{"id":"https://openalex.org/W4391620895","doi":"https://doi.org/10.1109/tdsc.2024.3363507","title":"Data Poisoning Attacks and Defenses to LDP-Based Privacy-Preserving Crowdsensing","display_name":"Data Poisoning Attacks and Defenses to LDP-Based Privacy-Preserving Crowdsensing","publication_year":2024,"publication_date":"2024-02-07","ids":{"openalex":"https://openalex.org/W4391620895","doi":"https://doi.org/10.1109/tdsc.2024.3363507"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3363507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3363507","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001570342","display_name":"Zhirun Zheng","orcid":"https://orcid.org/0000-0003-3030-709X"},"institutions":[{"id":"https://openalex.org/I4610292","display_name":"Xiangtan University","ror":"https://ror.org/00xsfaz62","country_code":"CN","type":"education","lineage":["https://openalex.org/I4610292"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhirun Zheng","raw_affiliation_strings":["School of Mathematics and Computational Science, Xiangtan University, Xiangtan, Hunan, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computational Science, Xiangtan University, Xiangtan, Hunan, China","institution_ids":["https://openalex.org/I4610292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081827896","display_name":"Zhetao Li","orcid":"https://orcid.org/0000-0002-7804-0286"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhetao Li","raw_affiliation_strings":["National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, and College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, and College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101660583","display_name":"Cheng Huang","orcid":"https://orcid.org/0000-0003-1335-2040"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Cheng Huang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020630479","display_name":"Saiqin Long","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Saiqin Long","raw_affiliation_strings":["National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, and College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, and College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074493410","display_name":"Mushu Li","orcid":"https://orcid.org/0000-0002-9694-3294"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mushu Li","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100773343","display_name":"Xuemin Shen","orcid":"https://orcid.org/0000-0002-4140-287X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xuemin Shen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5001570342"],"corresponding_institution_ids":["https://openalex.org/I4610292"],"apc_list":null,"apc_paid":null,"fwci":7.8263,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.97451999,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"21","issue":"5","first_page":"4861","last_page":"4878"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8039332628250122},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7731798887252808},{"id":"https://openalex.org/keywords/crowdsensing","display_name":"Crowdsensing","score":0.6345231533050537},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5552788376808167},{"id":"https://openalex.org/keywords/minification","display_name":"Minification","score":0.5034002661705017},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.48327308893203735},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.4223436117172241},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2754472494125366},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.228584885597229}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8039332628250122},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7731798887252808},{"id":"https://openalex.org/C2780821482","wikidata":"https://www.wikidata.org/wiki/Q25381721","display_name":"Crowdsensing","level":2,"score":0.6345231533050537},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5552788376808167},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.5034002661705017},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.48327308893203735},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.4223436117172241},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2754472494125366},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.228584885597229},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3363507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3363507","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1469499571","display_name":null,"funder_award_id":"XDCX2020B085","funder_id":"https://openalex.org/F4320324780","funder_display_name":"Xiangtan