{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T07:11:03Z","timestamp":1771571463025,"version":"3.50.1"},"reference-count":42,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072475"],"award-info":[{"award-number":["62072475"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1016\/j.ins.2024.120329","type":"journal-article","created":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T20:01:34Z","timestamp":1708200094000},"page":"120329","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["A trust active and Trace back based trust Management system about effective data collection for mobile IoT services"],"prefix":"10.1016","volume":"664","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0584-5104","authenticated-orcid":false,"given":"Rui","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5234-7044","authenticated-orcid":false,"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4819-621X","authenticated-orcid":false,"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Neal N.","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.ins.2024.120329_b0005","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MVT.2020.3002522","article-title":"Detecting Fake Mobile Crowdsensing Tasks: Ensemble Methods Under Limited Data","volume":"15","author":"Simsek","year":"2020","journal-title":"IEEE Veh. Technol. Mag."},{"issue":"1","key":"10.1016\/j.ins.2024.120329_b0010","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/TNSE.2020.3038454","article-title":"An Intelligent Collaboration Trust Interconnections System for Mobile Information Control in Ubiquitous 5G networks","volume":"8","author":"Huang","year":"2020","journal-title":"IEEE Trans. Network Sci. Eng."},{"issue":"6","key":"10.1016\/j.ins.2024.120329_b0015","doi-asserted-by":"crossref","first-page":"4206","DOI":"10.1109\/TII.2019.2957791","article-title":"CrowdBLPS: A Blockchain-Based Location-Privacy-Preserving Mobile Crowdsensing System","volume":"16","author":"Zou","year":"2020","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"1","key":"10.1016\/j.ins.2024.120329_b0020","first-page":"1","article-title":"SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications","volume":"10","author":"Concone","year":"2020","journal-title":"HCIS"},{"issue":"8","key":"10.1016\/j.ins.2024.120329_b0025","doi-asserted-by":"crossref","first-page":"7407","DOI":"10.1109\/JIOT.2020.2984826","article-title":"Coverage-Oriented Task Assignment for Mobile Crowdsensing","volume":"7","author":"Song","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.ins.2024.120329_b0030","doi-asserted-by":"crossref","first-page":"5826","DOI":"10.1109\/JIOT.2023.3308072","article-title":"TVD-RA: A Truthful Data Value Discovery based Reverse Auction Incentive System for MCS","volume":"11","author":"Wang","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"10.1016\/j.ins.2024.120329_b0035","doi-asserted-by":"crossref","first-page":"3790","DOI":"10.1109\/TMC.2022.3147871","article-title":"A UAV-assisted Multi-task Allocation Method for Mobile Crowd Sensing","volume":"22","author":"Gao","year":"2023","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.ins.2024.120329_b0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119424","article-title":"A Content based Trust Evaluation Scheme for Data Collection with Internet of Everything","volume":"647","author":"Zheng","year":"2023","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2024.120329_b0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119444","article-title":"Credit and Quality Intelligent Learning based Multi-armed Bandit Scheme for Unknown Worker Selection in Multimedia MCS","volume":"647","author":"Tang","year":"2023","journal-title":"Inf. Sci."},{"issue":"4","key":"10.1016\/j.ins.2024.120329_b0050","doi-asserted-by":"crossref","first-page":"2762","DOI":"10.1109\/TII.2021.3109437","article-title":"Optimizing Task Location Privacy in Mobile Crowdsensing Systems","volume":"18","author":"Dong","year":"2021","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"7","key":"10.1016\/j.ins.2024.120329_b0055","doi-asserted-by":"crossref","first-page":"4648","DOI":"10.1109\/TITS.2020.3023446","article-title":"A Deep Learning-Based Mobile Crowdsensing Scheme by Predicting Vehicle Mobility","volume":"22","author":"Zhu","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"9","key":"10.1016\/j.ins.2024.120329_b0060","doi-asserted-by":"crossref","first-page":"4618","DOI":"10.1109\/TVT.2014.2317701","article-title":"QoI-Aware Multitask-Oriented Dynamic Participant Selection With Budget Con-straints","volume":"63","author":"Song","year":"2014","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.ins.2024.120329_b0065","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121119","article-title":"Truth based Three-tier Combinatorial Multi-Armed Bandit Ecosystems for Mobile Crowdsensing","volume":"236","author":"Peng","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.ins.2024.120329_b0070","article-title":"Joint Optimization Risk Factor and Energy Consumption in IoT networks with TinyML-enabled Internet of UAVs","author":"Liu","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.ins.2024.120329_b0075","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1016\/j.ins.2020.08.117","article-title":"Improving data and model quality in crowdsourcing using cross-entropy-based noise correction","volume":"546","author":"Xu","year":"2021","journal-title":"Inf. Sci."