{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:37:58Z","timestamp":1759639078291,"version":"3.37.3"},"reference-count":78,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["30919011282","61702277","61772283","61672276","61872219","JCYJ20170413152804728","JCYJ20180507182508857"],"award-info":[{"award-number":["30919011282","61702277","61772283","61672276","61872219","JCYJ20170413152804728","JCYJ20180507182508857"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["30919011282","61702277","61772283","61672276","61872219","JCYJ20170413152804728","JCYJ20180507182508857"],"award-info":[{"award-number":["30919011282","61702277","61772283","61672276","61872219","JCYJ20170413152804728","JCYJ20180507182508857"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Basic Research","award":["30919011282","61702277","61772283","61672276","61872219","JCYJ20170413152804728","JCYJ20180507182508857"],"award-info":[{"award-number":["30919011282","61702277","61772283","61672276","61872219","JCYJ20170413152804728","JCYJ20180507182508857"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2021,1,28]]},"abstract":"<jats:p>With the ever-increasing popularity of mobile computing technology and the wide adoption of outsourcing strategy in labour-intensive industrial domains, mobile crowdsourcing has recently emerged as a promising resolution for solving complex computational tasks with quick response requirements. However, the complexity of a mobile crowdsourcing task makes it hard to pursue an optimal resolution with limited computing resources, as well as various task constraints. In this situation, deep learning has provided a promising way to pursue such an optimal resolution by training a set of optimal parameters. In the past decades, many researchers have devoted themselves to this hot topic and brought various cutting-edge resolutions. In view of this, we review the current research status of deep learning for mobile crowdsourcing from the perspectives of techniques, methods, and challenges. Finally, we list a group of remaining challenges that call for an intensive study in future research.<\/jats:p>","DOI":"10.1155\/2021\/6673094","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T17:05:22Z","timestamp":1611853522000},"page":"1-11","source":"Crossref","is-referenced-by-count":0,"title":["Deep Learning for Mobile Crowdsourcing Techniques, Methods, and Challenges: A Survey"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5041-8593","authenticated-orcid":true,"given":"Bingchen","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4996-804X","authenticated-orcid":true,"given":"Weiyi","family":"Zhong","sequence":"additional","affiliation":[{"name":"School of Computer Science, Qufu Normal University, Jining, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1455-607X","authenticated-orcid":true,"given":"Jushi","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Computer Science, Qufu Normal University, Jining, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8426-6903","authenticated-orcid":true,"given":"Lingzhen","family":"Kong","sequence":"additional","affiliation":[{"name":"School of Computer Science, Qufu Normal University, Jining, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3061-3460","authenticated-orcid":true,"given":"Yihong","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Qufu Normal University, Jining, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3496-177X","authenticated-orcid":true,"given":"Chuang","family":"Lin","sequence":"additional","affiliation":[{"name":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9301-5989","authenticated-orcid":true,"given":"Hao","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Norwegian University of Science and Technology, Trondheim, Norway"}]}],"member":"311","reference":[{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/TITS.2020.2983835"},{"author":"X. Du","first-page":"159","article-title":"Overview of deep learning","key":"2"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1016\/S2589-7500(19)30123-2"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/tnsm.2019.2899085"},{"issue":"1","key":"5","article-title":"An IoT-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing","volume":"2019","author":"X. Ma","year":"2019","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"1","key":"6","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/MWC.2019.1900027","article-title":"Deep learning for physical-layer 5G wireless techniques: opportunities, challenges and solutions","volume":"27","author":"H. Huang","year":"2019","journal-title":"IEEE