University"},{"id":"https://openalex.org/G5733278378","display_name":null,"funder_award_id":"U23B2027","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G725377762","display_name":null,"funder_award_id":"62172350","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G72718546","display_name":null,"funder_award_id":"62076214","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8718608543","display_name":null,"funder_award_id":"62032020","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324780","display_name":"Xiangtan University","ror":"https://ror.org/00xsfaz62"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1595159159","https://openalex.org/W1873763122","https://openalex.org/W1981029888","https://openalex.org/W2053801139","https://openalex.org/W2086413055","https://openalex.org/W2097272254","https://openalex.org/W2121626719","https://openalex.org/W2137340504","https://openalex.org/W2345285933","https://openalex.org/W2615394322","https://openalex.org/W2754935323","https://openalex.org/W2788102893","https://openalex.org/W2808769527","https://openalex.org/W2809452802","https://openalex.org/W2809622771","https://openalex.org/W2947538082","https://openalex.org/W2964155470","https://openalex.org/W2973414267","https://openalex.org/W2996333964","https://openalex.org/W3008145398","https://openalex.org/W3009498583","https://openalex.org/W3036867964","https://openalex.org/W3080783482","https://openalex.org/W3092114970","https://openalex.org/W3126700118","https://openalex.org/W3129462373","https://openalex.org/W3146887428","https://openalex.org/W3154572656","https://openalex.org/W3173540700","https://openalex.org/W3201054243","https://openalex.org/W4214564192","https://openalex.org/W4226159313","https://openalex.org/W4249192582","https://openalex.org/W4280643519","https://openalex.org/W4285247736","https://openalex.org/W4285307629","https://openalex.org/W4296132227","https://openalex.org/W4323519519","https://openalex.org/W6638343385","https://openalex.org/W6678154363","https://openalex.org/W6680957539","https://openalex.org/W6769755587","https://openalex.org/W6804359802"],"related_works":["https://openalex.org/W2563347706","https://openalex.org/W2608033733","https://openalex.org/W3038283795","https://openalex.org/W2604501336","https://openalex.org/W2558166297","https://openalex.org/W2734500670","https://openalex.org/W2315671126","https://openalex.org/W798507144","https://openalex.org/W2999136942","https://openalex.org/W4388010257"],"abstract_inverted_index":{"In":[0,63],"this":[1,64],"paper,":[2],"we":[3,19,88,112,153],"explore":[4],"data":[5,21,202],"poisoning":[6,22,203],"attacks":[7,23,38,67,137,187],"and":[8,93,96,141,188,205],"their":[9,51],"defenses":[10,208],"in":[11],"local":[12],"differential":[13,156],"privacy":[14],"(LDP)-based":[15],"crowdsensing":[16,30,147],"systems.":[17,148],"First,":[18],"construct":[20],"launched":[24],"by":[25,32,54,60,136],"corrupted":[26,144],"workers":[27,145],"to":[28,49,80,102,116,180],"subvert":[29],"results":[31,192],"tampering":[33],"information":[34],"reported.":[35],"Specifically,":[36],"the":[37,66,74,81,85,98,119,130,139,151,164,168,182,185,199,206],"are":[39,123,178],"formulated":[40,124],"as":[41,125],"a":[42,126,155],"bi-level":[43,86],"optimization":[44],"problem":[45,169],"where":[46],"attackers":[47],"strive":[48],"conceal":[50],"malicious":[52,212],"behavior":[53],"delicately":[55],"exploiting":[56],"noise":[57],"perturbation":[58,196],"introduced":[59],"LDP":[61,195],"protocols.":[62],"way,":[65],"can":[68,209],"not":[69,171],"be":[70],"detected,":[71],"even":[72],"with":[73,129],"weight-based":[75],"truth":[76],"discovery":[77],"methods.":[78],"Due":[79],"NP-hard":[82],"nature":[83],"of":[84,132,143,160,167,184,201],"problem,":[87,128,152],"decompose":[89],"it":[90],"into":[91],"upper-level":[92],"lower-level":[94],"sub-problems":[95],"employ":[97],"augmented":[99],"Lagrangian":[100],"method":[101],"iteratively":[103],"solve":[104,150],"them,":[105],"ultimately":[106],"identifying":[107],"optimal":[108],"attack":[109],"strategies.":[110],"Second,":[111],"propose":[113],"corresponding":[114],"countermeasures":[115,122],"defend":[117],"against":[118],"attacks.":[120],"The":[121,190],"minimization":[127],"objective":[131,165],"minimizing":[133],"disruptions":[134],"caused":[135],"through":[138],"identification":[140],"removal":[142],"from":[146],"To":[149],"utilize":[154],"evolution":[157],"algorithm":[158],"instead":[159],"gradient-based":[161],"methods":[162],"since":[163],"function":[166],"is":[170],"differentiable.":[172],"Extensive":[173],"experiments":[174],"on":[175],"real-world":[176],"datasets":[177],"conducted":[179],"evaluate":[181],"performance":[183],"proposed":[186,207],"defenses.":[189],"evaluation":[191],"demonstrate":[193],"that":[194],"indeed":[197],"facilitates":[198],"success":[200],"attacks,":[204],"accurately":[210],"distinguish":[211],"behaviors":[213],"disguised.":[214]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":5}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
