{"id":"https://openalex.org/W4416715148","doi":"https://doi.org/10.1186/s42400-025-00449-3","title":"Incentive mechanisms for crowdsensing: safeguarding against malicious behaviors","display_name":"Incentive mechanisms for crowdsensing: safeguarding against malicious behaviors","publication_year":2025,"publication_date":"2025-11-27","ids":{"openalex":"https://openalex.org/W4416715148","doi":"https://doi.org/10.1186/s42400-025-00449-3"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00449-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00449-3","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00449-3.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00449-3.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017732662","display_name":"Haoran Yin","orcid":"https://orcid.org/0009-0002-8773-1246"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoran Yin","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, Jiangsu, China","School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, Jiangsu, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101540498","display_name":"Jun Tao","orcid":"https://orcid.org/0000-0002-3052-3828"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Tao","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, Jiangsu, China","School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, Jiangsu, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066858777","display_name":"Dingwen Chi","orcid":"https://orcid.org/0000-0002-9224-5640"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dingwen Chi","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, Jiangsu, China","School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, Jiangsu, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":null,"display_name":"Yongji Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongji Chen","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, Jiangsu, China","School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, Jiangsu, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017732662"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3959908,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11675","display_name":"Open Source Software Innovations","score":0.002099999925121665,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.0007999999797903001,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.7337999939918518},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.7318999767303467},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5584999918937683},{"id":"https://openalex.org/keywords/monopoly","display_name":"Monopoly","score":0.49140000343322754},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4909999966621399},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.49050000309944153},{"id":"https://openalex.org/keywords/monopolistic-competition","display_name":"Monopolistic competition","score":0.43459999561309814}],"concepts":[{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.7337999939918518},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.7318999767303467},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.604200005531311},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5584999918937683},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.507099986076355},{"id":"https://openalex.org/C2781127519","wikidata":"https://www.wikidata.org/wiki/Q43637","display_name":"Monopoly","level":2,"score":0.49140000343322754},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4909999966621399},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.49050000309944153},{"id":"https://openalex.org/C80799131","wikidata":"https://www.wikidata.org/wiki/Q379579","display_name":"Monopolistic competition","level":3,"score":0.43459999561309814},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42750000953674316},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38350000977516174},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3808000087738037},{"id":"https://openalex.org/C91306197","wikidata":"https://www.wikidata.org/wiki/Q45767","display_name":"Competition (biology)","level":2,"score":0.36329999566078186},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.36010000109672546},{"id":"https://openalex.org/C153517567","wikidata":"https://www.wikidata.org/wiki/Q26090","display_name":"Mechanism design","level":2,"score":0.34850001335144043},{"id":"https://openalex.org/C91810955","wikidata":"https://www.wikidata.org/wiki/Q7731670","display_name":"Incentive compatibility","level":3,"score":0.3411000072956085},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2712000012397766},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.26840001344680786},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.26089999079704285},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.25209999084472656}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00449-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00449-3","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00449-3.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8c8e4d2cd95143b68aa70fbc32ddf3a2","is_oa":true,"landing_page_url":"https://doaj.org/article/8c8e4d2cd95143b68aa70fbc32ddf3a2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-17 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00449-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00449-3","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00449-3.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4416715148.pdf"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W1486008480","https://openalex.org/W1524287712","https://openalex.org/W1970756365","https://openalex.org/W2029050771","https://openalex.org/W2603469280","https://openalex.org/W2607200639","https://openalex.org/W2624729972","https://openalex.org/W2742699470","https://openalex.org/W2898033943","https://openalex.org/W2898127781","https://openalex.org/W2924254303","https://openalex.org/W2943603304","https://openalex.org/W3006193062","https://openalex.org/W3016819671","https://openalex.org/W3018545713","https://openalex.org/W3019271536","https://openalex.org/W3134782699","https://openalex.org/W4206657864","https://openalex.org/W4210251943","https://openalex.org/W4210320089","https://openalex.org/W4210406404","https://openalex.org/W4213054031","https://openalex.org/W4213416208","https://openalex.org/W4214620565","https://openalex.org/W4214907841","https://openalex.org/W4244056882","https://openalex.org/W4250205741","https://openalex.org/W4281398444","https://openalex.org/W4292085099","https://openalex.org/W4292259048","https://openalex.org/W4312989027","https://openalex.org/W4317904871","https://openalex.org/W4320341128","https://openalex.org/W4364302108","https://openalex.org/W4364360906","https://openalex.org/W4376486182","https://openalex.org/W4376622233","https://openalex.org/W4380450875","https://openalex.org/W4385143003","https://openalex.org/W4387475765","https://openalex.org/W4396886552","https://openalex.org/W4401357859"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1,99,171],"high":[2],"efficiency":[3],"of":[4,42,56,114,182,191],"mobile":[5],"crowdsensing":[6],"(MCS)":[7],"relies":[8],"heavily":[9],"on":[10,51,138],"motivating":[11],"users":[12,110,153,183],"to":[13,39,63,84,105,131,147,168],"participate":[14],"in":[15,31,66,90,189],"sensing":[16],"tasks.":[17],"Designing":[18],"an":[19,81],"auction-based":[20],"incentive":[21,82,187],"mechanism":[22,83,177],"is":[23,102,127],"a":[24,53,64,91,121],"widely":[25],"adopted":[26],"approach.":[27],"However,":[28],"platforms":[29],"operating":[30],"the":[32,72,112,133,143,175],"unrestricted":[33],"Internet":[34],"environment":[35],"are":[36],"inevitably":[37],"vulnerable":[38],"various":[40],"types":[41],"malicious":[43,57,87,97,150,180],"behaviors.":[44],"While":[45],"most":[46],"existing":[47],"studies":[48],"focus":[49],"solely":[50],"countering":[52],"single":[54],"type":[55],"behaviors,":[58],"their":[59],"approaches":[60],"often":[61],"lead":[62],"decline":[65],"task":[67,123,134],"acceptance":[68,135],"rates,":[69],"ultimately":[70],"impacting":[71],"system\u2019s":[73],"utility.":[74],"To":[75],"address":[76],"this":[77,139],"challenge,":[78],"we":[79,141],"propose":[80],"resist":[85],"multiple":[86],"user":[88,118],"behaviors":[89,181],"reverse":[92],"auction,":[93],"including":[94],"monopoly":[95],"and":[96,107,117,157,165,184],"competition.":[98],"PT-IM":[100,130],"model":[101,145],"first":[103],"introduced":[104],"identify":[106],"exclude":[108],"monopolistic":[109],"through":[111,154],"calculation":[113],"tolerance":[115],"price":[116],"capability.":[119],"Additionally,":[120],"novel":[122],"area":[124],"division":[125],"method":[126],"implemented":[128],"within":[129],"improve":[132],"rate.":[136],"Building":[137],"foundation,":[140],"develop":[142],"enhanced":[144],"EPT-IM":[146],"further":[148],"mitigate":[149],"competition":[151],"among":[152],"primary":[155],"selection":[156,159],"secondary":[158],"conditions.":[160],"We":[161],"conduct":[162],"both":[163],"theoretical":[164],"experimental":[166],"analysis":[167],"evaluate":[169],"EPT-IM.":[170],"results":[172],"demonstrate":[173],"that":[174],"proposed":[176],"effectively":[178],"resists":[179],"surpasses":[185],"other":[186],"mechanisms":[188],"terms":[190],"overall":[192],"performance.":[193]},"counts_by_year":[],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2025-11-28T00:00:00"}
