{"id":"https://openalex.org/W4205979449","doi":"https://doi.org/10.1109/tmc.2021.3133365","title":"Data Poisoning Attacks and Defenses in Dynamic Crowdsourcing With Online Data Quality Learning","display_name":"Data Poisoning Attacks and Defenses in Dynamic Crowdsourcing With Online Data Quality Learning","publication_year":2021,"publication_date":"2021-12-07","ids":{"openalex":"https://openalex.org/W4205979449","doi":"https://doi.org/10.1109/tmc.2021.3133365"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2021.3133365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2021.3133365","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101741842","display_name":"Yuxi Zhao","orcid":"https://orcid.org/0000-0003-4131-4009"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yuxi Zhao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Auburn University, Auburn, AL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Auburn University, Auburn, AL, USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042081570","display_name":"Xiaowen Gong","orcid":"https://orcid.org/0000-0001-5124-7941"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaowen Gong","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Auburn University, Auburn, AL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Auburn University, Auburn, AL, USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105335899","display_name":"Fuhong Lin","orcid":"https://orcid.org/0000-0002-5287-5226"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fuhong Lin","raw_affiliation_strings":["School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100385692","display_name":"Xu Chen","orcid":"https://orcid.org/0000-0001-9943-6020"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101741842"],"corresponding_institution_ids":["https://openalex.org/I82497590"],"apc_list":null,"apc_paid":null,"fwci":7.2645,"has_fulltext":false,"cited_by_count":46,"citation_normalized_percentile":{"value":0.97265328,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"22","issue":"5","first_page":"2569","last_page":"2581"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/crowdsourcing","display_name":"Crowdsourcing","score":0.9002511501312256},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8082413673400879},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.5506502985954285},{"id":"https://openalex.org/keywords/data-quality","display_name":"Data quality","score":0.5040501952171326},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4665071368217468},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.37883245944976807},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26692381501197815}],"concepts":[{"id":"https://openalex.org/C62230096","wikidata":"https://www.wikidata.org/wiki/Q275969","display_name":"Crowdsourcing","level":2,"score":0.9002511501312256},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8082413673400879},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.5506502985954285},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.5040501952171326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4665071368217468},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.37883245944976807},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26692381501197815},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2021.3133365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2021.3133365","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3583843466","display_name":null,"funder_award_id":"61972432","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G645405385","display_name":null,"funder_award_id":"U20A20159","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1516061453","https://openalex.org/W1989135160","https://openalex.org/W2058720102","https://openalex.org/W2085773652","https://openalex.org/W2087390453","https://openalex.org/W2120826095","https://openalex.org/W2126045912","https://openalex.org/W2127347346","https://openalex.org/W2127963147","https://openalex.org/W2168405694","https://openalex.org/W2345285933","https://openalex.org/W2467851685","https://openalex.org/W2499002200","https://openalex.org/W2554839354","https://openalex.org/W2557044351","https://openalex.org/W2574161003","https://openalex.org/W2732159262","https://openalex.org/W2739582838","https://openalex.org/W2756112421","https://openalex.org