Wireless Communications"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/mwc.2019.1800601"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/ACCESS.2018.2830661"},{"volume-title":"Deep Learning","year":"2016","author":"I. Goodfellow","key":"9"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/3065386"},{"year":"2014","author":"K. Simonyan","article-title":"Very deep convolutional networks for large-scale image recognition","key":"11"},{"key":"12","first-page":"4869","article-title":"Hyperbolic graph convolutional neural networks","volume":"32","author":"I. Chami","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"volume-title":"Mining Consuming Behaviors with Temporal Evolution for Personalized Recommendation in Mobile Marketing Apps","year":"2020","author":"H. Gao","key":"13"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1016\/j.enconman.2020.112766"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1287\/mksc.2019.1162"},{"issue":"2","key":"16","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/JIOT.2019.2954283","article-title":"Enhanced echo-state restricted Boltzmann machines for network traffic prediction","volume":"7","author":"X. Sun","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"author":"P. Vincent","first-page":"1096","article-title":"Extracting and composing robust features with denoising autoencoers","key":"17"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/taslp.2019.2938863"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1016\/j.neucom.2019.08.078"},{"issue":"6","key":"20","first-page":"1","article-title":"The rise of crowdsourcing","volume":"14","author":"J. Howe","year":"2006","journal-title":"Wired"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1007\/s00778-019-00568-7"},{"issue":"1","key":"22","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MS.2016.12","article-title":"Crowdsourcing in software engineering: models, motivations, and challenges","volume":"33","author":"T. D. LaToza","year":"2015","journal-title":"IEEE Software"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1002\/cpe.3789"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1109\/tcss.2019.2907059"},{"key":"25","article-title":"Task allocation model based on worker friend relationship for mobile crowdsourcing","volume":"921","author":"B. Zhao","year":"2019","journal-title":"Sensors"},{"year":"2020","author":"W. Shen","article-title":"Auxiliary-task based deep reinforcement learning for participant selection problem in mobile crowdsourcing","key":"26"},{"key":"27","first-page":"818","article-title":"Dynamic allocation for complex mobile crowdsourcing task with internal dependencies","author":"C. Yang","year":"2019","journal-title":"IEEE"},{"key":"28","article-title":"Quality-aware online task assignment in mobile crowdsourcing","volume":"1\u201321","author":"X. Miao","year":"2020","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1109\/tcss.2020.2967585"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1109\/TCSS.2020.2995760"},{"issue":"1","key":"31","first-page":"6","article-title":"The cloud-edge based dynamic reconfiguration to service workflow for mobile ecommerce environments: a QoS prediction perspective","volume":"21","author":"H. Gao","year":"2020","journal-title":"ACM Transactions on Internet Technology"},{"author":"Y. Wang","first-page":"1127","article-title":"Mobile crowdsourcing: architecture, applications, and challenges","key":"32"},{"author":"N. Thepvilojanapong","first-page":"2127","article-title":"Participation-aware incentive for active crowd sensing","key":"33"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1109\/mcom.2017.1600725cm"},{"doi-asserted-by":"publisher","key":"35","DOI":"10.1109\/jsac.2017.2680798"},{"doi-asserted-by":"publisher","key":"36","DOI":"10.1016\/j.comnet.2016.03.016"},{"doi-asserted-by":"publisher","key":"37","DOI":"10.14778\/2732951.2732966"},{"author":"Y. Wu","first-page":"1","article-title":"Photo crowdsourcing for area coverage in resource constrained environments","key":"38"},{"author":"L. Islam","first-page":"153","article-title":"Three-layered incentive framework for mobile crowdsourcing","key":"39"},{"doi-asserted-by":"publisher","key":"40","DOI":"10.1109\/jiot.2017.2765699"},{"author":"L. Kazemi","first-page":"189","article-title":"GeoCrows: enabling query answering with apstial