{"id":"https://openalex.org/W4390968529","doi":"https://doi.org/10.1109/tdsc.2024.3355453","title":"Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms","display_name":"Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms","publication_year":2024,"publication_date":"2024-01-18","ids":{"openalex":"https://openalex.org/W4390968529","doi":"https://doi.org/10.1109/tdsc.2024.3355453"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3355453","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3355453","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086254999","display_name":"Yunlong Mao","orcid":"https://orcid.org/0000-0001-9024-9544"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunlong Mao","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-9024-9544","affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103213934","display_name":"Ziqin Dang","orcid":"https://orcid.org/0009-0000-9732-7517"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziqin Dang","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"raw_orcid":"https://orcid.org/0009-0000-9732-7517","affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Heng Wang","orcid":"https://orcid.org/0000-0002-8110-5941"},"institutions":[{"id":"https://openalex.org/I2802536167","display_name":"Beijing Film Academy","ror":"https://ror.org/03y0w9190","country_code":"CN","type":"education","lineage":["https://openalex.org/I2802536167"]},{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Heng Wang","raw_affiliation_strings":["Pony.AI, Beijing, China","State Key Laboratory for Novel Software Technology, Nanjing University, China"],"raw_orcid":"https://orcid.org/0000-0002-8110-5941","affiliations":[{"raw_affiliation_string":"Pony.AI, Beijing, China","institution_ids":["https://openalex.org/I2802536167"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100368674","display_name":"Yuan Zhang","orcid":"https://orcid.org/0000-0001-9682-5231"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Zhang","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-9682-5231","affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060268538","display_name":"Sheng Zhong","orcid":"https://orcid.org/0000-0002-6581-8730"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Zhong","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-6581-8730","affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5086254999"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":1.1714,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.83017203,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"21","issue":"5","first_page":"4684","last_page":"4698"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/crowdsourcing","display_name":"Crowdsourcing","score":0.8253200054168701},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.73783278465271},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6256661415100098},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6137598156929016},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5560528039932251},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.43856608867645264},{"id":"https://openalex.org/keywords/mixing","display_name":"Mixing (physics)","score":0.4319274425506592},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1971685290336609}],"concepts":[{"id":"https://openalex.org/C62230096","wikidata":"https://www.wikidata.org/wiki/Q275969","display_name":"Crowdsourcing","level":2,"score":0.8253200054168701},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.73783278465271},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6256661415100098},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6137598156929016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5560528039932251},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.43856608867645264},{"id":"https://openalex.org/C138777275","wikidata":"https://www.wikidata.org/wiki/Q6884054","display_name":"Mixing (physics)","level":2,"score":0.4319274425506592},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1971685290336609},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3355453","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3355453","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G4310960111","display_name":null,"funder_award_id":"NSFC-62272215","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4711180302","display_name":null,"funder_award_id":"NSFC-62272222","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5461782803","display_name":null,"funder_award_id":"NSFC-61902176","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W69553326","https://openalex.org/W1510275011","https://openalex.org/W1970381522","https://openalex.org/W2004373800","https://openalex.org/W2038096741","https://openalex.org/W2136606893","https://openalex.org/W2345285933","https://openalex.org/W2613280320","https://openalex.org/W2613637871","https://openalex.org/W2724474800","https://openalex.org/W2790257806","https://openalex.org/W2795222609","https://openalex.org/W2913713113","https://openalex.org/W2941060906","https://openalex.org/W2942223872","https://openalex.org/W2963183478","https://openalex.org/W2963509939","https://openalex.org/W2969551246","https://openalex.org/W2997729246","https://openalex.org/W3001645306","https://openalex.org/W3006193062","https://openalex.org/W3009108138","https://openalex.org/W3022795476","https://openalex.org/W3047944316","https://openalex.org/W3080373606","https://openalex.org/W3093541323","https://openalex.org/W3101722615","https://openalex.org/W3104880102","https://openalex.org/W3112406890","https://openalex.org/W3154572656","https://openalex.org/W4205979449","https://openalex.org/W4244777963","https://openalex.org/W4292092773","https://openalex.org/W4312238270","https://openalex.org/W6630667832","https://openalex.org/W6737906269","https://openalex.org/W6966632357"],"related_works":["https://openalex.org/W3032998312","https://openalex.org/W135177976","https://openalex.org/W4384486036","https://openalex.org/W1503094549","https://openalex.org/W2337920774","https://openalex.org/W4286908577","https://openalex.org/W2886410948","https://openalex.org/W2025875869","https://openalex.org/W4318823662","https://openalex.org/W3207526114"],"abstract_inverted_index":{"Conventional":[0],"crowdsourcing":[1,49,57,169],"platforms":[2,22],"primarily":[3],"rely":[4],"on":[5,167],"a":[6,77,85,113,183],"central":[7,34],"server":[8,35],"as":[9,31,43],"the":[10,104,118,123,149,175,190],"broker":[11],"for":[12,47],"information":[13],"exchange.":[14],"Although":[15],"many":[16],"efforts":[17],"have":[18,60],"been":[19,61,95],"made,":[20],"centralized":[21],"are":[23,131],"still":[24],"vulnerable":[25],"to":[26,108,117],"underlying":[27],"security":[28],"issues,":[29],"such":[30],"an":[32,44,154],"untrusted":[33],"and":[36,74,153,197],"single-point":[37],"failure.":[38],"Fortunately,":[39],"blockchain":[40,121],"has":[41,94],"emerged":[42],"alternative":[45],"infrastructure":[46],"building":[48],"platforms.":[50],"Many":[51],"excellent":[52],"designs":[53],"of":[54,103,106,120,179,186],"blockchain-based":[55],"decentralized":[56],"(BDCS)":[58],"solutions":[59,111,130],"proposed.":[62],"Benefiting":[63],"from":[64],"blockchain,":[65],"BDCS":[66,89,107,181,191],"can":[67,100,158],"provide":[68],"fascinating":[69],"features,":[70],"like":[71],"tampering":[72],"resistance":[73],"anonymity.":[75],"However,":[76],"new":[78,86],"attack":[79,87,93,125,152,159],"surface":[80],"appears":[81],"in":[82,139],"BDCS.":[83,162],"Recently,":[84],"against":[88,141],"named":[90],"solution":[91,150,195],"probing":[92,124,142,151,165],"identified.":[96],"The":[97],"solution-probing":[98],"adversary":[99,176],"take":[101],"advantage":[102],"anonymity":[105],"probe":[109],"valid":[110],"using":[112],"generative":[114],"model.":[115],"Due":[116],"transparency":[119],"transactions,":[122],"is":[126,177,192],"effective":[127,138],"even":[128,188],"if":[129,189],"encrypted.":[132],"Nevertheless,":[133],"we":[134,147],"find":[135],"transaction-mixing":[136],"techniques":[137],"defending":[140],"attacks.":[143],"In":[144],"this":[145],"paper,":[146],"introduce":[148],"improved":[155],"variant,":[156],"which":[157],"coin":[160,198],"mixing-based":[161],"We":[163],"evaluate":[164],"attacks":[166],"large-scale":[168],"tasks.":[170],"Experimental":[171],"results":[172],"show":[173],"that":[174],"capable":[178],"deceiving":[180],"with":[182],"limited":[184],"number":[185],"probing,":[187],"protected":[193],"by":[194],"encryption":[196],"mixing":[199],"techniques.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
