{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T10:26:37Z","timestamp":1757586397197,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T00:00:00Z","timestamp":1560470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T00:00:00Z","timestamp":1560470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Information Technology Research Center","award":["IITP-2018-2018-0-01799"],"award-info":[{"award-number":["IITP-2018-2018-0-01799"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1479-0","type":"journal-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T08:02:52Z","timestamp":1560499372000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A new differential privacy preserving crowdsensing scheme based on the Owen value"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1967-151X","authenticated-orcid":false,"given":"Sungwook","family":"Kim","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,14]]},"reference":[{"key":"1479_CR1","doi-asserted-by":"publisher","first-page":"20383","DOI":"10.1109\/ACCESS.2017.2751304","volume":"5","author":"Z Duan","year":"2017","unstructured":"Z. Duan, L. Tian, M. Yan, Z. Cai, Q. Han, G. Yin, Practical incentive mechanisms for IoT-based mobile crowdsensing systems. IEEE Access 5, 20383\u201320392 (2017)","journal-title":"IEEE Access"},{"key":"1479_CR2","first-page":"1","volume-title":"IEEE GLOBECOM\u20192016","author":"C Fiandrino","year":"2016","unstructured":"C. Fiandrino, B. Kantarci, F. Anjomshoa, D. Kliazovich, P. Bouvry, J. Matthews, in IEEE GLOBECOM\u20192016. Sociability-driven user recruitment in mobile crowdsensing internet of things platforms (2016), pp. 1\u20136"},{"issue":"2","key":"1479_CR3","doi-asserted-by":"publisher","first-page":"153","DOI":"10.5626\/JCSE.2010.4.2.153","volume":"4","author":"KS Kim","year":"2010","unstructured":"K.S. Kim, S. Uno, M.W. Kim, Adaptive QoS mechanism for wireless mobile network. JCSE 4(2), 153\u2013172 (2010)","journal-title":"JCSE"},{"issue":"4","key":"1479_CR4","doi-asserted-by":"publisher","first-page":"231","DOI":"10.5626\/JCSE.2013.7.4.231","volume":"7","author":"I Jang","year":"2013","unstructured":"I. Jang, D. Pyeon, S. Kim, H. Yoon, A survey on communication protocols for wireless sensor networks. JCSE 7(4), 231\u2013241 (2013)","journal-title":"JCSE"},{"key":"1479_CR5","first-page":"232","volume-title":"IEEE ICIN\u20192017","author":"L Atzori","year":"2017","unstructured":"L. Atzori, R. Girau, S. Martis, V. Pilloni, M. Uras, in IEEE ICIN\u20192017. A SIoT-aware approach to the resource management issue in mobile crowdsensing (2017), pp. 232\u2013237"},{"key":"1479_CR6","first-page":"1","volume-title":"IEEE GLOBECOM\u20192016","author":"M Pouryazdan","year":"2016","unstructured":"M. Pouryazdan, C. Fiandrino, B. Kantarci, D. Kliazovich, T. Soyata, P. Bouvry, in IEEE GLOBECOM\u20192016. Game-theoretic recruitment of sensing service providers for trustworthy cloud-centric internet-of-things (IoT) applications (2016), pp. 1\u20136"},{"key":"1479_CR7","first-page":"1","volume-title":"IEEE ICCCN\u20192016","author":"J Liu","year":"2016","unstructured":"J. Liu, H. Shen, X. Zhang, in IEEE ICCCN\u20192016. A survey of mobile crowdsensing techniques: A critical component for the internet of things (2016), pp. 1\u20136"},{"issue":"3","key":"1479_CR8","doi-asserted-by":"publisher","first-page":"119","DOI":"10.5626\/JCSE.2015.9.3.119","volume":"9","author":"Y Liu","year":"2015","unstructured":"Y. Liu, Y. Sun, J. Ryoo, S. Rizvi, A.V. Vasilakos, A survey of security and privacy challenges in cloud computing: solutions and future directions. JCSE 9(3), 119\u2013133 (2015)","journal-title":"JCSE"},{"issue":"3","key":"1479_CR9","doi-asserted-by":"publisher","first-page":"187","DOI":"10.5626\/JCSE.2013.7.3.187","volume":"7","author":"T Kang","year":"2013","unstructured":"T. Kang, X. Li, C. Yu, J. Kim, A survey of security mechanisms with direct sequence spread spectrum signals. JCSE 7(3), 187\u2013197 (2013)","journal-title":"JCSE"},{"issue":"3","key":"1479_CR10","first-page":"167","volume":"5","author":"A Gkoulalas-Divanis","year":"2011","unstructured":"A. Gkoulalas-Divanis, K. Liu, V.S. Verykios, R. Wolff, Preface for the special issue on privacy-aspects of data mining. JCSE 5(3), 167\u2013168 (2011)","journal-title":"JCSE"},{"key":"1479_CR11","first-page":"1257","volume-title":"IEEE ICDM\u20192016","author":"L Wang","year":"2016","unstructured":"L. Wang, D. Zhang, D. Yang, B.Y. Lim, X. Ma, in IEEE ICDM\u20192016. Differential location privacy for sparse mobile crowdsensing (2016), pp. 1257\u20131262"},{"key":"1479_CR12","first-page":"1","volume-title":"IEEE SCCC\u20192015","author":"S Blasco","year":"2015","unstructured":"S. Blasco, J. Bustos-Jimenez, G. Font, A. Hevia, M. Grazia Prato, in IEEE SCCC\u20192015. A three-layer approach for protecting smart-citizens privacy in crowdsensing projects (2015), pp. 1\u20135"},{"key":"1479_CR13","first-page":"11","volume-title":"IEEE ICDCS\u20192015","author":"J Hamm","year":"2015","unstructured":"J. Hamm, A.C. Champion, G. Chen, M. Belkin, D. Xuan, in IEEE ICDCS\u20192015. Crowd-ML: a privacy-preserving learning framework for a crowd of smart devices (2015), pp. 11\u201320"},{"issue":"3","key":"1479_CR14","doi-asserted-by":"publisher","first-page":"177","DOI":"10.5626\/JCSE.2013.7.3.177","volume":"7","author":"HH Nguyen","year":"2013","unstructured":"H.H. Nguyen, J. Kim, Y. Kim, Differential privacy in practice. JCSE 7(3), 177\u2013186 (2013)","journal-title":"JCSE"},{"key":"1479_CR15","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-6050-2","volume-title":"Game theory applications in network design","author":"S Kim","year":"2014","unstructured":"S. Kim, Game theory applications in network design (IGI Global, Hershey, 2014)"},{"issue":"4","key":"1479_CR16","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.orl.2016.05.003","volume":"44","author":"S Lorenzo-Freire","year":"2016","unstructured":"S. Lorenzo-Freire, On new characterizations of the Owen value. Oper. Res. Lett. 44(4), 491\u2013494 (2016)","journal-title":"Oper. Res. Lett."},{"key":"1479_CR17","first-page":"145","volume-title":"IEEE CNS\u20192016","author":"J Lin","year":"2016","unstructured":"J. Lin, D. Yang, M. Li, J. Xu, G. Xue, in IEEE CNS\u20192016. BidGuard: a framework for privacy-preserving crowdsensing incentive mechanisms (2016), pp. 145\u2013153"},{"issue":"6","key":"1479_CR18","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/MCOM.2017.1600737","volume":"55","author":"MA Alsheikh","year":"2017","unstructured":"M.A. Alsheikh, Y. Jiao, D. Niyato, P. Wang, D. Leong, Z. Han, The accuracy-privacy trade-off of mobile crowdsensing. IEEE Commun. Mag. 55(6), 132\u2013139 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"1479_CR19","first-page":"990","volume-title":"IEEE Trustcom\/BigDataSE\/ICESS\u20192017","author":"R Ma","year":"2017","unstructured":"R. Ma, J. Xiong, M. Lin, Z. Yao, H. Lin, A. Ye, in IEEE Trustcom\/BigDataSE\/ICESS\u20192017. Privacy protection-oriented mobile crowdsensing analysis based on game theory (2017), pp. 990\u2013995"},{"issue":"4","key":"1479_CR20","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/TIFS.2016.2632069","volume":"12","author":"Y Sei","year":"2017","unstructured":"Y. Sei, A. Ohsuga, Differential private data collection and analysis based on randomized multiple dummies for untrusted mobile crowdsensing. IEEE Trans. Inf. Forensics Secur. 12(4), 926\u2013939 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1479_CR21","first-page":"260","volume-title":"IEEE NaNA\u20192016","author":"H Liu","year":"2016","unstructured":"H. Liu, Z. Wu, L. Zhang, in IEEE NaNA\u20192016. A differential privacy incentive compatible mechanism and equilibrium analysis (2016), pp. 260\u2013266"},{"key":"1479_CR22","first-page":"1313","volume-title":"IEEE CCTA\u20192017","author":"J Giraldo","year":"2017","unstructured":"J. Giraldo, A. Cardenas, M. Kantarcioglu, in IEEE CCTA\u20192017. Security and privacy trade-offs in CPS by leveraging inherent differential privacy (2017), pp. 1313\u20131318"},{"issue":"6","key":"1479_CR23","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1109\/TMM.2016.2537216","volume":"18","author":"P Zhou","year":"2016","unstructured":"P. Zhou, Y. Zhou, D. Wu, H. Jin, Differentially private online learning for cloud-based video recommendation with multimedia big data in social networks. IEEE Trans. Multimedia 18(6), 1217\u20131229 (2016)","journal-title":"IEEE Trans. Multimedia"},{"issue":"1","key":"1479_CR24","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"C. Dwork, A firm foundation for private data analysis. Commun. ACM 54(1), 86\u201395 (2011)","journal-title":"Commun. ACM"},{"key":"1479_CR25","first-page":"1","volume":"2014","author":"C-G E","year":"2014","unstructured":"C.-G. E, Q.-L. Li, S.-Y. Li, The Owen value of stochastic cooperative game. Sci. World J. 2014, 1\u20137 (2014)","journal-title":"Sci. World J."},{"key":"1479_CR26","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/S0899-8256(03)00043-5","volume":"44","author":"J Vidal-Puga","year":"2003","unstructured":"J. Vidal-Puga, G. Berganti\u00f1os, An implementation of the Owen value. Games Econom. Behav. 44, 412\u2013427 (2003)","journal-title":"Games Econom. Behav."},{"issue":"2","key":"1479_CR27","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1109\/TFUZZ.2015.2459761","volume":"24","author":"MG Fiestras-Janeiro","year":"2016","unstructured":"M.G. Fiestras-Janeiro, J.M. Gallardo, A. Jim\u00e9nez-Losada, M.A. Mosquera, Cooperative games and coalition cohesion indices: the Choquet\u2013Owen value. IEEE Trans. Fuzzy Syst. 24(2), 444\u2013455 (2016)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"1479_CR28","first-page":"4357","volume-title":"IEEE International Conference on Communications","author":"D Niyato","year":"2006","unstructured":"D. Niyato, E. Hossain, in IEEE International Conference on Communications. A cooperative game framework for bandwidth allocation in 4G heterogeneous wireless networks (2006), pp. 4357\u20134362"},{"key":"1479_CR29","first-page":"712","volume":"2","author":"M Dianati","year":"2005","unstructured":"M. Dianati, X. Shen, S. Naik, A new fairness index for radio resource allocation in wireless networks. IEEE WCNC 2, 712\u2013715 (2005)","journal-title":"IEEE WCNC"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1479-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1479-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1479-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T23:09:00Z","timestamp":1592003340000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1479-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,14]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1479"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1479-0","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,6,14]]},"assertion":[{"value":"27 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author declares that he has no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"158"}}