{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T11:08:08Z","timestamp":1770462488370,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Didi Collaborative Research Program","award":["N\/A"],"award-info":[{"award-number":["N\/A"]}]},{"name":"WeBank Scholars Program","award":["N\/A"],"award-info":[{"award-number":["N\/A"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018AAA0101100"],"award-info":[{"award-number":["2018AAA0101100"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"State Key Laboratory of Software Development Environment Open Funding","award":["SKLSDE-2020ZX-07"],"award-info":[{"award-number":["SKLSDE-2020ZX-07"]}]},{"name":"Lee Kong Chian Fellowship","award":["N\/A"],"award-info":[{"award-number":["N\/A"]}]},{"name":"National Science Foundation of China (NSFC)","award":["U21A20516, U1811463, 62076017"],"award-info":[{"award-number":["U21A20516, U1811463, 62076017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3539047","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:12Z","timestamp":1660331172000},"page":"4079-4089","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Fed-LTD: Towards Cross-Platform Ride Hailing via Federated Learning to Dispatch"],"prefix":"10.1145","author":[{"given":"Yansheng","family":"Wang","sequence":"first","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Yongxin","family":"Tong","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Zimu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Ziyao","family":"Ren","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Yi","family":"Xu","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Guobin","family":"Wu","sequence":"additional","affiliation":[{"name":"Didichuxing Inc., Beijing, China"}]},{"given":"Weifeng","family":"Lv","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Konstantinos Chatzikokolakis, and Catuscia Palamidessi.","author":"Andr\u00e9s Miguel E.","year":"2013","unstructured":"Miguel E. Andr\u00e9s, Nicol\u00e1s Emilio Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2013. Geo-indistinguishability: differential privacy for location-based systems. In CCS. 901--914."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Kallista A. Bonawitz Vladimir Ivanov Ben Kreuter Antonio Marcedone H. Brendan McMahan Sarvar Patel Daniel Ramage Aaron Segal and Karn Seth. 2017. Practical Secure Aggregation for Privacy-Preserving Machine Learning. In CCS. ACM 1175--1191.","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Rainer E. Burkard Mauro Dell'Amico and Silvano Martello. 2009. Assignment Problems .SIAM .","DOI":"10.1137\/1.9780898717754"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Mayur Datar Nicole Immorlica Piotr Indyk et al. 2004. Locality-sensitive hashing scheme based on p-stable distributions. In SCG. 253--262.","DOI":"10.1145\/997817.997857"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork. 2006. Differential Privacy. In ICALP. 1--12.","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Piotr Indyk and Rajeev Motwani. 1998. Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality. In STOC. 604--613.","DOI":"10.1145\/276698.276876"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Leyla Kazemi and Cyrus Shahabi. 2012. GeoCrowd: enabling query answering with spatial crowdsourcing. In SIGSPATIAL. 189--198.","DOI":"10.1145\/2424321.2424346"},{"key":"e_1_3_2_2_9_1","first-page":"1","article-title":"Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima","volume":"5888","author":"Kolesnikov Vladimir","year":"2009","unstructured":"Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. 2009. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In CANS, Vol. 5888. 1--20.","journal-title":"CANS"},{"key":"e_1_3_2_2_10_1","volume-title":"Federated Learning: Strategies for Improving Communication Efficiency. CoRR","author":"Konecn\u00fd Jakub","year":"2016","unstructured":"Jakub Konecn\u00fd, H. Brendan McMahan, Felix X. Yu, et al. 2016. Federated Learning: Strategies for Improving Communication Efficiency. CoRR, Vol. abs\/1610.05492 (2016)."},{"key":"e_1_3_2_2_11_1","volume-title":"The Hungarian method for the assignment problem. Naval research logistics quarterly","author":"Kuhn Harold W","year":"1955","unstructured":"Harold W Kuhn. 1955. The Hungarian method for the assignment problem. Naval research logistics quarterly, Vol. 2, 1--2 (1955), 83--97."