},{"issue":"7","key":"10.1016\/j.ins.2024.120329_b0080","doi-asserted-by":"crossref","first-page":"4648","DOI":"10.1109\/TITS.2020.3023446","article-title":"A Deep Learning-Based Mobile Crowdsensing Scheme by Predicting Vehicle Mobility","volume":"22","author":"Zhu","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.ins.2024.120329_b0085","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119286","article-title":"A Decentralized Trust Inference Approach with Intelligence to Improve Data Collection Quality for MCS","volume":"644","author":"Yang","year":"2023","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2024.120329_b0090","doi-asserted-by":"crossref","DOI":"10.1109\/TII.2022.3153031","article-title":"Multi-Period Unmanned Aerial Vehicles Path Planning with Dynamic Emergency Priorities for Geohazards Monitoring","author":"Wang","year":"2022","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"7","key":"10.1016\/j.ins.2024.120329_b0095","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.1109\/TCAD.2019.2917844","article-title":"Noise-Aware DVFS for Efficient Transitions on Battery-Powered IoT Devices","volume":"39","author":"Zhuo","year":"2020","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"10.1016\/j.ins.2024.120329_b0100","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1016\/j.ins.2019.02.011","article-title":"Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing","volume":"527","author":"Tang","year":"2020","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2024.120329_b0105","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119245","article-title":"DLFTI: A Deep Learning based Fast Truth Inference Mechanism for Distributed Spatiotemporal Data in Mobile Crowd Sensing","volume":"644","author":"Tang","year":"2023","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.ins.2024.120329_b0110","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1109\/TSMC.2020.3049082","article-title":"Trustworthiness Assessment of Users in Social Reviewing Systems","volume":"52","author":"Esposito","year":"2021","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"10.1016\/j.ins.2024.120329_b0115","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/978-3-642-12654-3_9","article-title":"Recruitment framework for participatory sensing data collections","author":"Reddy","year":"2010","journal-title":"Pervasive Computing"},{"key":"10.1016\/j.ins.2024.120329_b0120","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1016\/j.ins.2022.11.075","article-title":"MAPP: An efficient multi-location task allocation framework with personalized location privacy-protecting in spatial crowdsourcing","volume":"619","author":"Fan","year":"2023","journal-title":"Inf. Sci."},{"issue":"9","key":"10.1016\/j.ins.2024.120329_b0125","doi-asserted-by":"crossref","first-page":"8722","DOI":"10.1109\/JIOT.2020.2996229","article-title":"CrowdR-FBC: A Distributed Fog-Blockchains for Mobile Crowdsourcing Reputation Management","volume":"7","author":"Yu","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.ins.2024.120329_b0130","doi-asserted-by":"crossref","first-page":"2607","DOI":"10.1109\/TMC.2020.2984261","article-title":"LEAD: Large-Scale Edge Cache Deployment Based on Spatio-Temporal WiFi Traffic Statistics","volume":"20","author":"Lyu","year":"2020","journal-title":"IEEE Trans. Mobile Comput"},{"issue":"2","key":"10.1016\/j.ins.2024.120329_b0135","doi-asserted-by":"crossref","first-page":"922","DOI":"10.1109\/TII.2019.2957130","article-title":"An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT","volume":"17","author":"Xiong","year":"2019","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"2","key":"10.1016\/j.ins.2024.120329_b0140","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1109\/TNSE.2020.3017556","article-title":"Unmanned Aerial Vehicle Trajectory Optimization for Improved Data Collection in Social Networks","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE Trans. Network Sci. Eng."