/W2788102893","https://openalex.org/W2808820828","https://openalex.org/W2809622771","https://openalex.org/W2888975495","https://openalex.org/W2907385172","https://openalex.org/W2950929549","https://openalex.org/W2962820691","https://openalex.org/W2972103482","https://openalex.org/W2972210858","https://openalex.org/W3005066471","https://openalex.org/W3015919075","https://openalex.org/W3036047693","https://openalex.org/W3154572656","https://openalex.org/W4297752578","https://openalex.org/W6639904974","https://openalex.org/W6676935882","https://openalex.org/W6692768274","https://openalex.org/W6725794477","https://openalex.org/W6754151078","https://openalex.org/W6754272107","https://openalex.org/W6762518091","https://openalex.org/W6773427235"],"related_works":["https://openalex.org/W3032998312","https://openalex.org/W135177976","https://openalex.org/W4384486036","https://openalex.org/W1503094549","https://openalex.org/W2337920774","https://openalex.org/W2137479650","https://openalex.org/W2245479382","https://openalex.org/W3139296374","https://openalex.org/W4387803644","https://openalex.org/W4210350690"],"abstract_inverted_index":{"Crowdsourcing":[0],"has":[1],"found":[2],"a":[3,97,177],"wide":[4],"variety":[5],"of":[6,191,200,239,255,289],"applications,":[7],"including":[8],"spectrum":[9],"sensing,":[10],"traffic":[11],"monitoring,":[12],"as":[13,15,96,244],"well":[14],"data":[16,22,26,31,38,51,58,66,70,78,163,242,256],"annotation":[17],"for":[18,47,180],"machine":[19],"learning":[20,95,204,262],"based":[21,126,241,281],"analytics.":[23],"To":[24,227],"improve":[25],"accuracy":[27],"and":[28,50,87,90,236,275,292],"cost-effectiveness,":[29],"workers\u2019":[30,118],"quality":[32,94,119,139,203,261],"can":[33,44,158,206],"be":[34,45,175,184,207],"learned":[35,122],"from":[36,210],"their":[37],"in":[39],"an":[40],"online":[41,93,142,202,260],"manner,":[42],"which":[43,128,154,285],"used":[46,264],"task":[48],"assignment":[49],"aggregation.":[52],"However,":[53],"crowdsourcing":[54,82],"is":[55,120,140,263],"vulnerable":[56],"to":[57,67,132,174,183,217,224,265],"poisoning":[59,257],"attacks,":[60],"where":[61,83,117,137],"the":[62,101,114,124,133,138,151,155,161,169,181,189,198,201,230,253,268,272,287,290],"attacker":[63],"reports":[64],"malicious":[65,77,105,170],"reduce":[68,160],"aggregated":[69,162],"accuracy.":[71,164],"In":[72],"this":[73],"paper,":[74],"we":[75,91,129,148,187,232],"study":[76,234],"attacks":[79,258,274,291],"on":[80,113,127,252,282],"dynamic":[81],"tasks":[84],"are":[85],"assigned":[86],"performed":[88],"sequentially,":[89],"explore":[92],"defense":[98,245],"mechanism":[99],"against":[100,267],"attack":[102,156,182,193],"by":[103,123],"finding":[104],"workers":[106],"with":[107,143],"low":[108],"quality.":[109],"We":[110,270],"first":[111,149],"focus":[112],"asymptotic":[115],"setting":[116,136],"accurately":[121],"requester,":[125],"then":[130],"turn":[131],"general":[134],"non-asymptotic":[135],"estimated":[141],"errors.":[144],"For":[145],"each":[146],"setting,":[147],"characterize":[150],"conditions":[152],"under":[153],"strategy":[157],"effectively":[159],"Our":[165,247],"results":[166,248,280],"show":[167],"that":[168,197],"noise":[171],"variance":[172],"needs":[173],"within":[176],"certain":[178],"range":[179],"effective.":[185],"Then":[186],"analyze":[188],"harm":[190],"effective":[192,225],"strategies.":[194],"It":[195],"reveals":[196],"regret":[199],"algorithm":[205],"substantially":[208],"increased":[209],"<inline-formula><tex-math":[211,218],"notation=\"LaTeX\">$\\mathcal":[212],"{O}(\\log":[213],"^2T)$</tex-math></inline-formula>":[214],"(upper":[215],"bound)":[216,222],"notation=\"LaTeX\">$\\Omega":[219],"(T)$</tex-math></inline-formula>":[220],"(lower":[221],"due":[223],"attacks.":[226],"further":[228],"mitigate":[229],"attack,":[231],"also":[233],"median":[235],"maximum":[237],"influence":[238],"estimation":[240],"aggregation":[243],"mechanisms.":[246],"provide":[249],"useful":[250],"insights":[251],"impacts":[254],"when":[259],"defend":[266],"attack.":[269],"evaluate":[271],"proposed":[273],"defenses":[276],"via":[277],"extensive":[278],"simulation":[279],"real-world":[283],"data,":[284],"demonstrate":[286],"effectiveness":[288],"defenses.":[293]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":20},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