},{"key":"e_1_3_2_2_12_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Ag\u00fc era y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In AISTATS. 1273--1282."},{"key":"e_1_3_2_2_13_1","volume-title":"Barto","author":"Sutton Richard S.","year":"1998","unstructured":"Richard S. Sutton and Andrew G. Barto. 1998. Reinforcement learning - an introduction .MIT Press."},{"key":"e_1_3_2_2_14_1","unstructured":"Xiaocheng Tang Zhiwei (Tony) Qin Fan Zhang Zhaodong Wang Zhe Xu Yintai Ma Hongtu Zhu and Jieping Ye. 2019. A Deep Value-network Based Approach for Multi-Driver Order Dispatching. In SIGKDD. 1780--1790."},{"key":"e_1_3_2_2_15_1","unstructured":"Xiaocheng Tang Fan Zhang Zhiwei (Tony) Qin Yansheng Wang Dingyuan Shi Bingchen Song Yongxin Tong Hongtu Zhu and Jieping Ye. 2021. Value Function is All You Need: A Unified Learning Framework for Ride Hailing Platforms. In SIGKDD. 3605--3615."},{"key":"e_1_3_2_2_16_1","volume-title":"Spatial Crowdsourcing: A Tree-based Approach. In ICDE. 517--528.","author":"Tao Qian","year":"2020","unstructured":"Qian Tao, Yongxin Tong, Zimu Zhou, et al. 2020. Differentially Private Online Task Assignment in Spatial Crowdsourcing: A Tree-based Approach. In ICDE. 517--528."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Hien To Cyrus Shahabi and Li Xiong. 2018. Privacy-Preserving Online Task Assignment in Spatial Crowdsourcing with Untrusted Server. In ICDE. 833--844.","DOI":"10.1109\/ICDE.2018.00080"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994523"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"Yongxin Tong Jieying She Bolin Ding Libin Wang and Lei Chen. 2016b. Online mobile Micro-Task Allocation in spatial crowdsourcing. In ICDE. 49--60.","DOI":"10.1109\/ICDE.2016.7498228"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3127077"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137643"},{"key":"e_1_3_2_2_22_1","first-page":"2295","article-title":"Two-Sided Online Micro-Task Assignment in Spatial Crowdsourcing","volume":"33","author":"Tong Yongxin","year":"2021","unstructured":"Yongxin Tong, Yuxiang Zeng, Bolin Ding, et al. 2021. Two-Sided Online Micro-Task Assignment in Spatial Crowdsourcing. IEEE Trans. Knowl. Data Eng., Vol. 33, 5 (2021), 2295--2309.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-019-00568-7"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Yansheng Wang Yongxin Tong Cheng Long Pan Xu Ke Xu and Weifeng Lv. 2019. Adaptive Dynamic Bipartite Graph Matching: A Reinforcement Learning Approach. In ICDE. 1478--1489.","DOI":"10.1109\/ICDE.2019.00133"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Yansheng Wang Yongxin Tong and Dingyuan Shi. 2020. Federated Latent Dirichlet Allocation: A Local Differential Privacy Based Framework. In AAAI. 6283--6290.","DOI":"10.1609\/aaai.v34i04.6096"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Yansheng Wang Yongxin Tong Dingyuan Shi and Ke Xu. 2021. An Efficient Approach for Cross-Silo Federated Learning to Rank. In ICDE. 1128--1139.","DOI":"10.1109\/ICDE51399.2021.00102"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Pan Xu Yexuan Shi Hao Cheng et al. 2019. A Unified Approach to Online Matching with Conflict-Aware Constraints. In AAAI. 2221--2228.","DOI":"10.1609\/aaai.v33i01.33012221"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Zhe Xu Zhixin Li Qingwen Guan Dingshui Zhang Qiang Li Junxiao Nan Chunyang Liu Wei Bian and Jieping Ye. 2018. Large-Scale Order Dispatch in On-Demand Ride-Hailing Platforms: A Learning and Planning Approach. In SIGKDD. 905--913.","DOI":"10.1145\/3219819.3219824"},{"key":"e_1_3_2_2_29_1","article-title":"Federated Machine Learning","volume":"10","author":"Yang Qiang","year":"2019","unstructured":"Qiang Yang, Yang Liu, Tianjian Chen, and Yongxin Tong. 2019. Federated Machine Learning: Concept and Applications. ACM Trans. Intell. Syst. Technol., Vol. 10, 2 (2019), 12:1--12:19.","journal-title":"Concept and Applications. ACM Trans. Intell. Syst. Technol."}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Washington DC USA","acronym":"KDD '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539047","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:50Z","timestamp":1750183790000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539047"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":29,"alternative-id":["10.1145\/3534678.3539047","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3539047","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}