{"id":"https://openalex.org/W7125065910","doi":"https://doi.org/10.1109/cloudcom67567.2025.11331386","title":"Combinatorial Multi-Armed Bandit-based Incentives in Privacy-Preserving Federated Crowdsourcing","display_name":"Combinatorial Multi-Armed Bandit-based Incentives in Privacy-Preserving Federated Crowdsourcing","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W7125065910","doi":"https://doi.org/10.1109/cloudcom67567.2025.11331386"},"language":null,"primary_location":{"id":"doi:10.1109/cloudcom67567.2025.11331386","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudcom67567.2025.11331386","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chenchen Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenchen Lin","raw_affiliation_strings":["School of Artificial Intelligence, Sun Yat-sen University,Zhuhai,China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Sun Yat-sen University,Zhuhai,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123445098","display_name":"Wenhao Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Wenhao Yuan","raw_affiliation_strings":["The University of Hong Kong,Department of Electrical and Electronic Engineering,Hong Kong,China"],"affiliations":[{"raw_affiliation_string":"The University of Hong Kong,Department of Electrical and Electronic Engineering,Hong Kong,China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123439378","display_name":"Xuehe Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuehe Wang","raw_affiliation_strings":["School of Artificial Intelligence, Sun Yat-sen University,Zhuhai,China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Sun Yat-sen University,Zhuhai,China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74713016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9628999829292297,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9628999829292297,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.015200000256299973,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.004000000189989805,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/crowdsourcing","display_name":"Crowdsourcing","score":0.9146999716758728},{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.786300003528595},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.7347000241279602},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6326000094413757},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5361999869346619},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4884999990463257},{"id":"https://openalex.org/keywords/mechanism-design","display_name":"Mechanism design","score":0.4528000056743622},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.4205000102519989},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.39329999685287476}],"concepts":[{"id":"https://openalex.org/C62230096","wikidata":"https://www.wikidata.org/wiki/Q275969","display_name":"Crowdsourcing","level":2,"score":0.9146999716758728},{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.786300003528595},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7361000180244446},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.7347000241279602},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6326000094413757},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5361999869346619},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4884999990463257},{"id":"https://openalex.org/C153517567","wikidata":"https://www.wikidata.org/wiki/Q26090","display_name":"Mechanism design","level":2,"score":0.4528000056743622},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.4205000102519989},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4050999879837036},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.39329999685287476},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.3528999984264374},{"id":"https://openalex.org/C91810955","wikidata":"https://www.wikidata.org/wiki/Q7731670","display_name":"Incentive compatibility","level":3,"score":0.3513000011444092},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.3336000144481659},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3138999938964844},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3068999946117401},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.30649998784065247},{"id":"https://openalex.org/C8505890","wikidata":"https://www.wikidata.org/wiki/Q605095","display_name":"Budget constraint","level":2,"score":0.299699991941452},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.2946999967098236},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.2865000069141388},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.28189998865127563},{"id":"https://openalex.org/C22171661","wikidata":"https://www.wikidata.org/wiki/Q1074380","display_name":"Stochastic game","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.25839999318122864},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.25690001249313354},{"id":"https://openalex.org/C123650614","wikidata":"https://www.wikidata.org/wiki/Q282491","display_name":"Strategic dominance","level":2,"score":0.25220000743865967}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cloudcom67567.2025.11331386","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudcom67567.2025.11331386","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6683432282","display_name":null,"funder_award_id":"2024A1515010118","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G6893990029","display_name":null,"funder_award_id":"62206320","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W264589309","https://openalex.org/W2168405694","https://openalex.org/W2480082159","https://openalex.org/W2963248893","https://openalex.org/W2963699739","https://openalex.org/W3094561908","https://openalex.org/W3122462552","https://openalex.org/W3200400919","https://openalex.org/W4205228770","https://openalex.org/W4293336299","https://openalex.org/W4321608239","https://openalex.org/W4323022516","https://openalex.org/W4382239708","https://openalex.org/W4386858737","https://openalex.org/W4387609352","https://openalex.org/W4389633765","https://openalex.org/W4389664597","https://openalex.org/W4402352308","https://openalex.org/W4409325986","https://openalex.org/W4415428740"],"related_works":[],"abstract_inverted_index":{"Federated":[0],"Crowdsourcing":[1],"is":[2],"a":[3,88,110],"promising":[4],"and":[5,22,61,77,137],"efficient":[6],"computing":[7],"paradigm":[8],"for":[9,46],"solving":[10],"complex":[11],"tasks":[12],"on":[13,50,144],"mobile":[14],"edge":[15],"devices,":[16],"while":[17,81,118],"the":[18,23,51,70,94,98,119,131,134,138,148],"lack":[19],"of":[20,25,72,90,133,150],"incentive":[21,44,78],"risks":[24],"privacy":[26,60,111],"leakage":[27],"in":[28,105],"conventional":[29],"crowdsourcing":[30,48],"platforms":[31],"have":[32],"been":[33],"relatively":[34],"underexplored":[35],"so":[36],"far.":[37],"In":[38],"this":[39],"paper,":[40],"we":[41,129],"propose":[42],"an":[43,101],"mechanism":[45],"federated":[47],"based":[49],"Stackelberg":[52],"game":[53],"considering":[54],"<tex":[55],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[56],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\underline{\\rho}$</tex>":[57],"-zero-concentrated":[58],"differential":[59],"Combinatorial":[62],"Multi-Armed":[63],"Bandit":[64],"mechanism,":[65],"called":[66],"FedCMAB,":[67],"to":[68,92,113],"tackle":[69],"problem":[71],"quality":[73],"unknown":[74],"client":[75],"selection":[76],"strategy":[79,103],"design":[80],"preserving":[82],"participants'":[83],"confidential":[84],"information.":[85],"By":[86],"selecting":[87],"set":[89],"clients":[91],"maximize":[93,114],"overall":[95],"training":[96],"quality,":[97],"framework":[99],"determines":[100],"optimal":[102],"profile":[104],"which":[106],"each":[107],"participant":[108],"chooses":[109],"budget":[112],"their":[115],"individual":[116],"utility,":[117],"central":[120],"server":[121],"minimizes":[122],"its":[123],"cost":[124],"simultaneously.":[125],"Through":[126],"theoretical":[127],"analysis,":[128],"prove":[130],"existence":[132],"Stackelberg-Nash":[135],"Equilibrium":[136],"worst":[139],"regret.":[140],"The":[141],"experimental":[142],"results":[143],"different":[145],"datasets":[146],"validate":[147],"superiority":[149],"our":[151],"framework.":[152]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2026-01-21T00:00:00"}
