{"id":"https://openalex.org/W4400644248","doi":"https://doi.org/10.1109/tdsc.2024.3428405","title":"Truthful and Dual-Direction Combinatorial Multi-Armed Bandit Scheme to Maximize Profit for Mobile Crowd Sensing","display_name":"Truthful and Dual-Direction Combinatorial Multi-Armed Bandit Scheme to Maximize Profit for Mobile Crowd Sensing","publication_year":2024,"publication_date":"2024-07-15","ids":{"openalex":"https://openalex.org/W4400644248","doi":"https://doi.org/10.1109/tdsc.2024.3428405"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3428405","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3428405","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054012605","display_name":"Xiangwan Fu","orcid":"https://orcid.org/0000-0002-4001-7005"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangwan Fu","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020630479","display_name":"Saiqin Long","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I4210113561","display_name":"National Center of Security and Protection","ror":"https://ror.org/01yfz8598","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210113561"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Saiqin Long","raw_affiliation_strings":["National &#x0026; Local Joint Engineering, Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, China","National &amp; Local Joint Engineering, Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"National &#x0026; Local Joint Engineering, Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I4210113561"]},{"raw_affiliation_string":"National &amp; Local Joint Engineering, Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075435434","display_name":"Anfeng Liu","orcid":"https://orcid.org/0000-0001-5190-4761"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anfeng Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015419107","display_name":"Ju Ren","orcid":"https://orcid.org/0000-0003-2782-183X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ju Ren","raw_affiliation_strings":["Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078005520","display_name":"Bin Guo","orcid":"https://orcid.org/0000-0001-6097-2467"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Guo","raw_affiliation_strings":["Department of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China","Department of Computer Science, Northwestern Polytechnical University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"Department of Computer Science, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081827896","display_name":"Zhetao Li","orcid":"https://orcid.org/0000-0002-7804-0286"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I4210113561","display_name":"National Center of Security and Protection","ror":"https://ror.org/01yfz8598","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210113561"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Zhetao Li","raw_affiliation_strings":["National &#x0026; Local Joint Engineering, Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, China","National &amp; Local Joint Engineering, Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"National &#x0026; Local Joint Engineering, Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I4210113561"]},{"raw_affiliation_string":"National &amp; Local Joint Engineering, Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, College of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5054012605"],"corresponding_institution_ids":["https://openalex.org/I139660479"],"apc_list":null,"apc_paid":null,"fwci":3.2304,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.93386637,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"22","issue":"2","first_page":"1098","last_page":"1117"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.9765999913215637,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9606000185012817,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6982281804084778},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.6510658860206604},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5875574350357056},{"id":"https://openalex.org/keywords/profit","display_name":"Profit (economics)","score":0.5012187957763672},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.4077909588813782},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.37598323822021484},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3311987519264221},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.20609316229820251},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19104745984077454},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.14875319600105286},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.11357331275939941},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.07635733485221863}],"concepts":[{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6982281804084778},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.6510658860206604},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5875574350357056},{"id":"https://openalex.org/C181622380","wikidata":"https://www.wikidata.org/wiki/Q26911","display_name":"Profit (economics)","level":2,"score":0.5012187957763672},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4077909588813782},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.37598323822021484},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3311987519264221},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.20609316229820251},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19104745984077454},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.14875319600105286},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.11357331275939941},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.07635733485221863},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3428405","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3428405","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5888125704","display_name":null,"funder_award_id":"62072475","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1499884756","https://openalex.org/W1583075929","https://openalex.org/W1996573126","https://openalex.org/W2031674781","https://openalex.org/W2156962537","https://openalex.org/W2172041433","https://openalex.org/W2312558633","https://openalex.org/W2407898405","https://openalex.org/W2517028219","https://openalex.org/W2574161003","https://openalex.org/W2585226541","https://openalex.org/W2911912007","https://openalex.org/W2912261230","https://openalex.org/W2943752059","https://openalex.org/W2946891957","https://openalex.org/W2947538082","https://openalex.org/W2956567166","https://openalex.org/W2990695676","https://openalex.org/W3012992118","https://openalex.org/W3021908353","https://openalex.org/W3047004582","https://openalex.org/W3081105446","https://openalex.org/W3085424287","https://openalex.org/W3086575978","https://openalex.org/W3095673477","https://openalex.org/W3112305478","https://openalex.org/W3132473320","https://openalex.org/W3165902623","https://openalex.org/W3166388230","https://openalex.org/W3173540700","https://openalex.org/W3179772975","https://openalex.org/W3182346119","https://openalex.org/W3188054913","https://openalex.org/W3196904597","https://openalex.org/W3203353209","https://openalex.org/W3209836183","https://openalex.org/W4211130498","https://openalex.org/W4213173692","https://openalex.org/W4280539114","https://openalex.org/W4285122420","https://openalex.org/W4293336299","https://openalex.org/W4379379175"],"related_works":["https://openalex.org/W1975289146","https://openalex.org/W2105887828","https://openalex.org/W2122599759","https://openalex.org/W4236520801","https://openalex.org/W2317351040","https://openalex.org/W4285447065","https://openalex.org/W2952466936","https://openalex.org/W1537234410","https://openalex.org/W2174689325","https://openalex.org/W4282964981"],"abstract_inverted_index":{"Nowadays,":[0],"Mobile":[1],"Crowd":[2],"Sensing":[3],"(MCS)":[4],"has":[5],"become":[6],"a":[7,51,101,141],"popular":[8],"paradigm":[9],"for":[10,70,80],"large-scale":[11],"data":[12,96,124],"collection":[13],"using":[14,176],"ubiquitous":[15],"mobile":[16],"sensing":[17],"devices.":[18],"However,":[19],"most":[20],"existing":[21],"works":[22],"do":[23],"not":[24,40,92],"consider":[25],"that":[26,34,88,105],"requester's":[27],"payments":[28,132],"are":[29,36,97,133],"unknown":[30,134],"prior,":[31,135],"and":[32,54,75,107,144],"assume":[33],"workers":[35,110],"honest,":[37],"which":[38,61],"may":[39],"be":[41],"true":[42],"in":[43],"practice.":[44],"To":[45],"address":[46],"these":[47],"problems,":[48],"we":[49,99,136,154,165],"propose":[50,100],"novel":[52],"Truthful":[53],"Dual-direction":[55],"Combinatorial":[56],"Multi-Armed":[57],"Bandit":[58],"(TD-CMAB)":[59],"scheme,":[60],"maximizes":[62],"the":[63,67,72,76,81,86,89,115,127,148,157,162,167,170,177],"total":[64],"profit":[65],"of":[66,161,169],"dual-direction":[68],"platform":[69,90],"both":[71],"worker":[73,82,102],"side":[74],"requester":[77,128,138],"side.":[78],"Specifically,":[79],"side,":[83,129],"to":[84],"overcome":[85],"problem":[87,143],"is":[91],"clear":[93],"whether":[94],"sensed":[95],"true,":[98],"recruitment":[103],"strategy":[104],"identifies":[106],"recruits":[108],"honest":[109],"at":[111],"low":[112],"cost":[113],"through":[114,173],"Upper":[116],"Confidence":[117],"Bound":[118],"(UCB)":[119],"algorithm":[120],"based":[121],"on":[122],"truth":[123],"discovery.":[125],"For":[126],"where":[130],"requesters\u2019":[131],"model":[137],"selection":[139],"as":[140],"CMAB":[142],"solve":[145],"it":[146],"by":[147],"proposed":[149],"adaptive":[150],"UCB":[151],"algorithm.":[152],"Furthermore,":[153],"theoretically":[155],"prove":[156],"worst":[158],"regret":[159],"bound":[160],"TD-CMAB.":[163],"Finally,":[164],"evaluate":[166],"effectiveness":[168],"TD-CMAB":[171],"scheme":[172],"extensive":[174],"experiments":[175],"Beijing":[178],"taxi":[179],"dataset.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