},{"key":"10.1016\/j.ins.2024.120329_b0145","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.ins.2021.05.020","article-title":"STMTO: A smart and trust multi-UAV task offloading system","volume":"573","author":"Guo","year":"2021","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2024.120329_b0150","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ins.2022.11.048","article-title":"Towards stable task assignment with preference lists and ties in spatial crowdsourcing","volume":"620","author":"Huang","year":"2023","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2024.120329_b0155","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119361","article-title":"Three-way decision based participants selection optimization model in sparse mobile crowdsensing","volume":"645","author":"Wang","year":"2023","journal-title":"Inf. Sci."},{"issue":"3","key":"10.1016\/j.ins.2024.120329_b0160","doi-asserted-by":"crossref","first-page":"1932","DOI":"10.1109\/TITS.2021.3052979","article-title":"Vehicle Assisted Computing Offloading for Unmanned Aerial Vehicles in Smart City","volume":"22","author":"Dai","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"9","key":"10.1016\/j.ins.2024.120329_b0165","doi-asserted-by":"crossref","first-page":"2891","DOI":"10.1109\/TMC.2020.2992256","article-title":"Time-Efficient Target Tags Information Collection in Large-scale RFID Systems","volume":"20","author":"Liu","year":"2020","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.ins.2024.120329_b0170","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/j.ins.2021.06.016","article-title":"Research on AI security enhanced encryption algorithm of autonomous IoT systems","author":"Li","year":"2021","journal-title":"Information sciences,575"},{"key":"10.1016\/j.ins.2024.120329_b0175","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119472","article-title":"Generative adversarial networks-based dynamic multi-objective task allocation algorithm for crowdsensing","volume":"647","author":"Ji","year":"2023","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2024.120329_b0180","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.ins.2022.08.087","article-title":"X. Crowdsensing based missing data inference algorithm considering outlier data and GPS errors","volume":"612","author":"Tian","year":"2022","journal-title":"Inf. Sci."},{"issue":"4","key":"10.1016\/j.ins.2024.120329_b0185","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1109\/TMC.2014.2330302","article-title":"Quality of contributed service and market equilibrium for participatory sensing","volume":"14","author":"Tham","year":"2015","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.ins.2024.120329_b0190","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1016\/j.ins.2022.11.081","article-title":"Satisfaction-aware Task Assignment in Spatial Crowdsourcing","volume":"622","author":"Xie","year":"2023","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2024.120329_b0195","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1016\/j.ins.2022.06.068","article-title":"A real-time pricing mechanism considering data freshness based on non-cooperative game in crowdsensing","volume":"608","author":"Wu","year":"2022","journal-title":"Inf. Sci."},{"issue":"5","key":"10.1016\/j.ins.2024.120329_b0200","doi-asserted-by":"crossref","first-page":"786","DOI":"10.1109\/TSC.2018.2825986","article-title":"Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing","volume":"12","author":"Ma","year":"2019","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.ins.2024.120329_b0205","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.ins.2022.07.176","article-title":"TDTA: A truth detection based task assignment scheme for mobile crowdsourced Industrial Internet of Things","volume":"610","author":"Zhang","year":"2022","journal-title":"Inf. Sci."},{"issue":"12","key":"10.1016\/j.ins.2024.120329_b0210","doi-asserted-by":"crossref","first-page":"2995","DOI":"10.1109\/TIFS.2018.2834232","article-title":"REAP: An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing","volume":"13","author":"Zhang","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025524002421?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025524002421?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T06:19:24Z","timestamp":1758089964000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025524002421"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":42,"alternative-id":["S0020025524002421"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2024.120329","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2024,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A trust active and Trace back based trust Management system about effective data collection for mobile IoT services","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2024.120329","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"120329"}}