crowdsourcing","key":"41"},{"doi-asserted-by":"publisher","key":"42","DOI":"10.1145\/3078853"},{"doi-asserted-by":"publisher","key":"43","DOI":"10.1016\/j.procs.2018.03.040"},{"doi-asserted-by":"publisher","key":"44","DOI":"10.1109\/TVT.2016.2611761"},{"doi-asserted-by":"publisher","key":"45","DOI":"10.1109\/TMC.2018.2861393"},{"doi-asserted-by":"publisher","key":"46","DOI":"10.1186\/s13673-019-0187-4"},{"doi-asserted-by":"publisher","key":"47","DOI":"10.1109\/TSC.2013.3"},{"doi-asserted-by":"publisher","key":"48","DOI":"10.1007\/s11036-018-1105-0"},{"author":"Y. Zhao","first-page":"13","article-title":"Predictive task assignment in spatial crowdsourcing: a data-driven approach","key":"49"},{"author":"A. Hamrouni","first-page":"198","article-title":"A photo-based mobile crowdsourcing framework for event reporting","key":"50"},{"key":"51","first-page":"84","article-title":"Personalizing universal recurrent neural network language model with user characteristic features by social network crowdsourcing","author":"B. Tseng","year":"2015","journal-title":"IEEE Workshop on Automatic Speech Recognition and Understanding"},{"author":"M. Toman","first-page":"2878","article-title":"Data requirements, selection and augmentation for DNN-based speech synthesis from crowdsourced data","key":"52"},{"doi-asserted-by":"publisher","key":"53","DOI":"10.3390\/s20143966"},{"author":"H. Trinh","first-page":"1","article-title":"Urban anomaly detection by processing mobile traffic traces with LSTM neural networks","key":"54"},{"doi-asserted-by":"publisher","key":"55","DOI":"10.1145\/2629592"},{"author":"K. Farkas","doi-asserted-by":"crossref","article-title":"Participatory sensing based real-time public transport information service","key":"56","DOI":"10.1109\/PerComW.2014.6815181"},{"author":"R. K. Rana","article-title":"Ear-phone: an end-to-end participatory urban noise mapping system","key":"57"},{"doi-asserted-by":"publisher","key":"58","DOI":"10.1145\/1924421.1924441"},{"doi-asserted-by":"publisher","key":"59","DOI":"10.1109\/ACCESS.2018.2885353"},{"doi-asserted-by":"publisher","key":"60","DOI":"10.1109\/jsac.2017.2679598"},{"doi-asserted-by":"publisher","key":"61","DOI":"10.1109\/jiot.2019.2921879"},{"doi-asserted-by":"publisher","key":"62","DOI":"10.1504\/ijhpcn.2015.066537"},{"issue":"3","key":"63","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.1007\/s11036-018-1105-0","article-title":"A deep learning spatiotemporal prediction framework for mobile crowdsourced services","volume":"24","author":"A. B. Said","year":"2019","journal-title":"Mobile Networks and Applications"},{"doi-asserted-by":"publisher","key":"64","DOI":"10.1109\/jiot.2018.2801559"},{"doi-asserted-by":"publisher","key":"65","DOI":"10.1109\/mcom.2015.7180511"},{"doi-asserted-by":"publisher","key":"66","DOI":"10.1109\/MCOM.2014.6710071"},{"doi-asserted-by":"publisher","key":"67","DOI":"10.1109\/mic.2012.70"},{"doi-asserted-by":"publisher","key":"68","DOI":"10.1109\/TNSE.2019.2892583"},{"doi-asserted-by":"publisher","key":"69","DOI":"10.1002\/dac.4099"},{"key":"70","article-title":"Respecting user privacy in mobile crowdsourcing","volume":"50","author":"Y. Wang","year":"2013","journal-title":"Science"},{"doi-asserted-by":"publisher","key":"71","DOI":"10.1016\/j.ins.2019.02.011"},{"doi-asserted-by":"publisher","key":"72","DOI":"10.1007\/s11276-018-1858-1"},{"doi-asserted-by":"publisher","key":"73","DOI":"10.1109\/ACCESS.2020.2998803"},{"key":"74","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1109\/ACCESS.2018.2885353","article-title":"A review of mobile crowdsourcing architectures and challenges: toward crowd-empowered Internet-of-Things","volume":"7","author":"J. Phuttharak","year":"2018","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","key":"75","DOI":"10.1145\/3291933"},{"doi-asserted-by":"publisher","key":"76","DOI":"10.1007\/s11263-019-01247-4"},{"doi-asserted-by":"publisher","key":"77","DOI":"10.1016\/j.compag.2018.02.016"},{"doi-asserted-by":"publisher","key":"78","DOI":"10.1002\/widm.1253"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/6673094.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/6673094.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/6673094.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T17:05:32Z","timestamp":1611853532000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2021\/6673094\/"}},"subtitle":[],"editor":[{"given":"Xiaoxian","family":"Yang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":78,"alternative-id":["6673094","6673094"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6673094","relation":{},"ISSN":["1875-905X","1574-017X"],"issn-type":[{"type":"electronic","value":"1875-905X"},{"type":"print","value":"1574-017X"}],"subject":[],"published":{"date-parts":[[2021,1,28]]}}}