2017
DOI: 10.1109/jsac.2017.2659258
|View full text |Cite
|
Sign up to set email alerts
|

Trading Data in the Crowd: Profit-Driven Data Acquisition for Mobile Crowdsensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 67 publications
(19 citation statements)
references
References 36 publications
0
19
0
Order By: Relevance
“…In [26], a 'double or nothing' incentivecompatible mechanism is proposed to ensure workers behave honesty based on their self-confidence; this protocol is provable to avoid spammers from the crowd, under the assumption that every worker wants to maximize their expected payment. In [40,39,41,42,44,43], Zheng et al, the authors leverage the tools of game theory and mechanism design to analyze the interaction of rational and selfish mobile users, then design efficient incentive mechanisms for four classical and representative applications in mobile Internet: dynamic spectrum redistribution, mobile crowdsensing, data marketplace, and cloud bandwidth management, to stimulate selfish mobile users to cooperate, achieving a win-win situation.…”
Section: Mechanism Design In Crowdsourcingmentioning
confidence: 99%
“…In [26], a 'double or nothing' incentivecompatible mechanism is proposed to ensure workers behave honesty based on their self-confidence; this protocol is provable to avoid spammers from the crowd, under the assumption that every worker wants to maximize their expected payment. In [40,39,41,42,44,43], Zheng et al, the authors leverage the tools of game theory and mechanism design to analyze the interaction of rational and selfish mobile users, then design efficient incentive mechanisms for four classical and representative applications in mobile Internet: dynamic spectrum redistribution, mobile crowdsensing, data marketplace, and cloud bandwidth management, to stimulate selfish mobile users to cooperate, achieving a win-win situation.…”
Section: Mechanism Design In Crowdsourcingmentioning
confidence: 99%
“…The valuations are obtained using different generative random processes, so as to observe the algorithmic behavior under different scenarios. These generative models are motivated by studies modeling valuations for digital goods in online platforms and their pricing [43,18,34,45,47,13,48].…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…After encryption, every datum donor oi registers the signature δi on the cipher text vector ~Di utilizing her mystery key: Inevitably, oi presents her tuple ( PIDi; ~Di; δi ) to the specialist organization. Then again, to limit an enlisted data giver from utilizing a similar pair of pseudo identity and mystery key for various occasions in various sessions of data procurement [15], one inborn route is to typify the signing stage into the carefully designed gadget. However, another practical route is to give the specialist organization a chance to store those utilized pseudo personalities for duplication check later.…”
Section: Encrypted Data Signingmentioning
confidence: 99%