2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) 2019
DOI: 10.1109/icdcs.2019.00091
|View full text |Cite
|
Sign up to set email alerts
|

A Sybil-Resistant Truth Discovery Framework for Mobile Crowdsensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…The solution of data analysis usually focuses on the data analysis phase by using data processing methods such as Bayesian [ 18 ], machine learning clustering algorithm [ 19 ], and truth inference [ 20 , 21 ], in order to find the low quality of service. Lin et al [ 20 ] proposed a Sybil-resistant truth inference framework for MCS, which included three account grouping methods in pair with a truth inference algorithm to defend against the Sybil attacks. Liu et al [ 19 ] proposed a probabilistic model to jointly infer multi-dimensional trust of workers, multi-domain properties of questions, and true labels of questions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The solution of data analysis usually focuses on the data analysis phase by using data processing methods such as Bayesian [ 18 ], machine learning clustering algorithm [ 19 ], and truth inference [ 20 , 21 ], in order to find the low quality of service. Lin et al [ 20 ] proposed a Sybil-resistant truth inference framework for MCS, which included three account grouping methods in pair with a truth inference algorithm to defend against the Sybil attacks. Liu et al [ 19 ] proposed a probabilistic model to jointly infer multi-dimensional trust of workers, multi-domain properties of questions, and true labels of questions.…”
Section: Related Workmentioning
confidence: 99%
“…With the strategies S2–S3, spam workers may acquire a “good” reputation and then continuously pose threats to crowdsourcing platforms. According to previous research, it can be divided into four categories to improve the service quality: (1) Verification-based Defense Model [ 15 , 16 , 17 ]; (2) Data Analysis Solution [ 18 , 19 , 20 , 21 ]; (3) Workers’ Properties Matching Mechanism [ 22 , 23 , 24 , 25 ]; and (4) Trust-based Model [ 4 , 26 , 27 , 28 ].Verification-based Defense Models adopt the method of re-checking the submitted answers to discover spam workers so that these models require a lot of resources. Data Analysis Solutions filter out valuable services by analyzing data submitted by workers.…”
Section: Introductionmentioning
confidence: 99%
“…Huang et al [10] researched potential combinations of traditional Automated Passenger Counters (APC) and a novel source capable of collecting detailed mobile demand data but did not include a reputation management module to prevent malicious data uploads. However, these mechanisms face several challenges in traditional crowdsourcing systems: 1) platform security lacks robust guarantees and may be susceptible to attacks [11]; 2) there exists a potential for large-scale privacy breaches [12]; and 3) incentive mechanisms relying on reputation scores may encounter issues as reputation updates hinge on task demander evaluations, occasionally lacking a dedicated reputation update module.…”
mentioning
confidence: 99%