{"id":"https://openalex.org/W4392158894","doi":"https://doi.org/10.1109/globecom54140.2023.10437797","title":"Differential Privacy-Based Incentive Scheme for App-Assisted Mobile Edge Crowdsensing","display_name":"Differential Privacy-Based Incentive Scheme for App-Assisted Mobile Edge Crowdsensing","publication_year":2023,"publication_date":"2023-12-04","ids":{"openalex":"https://openalex.org/W4392158894","doi":"https://doi.org/10.1109/globecom54140.2023.10437797"},"language":"en","primary_location":{"id":"doi:10.1109/globecom54140.2023.10437797","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom54140.2023.10437797","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059125353","display_name":"Liang Xie","orcid":"https://orcid.org/0000-0002-9335-5606"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liang Xie","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University,China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066407180","display_name":"Zhou Su","orcid":"https://orcid.org/0000-0002-6518-3130"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhou Su","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University,China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100692096","display_name":"Nan Chen","orcid":"https://orcid.org/0000-0003-4598-1466"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nan Chen","raw_affiliation_strings":["Tennessee Tech University,Department of Electrical and Computer Engineering,USA","Department of Electrical and Computer Engineering, Tennessee Tech University, USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech University,Department of Electrical and Computer Engineering,USA","institution_ids":["https://openalex.org/I63920570"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Tennessee Tech University, USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100665328","display_name":"Ruidong Li","orcid":"https://orcid.org/0000-0002-9905-8952"},"institutions":[{"id":"https://openalex.org/I10091056","display_name":"Kanazawa University","ror":"https://ror.org/02hwp6a56","country_code":"JP","type":"education","lineage":["https://openalex.org/I10091056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ruidong Li","raw_affiliation_strings":["Kanazawa University,Department of Electrical and Computer Engineering,Japan","Department of Electrical and Computer Engineering, Kanazawa University, Japan"],"affiliations":[{"raw_affiliation_string":"Kanazawa University,Department of Electrical and Computer Engineering,Japan","institution_ids":["https://openalex.org/I10091056"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Kanazawa University, Japan","institution_ids":["https://openalex.org/I10091056"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059125353"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.8317,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.82135623,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"5518","last_page":"5523"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11165","display_name":"Image and Video Quality Assessment","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/crowdsensing","display_name":"Crowdsensing","score":0.9270285367965698},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7512993812561035},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7024455070495605},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6112743020057678},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5950316190719604},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.5688090324401855},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.4741641581058502},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4259449541568756},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.41578373312950134},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38853079080581665},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3783675730228424},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15783217549324036},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14976388216018677},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.13972917199134827}],"concepts":[{"id":"https://openalex.org/C2780821482","wikidata":"https://www.wikidata.org/wiki/Q25381721","display_name":"Crowdsensing","level":2,"score":0.9270285367965698},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7512993812561035},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7024455070495605},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6112743020057678},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5950316190719604},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.5688090324401855},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.4741641581058502},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4259449541568756},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.41578373312950134},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38853079080581665},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3783675730228424},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15783217549324036},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14976388216018677},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.13972917199134827},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom54140.2023.10437797","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom54140.2023.10437797","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2772412867","https://openalex.org/W2911912007","https://openalex.org/W2919351369","https://openalex.org/W2919726825","https://openalex.org/W2924518378","https://openalex.org/W2974429275","https://openalex.org/W2989747298","https://openalex.org/W3007847126","https://openalex.org/W3033003550","https://openalex.org/W3035509990","https://openalex.org/W3080592791","https://openalex.org/W3127049675","https://openalex.org/W3127770455","https://openalex.org/W3134782699","https://openalex.org/W4366504184","https://openalex.org/W4381199094","https://openalex.org/W4385469325"],"related_works":["https://openalex.org/W2563347706","https://openalex.org/W2608033733","https://openalex.org/W3038283795","https://openalex.org/W2604501336","https://openalex.org/W2558166297","https://openalex.org/W2734500670","https://openalex.org/W2315671126","https://openalex.org/W2999136942","https://openalex.org/W4388010257","https://openalex.org/W4391095118"],"abstract_inverted_index":{"The":[0],"combination":[1],"of":[2,25,60,65,91,106,134,140,181,187],"applications":[3],"(Apps)":[4],"and":[5,45,62,84,112,167,183],"mobile":[6,51],"edge":[7,52],"crowdsensing":[8,53,86],"technology":[9],"has":[10],"been":[11],"viewed":[12],"as":[13,29],"a":[14,73,122,148],"promising":[15],"paradigm,":[16],"where":[17],"Apps":[18,61,116],"are":[19],"responsible":[20],"for":[21,79],"marking":[22],"the":[23,26,34,57,63,89,104,107,132,138,172,179,185],"location":[24],"sensing":[27,124,162],"task":[28],"point-of-interest":[30],"(PoI)":[31],"to":[32,56,81,102,130,155,158],"assist":[33],"platform":[35],"in":[36,145,161,177],"recruiting":[37],"users.":[38,92,135,188],"However,":[39],"there":[40],"still":[41],"exist":[42],"potential":[43],"incentive":[44,76,151],"privacy":[46,90,133,186],"threats":[47],"associated":[48],"with":[49,109],"App-assisted":[50],"(AMECS)":[54],"due":[55],"selfish":[58],"nature":[59],"vulnerability":[64],"wireless":[66],"communication.":[67],"To":[68],"this":[69],"end,":[70],"we":[71,94],"propose":[72,96],"differential":[74],"privacy-based":[75],"(DPI)":[77],"scheme":[78,174],"AMECS":[80],"support":[82],"secure":[83],"efficient":[85],"while":[87],"protecting":[88,184],"Specifically,":[93],"first":[95],"an":[97],"App":[98,108],"quality":[99,111,119],"management":[100],"mechanism":[101,152],"correlate":[103],"behavior":[105],"its":[110],"then":[113],"choose":[114],"reliable":[115],"based":[117],"on":[118],"thresholds.":[120],"Afterwards,":[121],"privacy-preserving":[123],"data":[125],"sharing":[126],"algorithm":[127],"is":[128,153,175],"designed":[129],"protect":[131],"Furthermore,":[136],"given":[137],"difficulty":[139],"obtaining":[141],"accurate":[142],"network":[143],"parameters":[144],"real":[146],"life,":[147],"reinforcement":[149],"learning-based":[150],"devised":[154],"motivate":[156],"users":[157],"actively":[159],"engage":[160],"tasks.":[163],"Finally,":[164],"simulation":[165],"results":[166],"security":[168],"analysis":[169],"demonstrate":[170],"that":[171],"proposed":[173],"effective":[176],"improving":[178],"utility":[180],"participants":[182]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
