{"id":"https://openalex.org/W4403826586","doi":"https://doi.org/10.1109/tmc.2024.3486689","title":"Defending Data Poisoning Attacks in DP-Based Crowdsensing: A Game-Theoretic Approach","display_name":"Defending Data Poisoning Attacks in DP-Based Crowdsensing: A Game-Theoretic Approach","publication_year":2024,"publication_date":"2024-10-28","ids":{"openalex":"https://openalex.org/W4403826586","doi":"https://doi.org/10.1109/tmc.2024.3486689"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2024.3486689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3486689","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001570342","display_name":"Zhirun Zheng","orcid":"https://orcid.org/0000-0003-3030-709X"},"institutions":[{"id":"https://openalex.org/I4610292","display_name":"Xiangtan University","ror":"https://ror.org/00xsfaz62","country_code":"CN","type":"education","lineage":["https://openalex.org/I4610292"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhirun Zheng","raw_affiliation_strings":["School of Mathematics and Computational Science, Xiangtan University, Xiangtan, China","School of Mathematics and Computational Science, Xiangtan University, Xiangtan, Hunan, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computational Science, Xiangtan University, Xiangtan, China","institution_ids":["https://openalex.org/I4610292"]},{"raw_affiliation_string":"School of Mathematics and Computational Science, Xiangtan University, Xiangtan, Hunan, China","institution_ids":["https://openalex.org/I4610292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081827896","display_name":"Zhetao Li","orcid":"https://orcid.org/0000-0002-7804-0286"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhetao Li","raw_affiliation_strings":["College of Information Science and Technology, Jinan University, Guangzhou, China","College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038498019","display_name":"Cheng Huang","orcid":"https://orcid.org/0000-0003-3769-7211"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Huang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020630479","display_name":"Saiqin Long","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Saiqin Long","raw_affiliation_strings":["College of Information Science and Technology, Jinan University, Guangzhou, China","College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Information Science and Technology, Jinan University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100773343","display_name":"Xuemin Shen","orcid":"https://orcid.org/0000-0002-4140-287X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xuemin Shen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5001570342"],"corresponding_institution_ids":["https://openalex.org/I4610292"],"apc_list":null,"apc_paid":null,"fwci":4.5926,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.9523098,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"24","issue":"3","first_page":"1859","last_page":"1876"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9541000127792358,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9541000127792358,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8330729007720947},{"id":"https://openalex.org/keywords/crowdsensing","display_name":"Crowdsensing","score":0.7390015721321106},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5110164880752563},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.47384101152420044},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38067102432250977}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8330729007720947},{"id":"https://openalex.org/C2780821482","wikidata":"https://www.wikidata.org/wiki/Q25381721","display_name":"Crowdsensing","level":2,"score":0.7390015721321106},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5110164880752563},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.47384101152420044},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38067102432250977},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2024.3486689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3486689","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5733278378","display_name":null,"funder_award_id":"U23B2027","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G72718546","display_name":null,"funder_award_id":"62076214","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8718608543","display_name":null,"funder_award_id":"62032020","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1873763122","https://openalex.org/W1970381522","https://openalex.org/W1984016960","https://openalex.org/W2051872019","https://openalex.org/W2073064357","https://openalex.org/W2079931787","https://openalex.org/W2086413055","https://openalex.org/W2144371595","https://openalex.org/W2153714959","https://openalex.org/W2156448827","https://openalex.org/W2345285933","https://openalex.org/W2788102893","https://openalex.org/W2808769527","https://openalex.org/W2809622771","https://openalex.org/W2964155470","https://openalex.org/W3008145398","https://openalex.org/W3009498583","https://openalex.org/W3036867964","https://openalex.org/W3080783482","https://openalex.org/W3092114970","https://openalex.org/W3126700118","https://openalex.org/W3129462373","https://openalex.org/W3151617511","https://openalex.org/W3154572656","https://openalex.org/W3173540700","https://openalex.org/W3201054243","https://openalex.org/W4205228770","https://openalex.org/W4205979449","https://openalex.org/W4230167402","https://openalex.org/W4249545506","https://openalex.org/W4252383231","https://openalex.org/W4285247736","https://openalex.org/W4285307629","https://openalex.org/W4293057436","https://openalex.org/W4307473985","https://openalex.org/W4312586899","https://openalex.org/W4312845824","https://openalex.org/W4315630008","https://openalex.org/W4323519519","https://openalex.org/W4385767781","https://openalex.org/W4388407494","https://openalex.org/W4391620895","https://openalex.org/W6606439196","https://openalex.org/W6763832118","https://openalex.org/W6769755587","https://openalex.org/W6804359802","https://openalex.org/W6837789115"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2563347706","https://openalex.org/W2608033733","https://openalex.org/W4287604253","https://openalex.org/W1894261276","https://openalex.org/W2168877220","https://openalex.org/W2295662171","https://openalex.org/W4381785531"],"abstract_inverted_index":{"Differential":[0],"privacy":[1,8],"(DP)":[2],"is":[3,96,130,167,224,235],"widely":[4],"used":[5],"for":[6],"protecting":[7],"in":[9,41,210,262],"crowdsensing":[10,43,172,211],"by":[11,88,105,109,194,237],"adding":[12],"noises.":[13],"However,":[14],"malicious":[15,111],"attackers":[16,48,183,203],"can":[17,56,184,204,293],"exploit":[18],"noise":[19],"to":[20,35,51,257,272],"launch":[21],"covert":[22,298],"data":[23,38,102,107,276],"poisoning":[24,39,103,277],"attacks.":[25],"In":[26,45],"this":[27,46],"paper,":[28],"we":[29,249],"propose":[30,250],"a":[31,79,97,120,162,217,251],"game-based":[32,290],"defense":[33,68,77,122,187,270,291],"approach":[34,292],"resist":[36,273],"such":[37],"attacks":[40,104],"DP-based":[42],"systems.":[44],"approach,":[47],"are":[49,245],"believed":[50],"be":[52,85],"powerful":[53,275,296],"as":[54,78,161,174,176],"they":[55,189],"refine":[57],"their":[58,158],"attack":[59,159,219],"strategy":[60,160,271],"based":[61],"on":[62,281],"the":[63,76,114,124,128,133,140,147,182,186,192,196,202,221,232,238,263,274,288],"observations":[64],"of":[65,99,127,135],"deployed":[66,209],"defenders\u2019":[67],"strategy.":[69],"Specifically,":[70],"<italic":[71,153],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[72,154],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">the":[73,155],"defenders</i>":[74],"formulate":[75,157],"functional":[80],"minimization":[81],"problem":[82,129,165,223],"(which":[83,166],"cannot":[84],"directly":[86],"solved":[87,145,236],"numerical":[89],"optimization":[90],"algorithms":[91],"because":[92],"its":[93],"decision":[94,125],"variable":[95,126],"set":[98],"functions),":[100],"resisting":[101],"deleting":[106],"shared":[108],"identified":[110],"workers":[112],"through":[113,139],"log-likelihood":[115,198],"ratio":[116,199],"test.":[117,200],"To":[118,215],"obtain":[119,258],"current":[121,218],"strategy,":[123,188,220],"relaxed":[131],"into":[132,226],"coefficients":[134],"basis-based":[136],"linear":[137],"combinations":[138],"variable-basis":[141],"approximation,":[142],"and":[143,228,241,283,297],"then":[144,242],"using":[146,212],"simulated":[148],"annealing":[149],"genetic":[150],"algorithm.":[151],"Correspondingly,":[152],"attackers</i>":[156],"bi-level":[163,222],"maximization":[164],"an":[168,259,268],"NP-hard":[169],"problem),":[170],"biasing":[171],"results":[173],"much":[175],"possible":[177],"while":[178],"remaining":[179],"undetected.":[180],"Since":[181],"know":[185],"may":[190],"bypass":[191],"defenders":[193],"constraining":[195],"expected":[197],"Additionally,":[201],"evade":[205],"truth":[206],"discovery":[207],"methods":[208],"DP":[213],"noise.":[214],"determine":[216],"decomposed":[225],"upper-level":[227,233],"lower-level":[229],"sub-problems,":[230],"wherein":[231],"sub-problem":[234],"variational":[239],"methods,":[240],"these":[243],"sub-problems":[244],"alternately":[246],"optimized.":[247],"Finally,":[248],"local":[252],"minimax":[253],"points":[254],"calculating":[255],"algorithm":[256],"equilibrium":[260],"point":[261],"defenders-attackers":[264],"game,":[265],"thereby":[266],"finding":[267],"optimal":[269],"attack.":[278],"Extensive":[279],"experiments":[280],"real-world":[282],"synthetic":[284],"datasets":[285],"show":[286],"that":[287],"proposed":[289],"effectively":[294],"defend":[295],"attackers.":[299]},"counts_by_year":[{"year":2025,"cited_by_count":6}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
