{"id":"https://openalex.org/W2919726825","doi":"https://doi.org/10.1109/tifs.2019.2903659","title":"Trust Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing in the Internet of Things","display_name":"Trust Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing in the Internet of Things","publication_year":2019,"publication_date":"2019-03-07","ids":{"openalex":"https://openalex.org/W2919726825","doi":"https://doi.org/10.1109/tifs.2019.2903659","mag":"2919726825"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2903659","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2903659","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/8734901/08662641.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/10206/8734901/08662641.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Nguyen Binh Truong","orcid":"https://orcid.org/0000-0001-9359-524X"},"institutions":[{"id":"https://openalex.org/I4210109636","display_name":"NIHR Imperial Biomedical Research Centre","ror":"https://ror.org/01kmhx639","country_code":"GB","type":"facility","lineage":["https://openalex.org/I34931013","https://openalex.org/I4210109636"]},{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Nguyen Binh Truong","raw_affiliation_strings":["Department of Computing, Data Science Institute, Imperial College London, London, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Data Science Institute, Imperial College London, London, U.K","institution_ids":["https://openalex.org/I47508984","https://openalex.org/I4210109636"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Gyu Myoung Lee","orcid":"https://orcid.org/0000-0002-2155-5553"},"institutions":[{"id":"https://openalex.org/I63098007","display_name":"Liverpool John Moores University","ror":"https://ror.org/04zfme737","country_code":"GB","type":"education","lineage":["https://openalex.org/I63098007"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Gyu Myoung Lee","raw_affiliation_strings":["Department of Computer Science, Liverpool John Moores University, Liverpool, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Liverpool John Moores University, Liverpool, U.K","institution_ids":["https://openalex.org/I63098007"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tai-Won Um","orcid":"https://orcid.org/0000-0002-4922-1774"},"institutions":[{"id":"https://openalex.org/I152238500","display_name":"Chosun University","ror":"https://ror.org/01zt9a375","country_code":"KR","type":"education","lineage":["https://openalex.org/I152238500"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Tai-Won Um","raw_affiliation_strings":["Department of Information and Communication Engineering, Chosun University, Gwangju, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Engineering, Chosun University, Gwangju, South Korea","institution_ids":["https://openalex.org/I152238500"]}]},{"author_position":"last","author":{"id":null,"display_name":"Michael Mackay","orcid":"https://orcid.org/0000-0001-9013-7884"},"institutions":[{"id":"https://openalex.org/I63098007","display_name":"Liverpool John Moores University","ror":"https://ror.org/04zfme737","country_code":"GB","type":"education","lineage":["https://openalex.org/I63098007"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Michael Mackay","raw_affiliation_strings":["Department of Computer Science, Liverpool John Moores University, Liverpool, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Liverpool John Moores University, Liverpool, U.K","institution_ids":["https://openalex.org/I63098007"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210109636","https://openalex.org/I47508984"],"apc_list":null,"apc_paid":null,"fwci":16.5594,"has_fulltext":true,"cited_by_count":109,"citation_normalized_percentile":{"value":0.99160556,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"14","issue":"10","first_page":"2705","last_page":"2719"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.0007999999797903001,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.0006000000284984708,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.8101999759674072},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.6110000014305115},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.5098999738693237},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.490200012922287},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.462799996137619},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4537999927997589},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.438400000333786},{"id":"https://openalex.org/keywords/disinformation","display_name":"Disinformation","score":0.4172999858856201},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.41290000081062317}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.839900016784668},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.8101999