{"id":"https://openalex.org/W7123688344","doi":"https://doi.org/10.1186/s42400-025-00539-2","title":"Privacy-preserving task assignment in mobile crowdsensing: a bilateral location fingerprint-based approach","display_name":"Privacy-preserving task assignment in mobile crowdsensing: a bilateral location fingerprint-based approach","publication_year":2026,"publication_date":"2026-01-14","ids":{"openalex":"https://openalex.org/W7123688344","doi":"https://doi.org/10.1186/s42400-025-00539-2"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00539-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00539-2","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00539-2.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00539-2.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122986351","display_name":"Chao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Wang","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122927445","display_name":"Jun Tao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun Tao","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, Jiangsu, China","School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, Jiangsu, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122930929","display_name":"Shengyu Su","orcid":null},"institutions":[{"id":"https://openalex.org/I4210146051","display_name":"Anyang Institute of Technology","ror":"https://ror.org/03sd3t490","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210146051"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengyu Su","raw_affiliation_strings":["School of Computer Science and Information Engineering, Anyang Institute of Technology, AnYang, 455006, HeNan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Engineering, Anyang Institute of Technology, AnYang, 455006, HeNan, China","institution_ids":["https://openalex.org/I4210146051"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066858777","display_name":"Dingwen Chi","orcid":"https://orcid.org/0000-0002-9224-5640"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dingwen Chi","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5122978768","display_name":"Wenqiang Li","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenqiang Li","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 211189, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5122927445"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11235681,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.0013000000035390258,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.0008999999845400453,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.8294000029563904},{"id":"https://openalex.org/keywords/crowdsensing","display_name":"Crowdsensing","score":0.6085000038146973},{"id":"https://openalex.org/keywords/task-analysis","display_name":"Task analysis","score":0.4392000138759613},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4214000105857849},{"id":"https://openalex.org/keywords/assignment-problem","display_name":"Assignment problem","score":0.4156999886035919},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.3815000057220459},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.36980000138282776}],"concepts":[{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.8294000029563904},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8115000128746033},{"id":"https://openalex.org/C2780821482","wikidata":"https://www.wikidata.org/wiki/Q25381721","display_name":"Crowdsensing","level":2,"score":0.6085000038146973},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.4392000138759613},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4214000105857849},{"id":"https://openalex.org/C85044808","wikidata":"https://www.wikidata.org/wiki/Q620614","display_name":"Assignment problem","level":2,"score":0.4156999886035919},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38190001249313354},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.3815000057220459},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.36980000138282776},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.35910001397132874},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35429999232292175},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35109999775886536},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32829999923706055},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32179999351501465},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.31349998712539673},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.3037000000476837},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.28940001130104065},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.26080000400543213},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.25609999895095825}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00539-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00539-2","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00539-2.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fe7f8ee554dc4fb48f0244cb3239dca4","is_oa":true,"landing_page_url":"https://doaj.org/article/fe7f8ee554dc4fb48f0244cb3239dca4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-23 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00539-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00539-2","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00539-2.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7123688344.pdf","grobid_xml":"https://content.openalex.org/works/W7123688344.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W2222512263","https://openalex.org/W2247608292","https://openalex.org/W2475072863","https://openalex.org/W2886208579","https://openalex.org/W2904846776","https://openalex.org/W2943929564","https://openalex.org/W2964280086","https://openalex.org/W2992059036","https://openalex.org/W3022563222","https://openalex.org/W3028841942","https://openalex.org/W3034956213","https://openalex.org/W3119143557","https://openalex.org/W3120683583","https://openalex.org/W3129515304","https://openalex.org/W3151723181","https://openalex.org/W3160147183","https://openalex.org/W3168063067","https://openalex.org/W3168115244","https://openalex.org/W3184718620","https://openalex.org/W3197180278","https://openalex.org/W3201268413","https://openalex.org/W3212552055","https://openalex.org/W4213416208","https://openalex.org/W4310050354","https://openalex.org/W4313129381","https://openalex.org/W4321609790","https://openalex.org/W4323349487","https://openalex.org/W4385143003","https://openalex.org/W4385270215","https://openalex.org/W4406137690"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Mobile":[1],"crowdsensing":[2],"(MCS)":[3],"leverages":[4],"the":[5,25,34,88,98,128],"multi-sensory":[6],"capabilities":[7],"of":[8,36,91,100,131],"mobile":[9],"devices":[10],"to":[11,45,85,96,126,166],"collect":[12],"diverse":[13],"data":[14],"efficiently.":[15],"However,":[16],"in":[17,156],"MCS,":[18],"inefficient":[19],"task":[20,30,48,59,109,119,162],"assignment":[21,31,49,60,120,163],"strategies":[22],"seriously":[23],"affect":[24],"overall":[26],"effectiveness,":[27],"while":[28,104],"efficient":[29],"frequently":[32],"requires":[33],"collection":[35],"sensitive":[37],"information":[38,103],"about":[39],"users":[40],"and":[41,51,93,141,161],"tasks.":[42,94,134],"In":[43,66],"order":[44],"effectively":[46],"trade-off":[47],"efficiency":[50],"bilateral":[52],"privacy":[53,75,90,142],"security,":[54],"we":[55,69],"propose":[56,70],"a":[57,71,107],"privacy-preserving":[58],"framework":[61],"based":[62,79],"on":[63,80,146],"location":[64,72,89,102,123],"fingerprinting.":[65],"this":[67,151],"investigation,":[68],"fingerprinting-based":[73],"for":[74],"preservation":[76],"mechanism":[77,116],"(LFPM)":[78],"Monte":[81],"Carlo":[82],"stochastic":[83],"algorithm":[84,111],"bidirectionally":[86],"protect":[87],"workers":[92],"Meanwhile,":[95],"overcome":[97],"challenge":[99],"utilizing":[101],"protecting":[105],"privacy,":[106],"two-stage":[108],"allocation":[110],"(TSTA)":[112],"is":[113],"proposed.":[114],"This":[115],"facilitates":[117],"precise":[118],"through":[121],"segmental":[122],"fingerprinting,":[124],"aiming":[125],"minimize":[127],"total":[129],"cost":[130],"completing":[132],"all":[133],"We":[135],"theoretically":[136],"analyze":[137],"its":[138],"lightweight":[139],"design":[140],"features.":[143],"Comparative":[144],"experiments":[145],"real":[147],"datasets":[148],"show":[149],"that":[150],"strategy":[152],"achieves":[153],"significant":[154],"improvements":[155],"communication":[157],"efficiency,":[158],"computational":[159],"performance,":[160],"accuracy":[164],"compared":[165],"other":[167],"methods.":[168]},"counts_by_year":[],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2026-01-14T00:00:00"}
