[1] A. Doan, R. Ramakrishnan, and A. Y. Halevy, “Crowdsourcing systems on the world-wide web,” Communications of the ACM, vol. 54, no. 4, pp. 86–96, 2011.
[2] J. A. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, and B. Srivastava, “Participatory sensing,” in Proceedings of the 1st Workshop on World-Sensor-Web (WSW), 2006, pp. 1–5.
[3] S. Reddy, A. Parker, J. Hyman, J. Burke, D. Estrin, and M. Hansen, “Image browsing, processing, and clustering for participatory sensing: Lessons from a dietsense prototype,” in Proceedings of the 4th ACM Workshop on Embedded Networked Sensors, 2007, pp.
13–17.
[4] E. P. Stuntebeck, J. S. Davis II, G. D. Abowd, and M. Blount, “Healthsense: classification of health-related sensor data through user-assisted machine learn-ing,” in Proceedings of the 9th workshop on Mobile computing systems and applications. ACM, 2008, pp. 1–5.
[5] Y. F. Dong, S. S. Kanhere, C. T. Chou, and R. P. Liu, “Automatic image capturing and processing for petrolwatch,” in Proceedings of the 17th IEEE International Conference on Networks (ICON), 2011, pp. 236–240.
[6] B. Hull, V. Bychkovsky, Y. Zhang, K. Chen, M. Goraczko, A. Miu, E. Shih, Balakrishnan, and S. Madden, “Cartel: a distributed mobile sensor comput-ing system,” in Proceedings of the 4th international conference on Embedded networked sensor systems. ACM, 2006, pp. 125–138.
[7] R. K. Rana, C. T. Chou, S. S. Kanhere, N. Bulusu, and W. Hu, “Ear-phone: an end-to-end participatory urban noise mapping system,” in Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2010, pp.
105–116.
[8] P. Johnson, A. Kapadia, D. Kotz, N. Triandopoulos, and N. Hanover, “People-centric urban sensing: Security challenges for the new paradigm,” TR2007-586, Dartmouth College, Computer Science, Hanover, NH, Tech. Rep., 2007.
[9] K. Shilton, “Four billion little brothers?: Privacy, mobile phones, and ubiqui-tous data collection,” Communications of the ACM, vol. 52, no. 11, pp. 48–53, 2009.
[10] D. Christin, A. Reinhardt, S. S. Kanhere, and M. Hollick, “A survey on privacy in mobile participatory sensing applications,” Journal of Systems and Software, vol. 84, no. 11, pp. 1928–1946, 2011.
[11] I. Krontiris and F. C. Freiling, “Integrating people-centric sensing with social networks: A privacy research agenda,” in Proceedings of the 8th IEEE Inter-national Conference on Pervasive Computing and Communications Workshops (PERCOM), 2010, pp. 620–623.
[12] I. Krontiris and F. Freiling, “Urban sensing through social networks: The tension between participation and privacy,” in Proceedings of the International Tyrrhenian Workshop on Digital Communications (ITWDC), 2010.
[13] M. Demirbas, M. A. Bayir, C. G. Akcora, Y. S. Yilmaz, and H. Ferhatosman-oglu, “Crowd-sourced sensing and collaboration using twitter,” in Proceedings of the IEEE International Symposium on World of Wireless Mobile and Multi-media Networks (WoWMoM), 2010, pp. 1–9.
[14] S. Reddy, D. Estrin, and M. Srivastava, “Recruitment framework for partici-patory sensing data collections,” in Pervasive Computing, ser. Lecture Notes in Computer Science, 2010, vol. 6030, pp. 138–155.
[15] A. Dua, N. Bulusu, W.-C. Feng, and W. Hu, “Towards trustworthy participa-tory sensing,” in Proceedings of the Usenix Workshop on Hot Topics in Security (HotSec), 2009, pp. 8–8.
[16] S. Saroiu and A. Wolman, “I am a sensor, and i approve this message,” in Proceedings of the 11th ACM Workshop on Mobile Computing Systems and Applications (HotMobile), 2010, pp. 37–42.
[17] “Trusted computing group,” https://www. trustedcomputinggroup.org/home.
[18] K. L. Huang, S. S. Kanhere, and W. Hu, “On the need for a reputation system in mobile phone based sensing,” Ad Hoc Networks, vol. 12, no. 0, pp. 130–149, 2014.
[19] S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, “Reputation-based framework for high integrity sensor networks,” in ACM Transactions on Sensor Networks (TOSN), 2008, vol. 4, no. 3, p. 15.