759674072},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.6110000014305115},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5418000221252441},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5412999987602234},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.5098999738693237},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.490200012922287},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.462799996137619},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4537999927997589},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.438400000333786},{"id":"https://openalex.org/C2776552730","wikidata":"https://www.wikidata.org/wiki/Q189656","display_name":"Disinformation","level":3,"score":0.4172999858856201},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.41290000081062317},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.40849998593330383},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.38519999384880066},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.35190001130104065},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3359000086784363},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.3239000141620636},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.3188999891281128},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.30559998750686646},{"id":"https://openalex.org/C2781218421","wikidata":"https://www.wikidata.org/wiki/Q2892532","display_name":"Reputation system","level":3,"score":0.29919999837875366},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.27320000529289246},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.26739999651908875},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.26600000262260437},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.26600000262260437},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.2628999948501587},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.25429999828338623}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tifs.2019.2903659","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2903659","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/8734901/08662641.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1903.01464","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1903.01464","pdf_url":"https://arxiv.org/pdf/1903.01464","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:arXiv.org:1904.03038","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1904.03038","pdf_url":"https://arxiv.org/pdf/1904.03038","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:researchonline.ljmu.ac.uk:10203","is_oa":true,"landing_page_url":null,"pdf_url":"https://researchonline.ljmu.ac.uk/id/eprint/10203/1/MCS_IEEE_TIFS_clean_version.pdf","source":{"id":"https://openalex.org/S4306401246","display_name":"Liverpool John Moores University","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63098007","host_organization_name":"Liverpool John Moores University","host_organization_lineage":["https://openalex.org/I63098007"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1109/tifs.2019.2903659","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2903659","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/8734901/08662641.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1214977761","display_name":null,"funder_award_id":"2018R1A2B","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G3034753964","display_name":null,"funder_award_id":"grant","funder_id":"https://openalex.org/F4320320671","funder_display_name":"National Research Foundation"},{"id":"https://openalex.org/G342704958","display_name":null,"funder_award_id":"funded","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G3942910960","display_name":null,"funder_award_id":"(NRF) grant","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G6145486302","display_name":null,"funder_award_id":"2018R1A2B2003774","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"},{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2919726825.pdf","grobid_xml":"https://content.openalex.org/works/W2919726825.grobid-xml"},"referenced_works_count":60,"referenced_works":["https://openalex.org/W1553085258","https://openalex.org/W1597217844","https://openalex.org/W1892766306","https://openalex.org/W1970756365","https://openalex.org/W1994112109","https://openalex.org/W1994500462","https://openalex.org/W2004291985","https://openalex.org/W2006974280","https://openalex.org/W2012466574","https://openalex.org/W2036120890","https://openalex.org/W2037699532","https://openalex.org/W2039482292","https://openalex.org/W2048827284","https://openalex.org/W2055665526","https://openalex.org/W2057041225","https://openalex.org/W2068386570","https://openalex.org/W2069514153","https://openalex.org/W2075551143","https://openalex.org/W2085773652","https://openalex.org/W2091049740","https://