year":"2014","unstructured":"Zhenni Feng, Yanmin Zhu, Qian Zhang, Lionel M. Ni, and Athanasios V. Vasilakos. 2014. TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In Proc. of INFOCOM. IEEE."},{"key":"e_1_3_2_2_9_1","volume-title":"Calder\u00f3n","author":"Jaimes Luis Gabriel","year":"2020","unstructured":"Luis Gabriel Jaimes and Juan M. Calder\u00f3n. 2020. An UAV-based incentive mechanism for Crowdsensing with budget constraints. In Proc. of CCNC. IEEE."},{"key":"e_1_3_2_2_10_1","unstructured":"Jon Kleinberg and Eva Tardos. 2006. Algorithm design. Pearson Education India."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3045509"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3056341"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00095"},{"volume-title":"Introduction to linear and nonlinear programming","author":"Luenberger David G.","key":"e_1_3_2_2_14_1","unstructured":"David G. Luenberger. 1984. Introduction to linear and nonlinear programming. Addison-Wesley Reading."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2633248"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/moor.6.1.58"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3041345"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2018.2879591"},{"key":"e_1_3_2_2_19_1","unstructured":"Global Times. 2021. Chinese drones provide lifeline network services for flood-stranded residents. https:\/\/www.globaltimes.cn\/page\/202107\/1229363.shtml"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3110299"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737608"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2926279"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.3390\/rs13234853"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030080"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3025910"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3088655"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2993260"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2999063"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3088669"},{"key":"e_1_3_2_2_30_1","unstructured":"Ruiting Zhou. 2022. Technical Report. www.jianguoyun.com\/p\/DXG6g-cQ46PsCRj26rAE"}],"event":{"name":"MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Seoul Republic of Korea","acronym":"MobiHoc '22"},"container-title":["Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492866.3549715","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3492866.3549715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:27Z","timestamp":1750193307000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492866.3549715"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":30,"alternative-id":["10.1145\/3492866.3549715","10.1145\/3492866"],"URL":"https:\/\/doi.org\/10.1145\/3492866.3549715","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]},"assertion":[{"value":"2022-10-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}