[20] A. Mukherjee, B. Liu, and N. Glance, “Spotting fake reviewer groups in consumer reviews,” in Proceedings of the 21st ACM International Conference on World Wide Web, 2012, pp. 191–200.
[21] H. Amintoosi and S. Kanhere, “A reputation framework for social participa-tory sensing systems,” in Mobile Networks and Applications (MONET), 2014, vol. 19, no. 1, pp. 88–100.
[22] H. Amintoosi and S. S. Kanhere, “A trust-based recruitment framework for multi-hop social participatory sensing,” in Proceedings of the 9th IEEE Inter-national Conference on Distributed Computing in Sensor Systems (DCOSS), 2013, pp. 266–273.
[23] H. Amintoosi and S. Kanhere, “Privacy-aware trust-based recruitment in so-cial participatory sensing,” in 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services (MobiQuitous), 2013, pp. 262–275.
[24] H. Amintoosi, S. S. Kanhere, and M. Allahbakhsh, “Trust-based privacy-aware participant selection in social participatory sensing,” Journal of Infor-mation Security and Applications, vol. 20, pp. 11–25, 2015.
[25] R. Agrawal and R. Srikant, “Fast algorithms for mining association rules,” in Proceedings of the 20th International Conference on Very Large Data Bases (VLDB), vol. 1215, 1994, pp. 487–499.
[26] T. Brijs, B. Goethals, G. Swinnen, K. Vanhoof, and G. Wets, “A data mining framework for optimal product selection in retail supermarket data: the generalized profset model,” in Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2000, pp. 300–304.
[27] T. Brijs, G. Swinnen, K. Vanhoof, and G. Wets, “Using association rules for product assortment decisions: A case study,” in Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999, pp. 254–260.
[28] W. Lee, S. J. Stolfo, and K. W. Mok, “Adaptive intrusion detection: A data mining approach,” Artificial Intelligence Review, vol. 14, no. 6, pp. 533–567, 2000.
[29] G. Grahne and J. Zhu, “Fast algorithms for frequent itemset mining using fp-trees,” IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 10, pp. 1347–1362, 2005.
[30] M. Allahbakhsh, A. Ignjatovic, B. Benatallah, S.-M.-R. Beheshti, E. Bertino, and N. Foo, “Collusion detection in online rating systems,” in Proceedings of the 15th Asia Pacific Web Conference (APWeb), 2013, pp. 196–207.
[31] E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw, “Detecting product review spammers using rating behaviors,” in Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM), 2010, pp. 939–948.
[32] G. Salton, C. Buckley, and E. A. Fox, “Automatic query formulations in in-formation retrieval,” Journal of the American Society for Information Science, vol. 34, no. 4, pp. 262–280, 1983.
[33] J. Leskovec, L. Adamic, and B. Huberman, “The dynamics of viral market-ing,” ACM Transactions on the Web (TWEB), vol. 1, no. 1, pp. 1–39, 2007.
[34] R. Levien and A. Aiken, “Attack-resistant trust metrics for public key cer-tification,” in Proceedings of the 7th USENIX Security Symposium, 1998, pp. 229–242.
[35] H. R. Motahari Nezhad, G. Y. Xu, and B. Benatallah, “Protocol-aware matching of web service interfaces for adapter development,” in Proceedings of the 19th ACM International Conference on World Wide Web, 2010, pp. 731– 740.
[36] G. Chowdhury, Introduction to Modern Information Retrieval. Facet pub-lishing, 2010.
[37] T. Malone, R. Laubacher, and C. Dellarocas, “Harnessing crowds: Mapping the genome of collective intelligence,” in MIT Sloan Research Paper, 2009.
[38] S. S. Kanhere, “Participatory sensing: Crowdsourcing data from mobile smartphones in urban spaces,” in Distributed Computing and Internet Tech-nology. Springer, 2013, pp. 19–26.
[39] “Collusion in peer-to-peer systems,” in Computer Networks, 2011, vol. 55, no. 15, pp. 3517 – 3532.
[40] Q. Lian et. al., “An empirical study of collusion behavior in the maze p2p file-sharing system,” in 27th International Conference on Distributed Comput-ing Systems. IEEE Computer Society, 2007, pp. 56–.
[41] Y. Sun and Y. Liu, “Security of online reputation systems: The evolution of attacks and defenses,” in Signal Processing Magazine, IEEE, 2012, vol. 29, no. 2, pp. 87 –97.
Send comment about this article