openalex.org/W2094140553","https://openalex.org/W2100637281","https://openalex.org/W2107569009","https://openalex.org/W2111619626","https://openalex.org/W2117366235","https://openalex.org/W2120826095","https://openalex.org/W2122005484","https://openalex.org/W2125826911","https://openalex.org/W2129368140","https://openalex.org/W2136279298","https://openalex.org/W2144193487","https://openalex.org/W2162192698","https://openalex.org/W2233905468","https://openalex.org/W2236337521","https://openalex.org/W2240592568","https://openalex.org/W2248544358","https://openalex.org/W2248864398","https://openalex.org/W2407231546","https://openalex.org/W2464440734","https://openalex.org/W2475143668","https://openalex.org/W2502154934","https://openalex.org/W2523189116","https://openalex.org/W2526800568","https://openalex.org/W2528102394","https://openalex.org/W2567213699","https://openalex.org/W2585955584","https://openalex.org/W2586322277","https://openalex.org/W2587448544","https://openalex.org/W2612758347","https://openalex.org/W2618974155","https://openalex.org/W2624542986","https://openalex.org/W2739571464","https://openalex.org/W2739815251","https://openalex.org/W2763393827","https://openalex.org/W2783099329","https://openalex.org/W2791199353","https://openalex.org/W2807386280","https://openalex.org/W2963044698","https://openalex.org/W6721776332","https://openalex.org/W6736178439"],"related_works":[],"abstract_inverted_index":{"Mobile":[0],"crowd-sensing":[1],"(MCS)":[2],"has":[3],"appeared":[4],"as":[5,213,215,246],"a":[6,24,40,66,75,92,179,249],"prospective":[7],"solution":[8],"for":[9,43,54,101,187,252,273,277],"large-scale":[10],"data":[11,49,72,136,197],"collection,":[12],"leveraging":[13],"built-in":[14],"sensors":[15],"and":[16,47,73,84,150,159,172,206,234],"social":[17],"applications":[18],"in":[19,36,39,69,111,225,290],"mobile":[20,108],"devices":[21],"that":[22,264],"enables":[23],"variety":[25],"of":[26,28,78,131,134,146,208,231,242],"Internet":[27],"Things":[29],"(IoT)":[30],"services.":[31,60],"However,":[32],"the":[33,82,117,123,132,157,167,189,204,209,216,240,243,265,283,291],"human":[34],"involvement":[35],"MCS":[37,87,113,192,227,253,279],"results":[38,238],"high":[41],"possibility":[42],"unintentionally":[44],"contributing":[45],"corrupted":[46],"falsified":[48],"or":[50],"intentionally":[51],"spreading":[52],"disinformation":[53],"malevolent":[55],"purposes,":[56],"consequently":[57],"undermining":[58],"IoT":[59],"Therefore,":[61],"recruiting":[62],"trustworthy":[63,191,275],"contributors":[64],"plays":[65],"crucial":[67],"role":[68],"collecting":[70],"high-quality":[71],"providing":[74],"better":[76,250],"quality":[77,133,251],"services":[79,254],"while":[80,255],"minimizing":[81],"vulnerabilities":[83],"risks":[85],"to":[86,194,196,202,258,288],"systems.":[88],"In":[89,200],"this":[90],"paper,":[91],"novel":[93,180],"trust":[94,103,147,161,164,177,218],"model":[95],"called":[96,148],"experience-reputation":[97],"(E-R)":[98],"is":[99,184,286],"proposed":[100,210,284],"evaluating":[102],"relationships":[104,165],"between":[105,166],"any":[106],"two":[107,144],"device":[109],"users":[110,124,168,193,276],"an":[112,129,226,270],"platform.":[114],"To":[115],"enable":[116],"E-R":[118,217],"model,":[119,219],"virtual":[120],"interactions":[121],"among":[122],"are":[125,152,169],"manipulated":[126],"by":[127],"considering":[128],"assessment":[130],"contributed":[135],"from":[137],"such":[138],"users.":[139,236,261],"Based":[140,174],"on":[141,175],"these":[142,176],"interactions,":[143],"indicators":[145,162],"experience":[149,158],"reputation":[151,160],"calculated":[153],"accordingly.":[154],"By":[155],"incorporating":[156],"(TIs),":[163],"established,":[170],"evaluated,":[171],"maintained.":[173],"relationships,":[178],"trust-based":[181,211,244,266],"recruitment":[182,223,268],"scheme":[183,245],"carried":[185],"out":[186],"selecting":[188,274],"most":[190],"contribute":[195],"sensing":[198],"tasks.":[199],"order":[201],"evaluate":[203],"performance":[205],"effectiveness":[207],"mechanism":[212,285],"well":[214],"we":[220],"deploy":[221,289],"several":[222],"schemes":[224],"testbed,":[228],"which":[229],"consists":[230],"both":[232],"normal":[233],"malicious":[235,260],"The":[237],"highlight":[239],"strength":[241],"it":[247],"delivers":[248],"being":[256],"able":[257],"detect":[259],"We":[262],"believe":[263],"user":[267],"offers":[269],"effective":[271],"capability":[272],"various":[278],"systems":[280],"and,":[281],"importantly,":[282],"practical":[287],"real":[292],"world.":[293]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":19},{"year":2023,"cited_by_count":24},{"year":2022,"cited_by_count":19},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":16},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2019-03-11T00:00:00"}
