Mobile crowdsensing (MCS) has emerged as a pivotal element in contemporary communication technology, witnessing substantial growth recently. The advent of 5G [1], the Internet of Things (IoT) [2], and edge computing [3] has propelled MCS to achieve enhanced sensing efficiency and broaden its application spectrum across various domains such as environmental monitoring [4], traffic management [5], and healthcare [6].
However, despite these advantages, MCS confronts significant security and privacy challenges due to its open and diverse nature. Critical concerns encompass data leakage [7,8,9,10], unauthorized access [11,12], data tampering [13,14], and cross-network attacks [15,16]. These issues can severely compromise the stability, privacy, and security of MCS systems. Furthermore, the dynamic mobility of users and devices within MCS introduces additional complexity to conventional security measures, particularly concerning communication and cross-domain access control [17,18].
To tackle these challenges, researchers have devised several strategies aimed at bolstering the security and privacy of MCS systems [19,20,21]. These novel protection mechanisms offer distinct benefits over traditional approaches. They are capable of securing data even with constrained computational and communication resources, enhancing system flexibility, and effectively thwarting sophisticated cyberattacks. These strategies provide both theoretical and practical underpinnings for fortifying MCS security and lay a robust foundation for the field’s future evolution.
As concerns over data privacy and cybersecurity increase [22,23], numerous researchers have proffered innovative solutions in the realms of mobile sensing, the Internet of Things (IoT), and federated learning, with the aim of safeguarding data privacy and bolstering system security. Regarding the protection mechanism for UAV network task chains, Contribution 1 introduces a UAV network mission chain protection mechanism grounded in vulnerability analysis and topology reconfiguration. By employing the multi-indicator node vulnerability assessment algorithm and the node importance-based topology reconfiguration algorithm, this research can effectively pinpoint critical nodes and optimize network topology to enhance both reliability and security. In the domain of recommender systems, Contribution 2 advances a differential privacy-based federated recommendation framework that safeguards user privacy while preserving recommendation accuracy through the addition of noise to model updates. The study substantiates the efficacy of the framework across various datasets experimentally. In Contribution 3, the authors propose an innovative federated recommendation framework that integrates differential privacy techniques to protect user privacy without compromising recommendation accuracy. To fortify privacy protection further, the authors also devise a specialized differential privacy algorithm for ensuring that individual user information cannot be inferred from the global model by meticulously calibrated noise added to aggregated data updates. Moreover, addressing privacy protection challenges within the Internet of Vehicles [24,25], Contribution 4 puts forth a consensus mechanism based on proof-of-multiple-state. This mechanism leverages blockchain technology to resolve data security and privacy issues in vehicular networking while optimizing communication efficiency among mobile nodes. The PoMS mechanism utilizes vehicle driving state predictions and machine learning models to dynamically adjust node weights and select optimal relay nodes, thereby enhancing both the efficiency and security of network communications.
In the realm of affective speech generation, Contribution 5 introduces a method for generating high-quality affective speech data by integrating affective embedding and phonological style embedding. Utilizing the Mel spectrogram as an input, this method generates affective speech through a diffusion process. Addressing challenges in mobile sensors and localization problems, Contribution 7 proposes a multi-source sparse inverse localization technique based on mobile sensors. This approach targets signal source localization issues within long-distance mobile sensor networks. Additionally, a long-range localization method grounded in the block sparse model is presented, along with a unilateral branching ratio decision algorithm designed to adaptively control the iterative process amidst unknown sparsity levels. Building upon these advancements, Contribution 6 presents a swell neural network algorithm tailored for resolving time-varying path query problems while considering privacy protection. The algorithm efficiently identifies multiple paths, including the shortest path, while safeguarding user privacy. It also designs an encrypted indexing scheme to effectively prevent the leakage of user information. Targeting concerns related to privacy breaches and malicious disruptions in electronic voting systems [26,27], Contribution 8 proposes an efficient e-voting system leveraging homomorphic encryption. An enhanced HSE-Voting system is designed, which fortifies system security by incorporating signatures and partial proof-of-knowledge protocols, simultaneously reducing computational costs for proxies. This improved system ensures the accuracy and verifiability of election outcomes while preserving voter privacy.
To tackle the escalating issue of copyright infringement in models [28,29], Contribution 9 introduces a framework named PTFCP. This framework is meticulously designed to counteract the burgeoning threat of model copyright infringement. By leveraging cryptographic technologies, PTFCP facilitates privacy-preserving similarity assessments between victim and suspect models without disclosing sensitive details. In genomics research, Contribution 10 presents MLPPF, a method for the multi-tagging prediction of piRNA function. MLPPF demonstrates its efficacy by efficiently identifying mRNA-associated and lncRNA-associated markers of piRNA function, thereby revealing pivotal elements within piRNA sub-sequences. Regarding WiFi gesture recognition, Contribution 11 addresses cross-domain challenges through an innovative combination of knowledge distillation and Jensen–Shannon scattering techniques. Within the domain of mobile sensors, Contribution 12 proposes a secure certificate signing scheme tailored for resource-constrained devices. This scheme innovates with a novel public key structure that obviates the need for pairing operations. Furthermore, Contribution 13 unveils a pioneering IoT intrusion detection scheme. This scheme harnesses a cutting-edge neural network algorithm to adeptly manage large-scale, heterogeneous, high-dimensional, and time-dependent IoT network traffic data. Lastly, addressing the key management conundrum in identity-based cryptography, Contribution 14 advances a new certificateless signature scheme. This scheme extends the SM2 algorithm into a certificateless context, effectively resolving key management issues while enabling the batch verification of multiple signatures.
In the realm of big data management for IoT, Contribution 15 advances a novel strategy dedicated to safeguarding privacy across extensive networks of systems. This approach ensures the robust protection of both data and model privacy through the synergistic integration of distributed model training and secure model aggregation. Addressing multiple ciphertext equivalence testing, Contribution 16 introduces a certificateless encryption concept that facilitates multiple ciphertext equivalence testing with agent-assisted authorization. The proposed scheme fortifies security by enabling concurrent equivalence tests on numerous ciphertexts while incorporating an innovative agent-assisted authorization mechanism. Within the Internet of Vehicles, Contribution 17 unveils an efficient and secure blockchain consensus protocol. This protocol integrates a trust assessment mechanism, node partition strategy, and Dynamic Unique Node List to significantly enhance reliability and adaptability within IoV environments. Furthermore, it presents dynamic K-medoid practical byzantine fault tolerance—an optimized practical byzantine fault tolerance algorithm—designed to minimize latency and boost throughput efficiency.
In terms of energy efficiency and privacy preservation, Contribution 18 combines a federated learning framework with a pulsed neural network and differential privacy techniques to significantly reduce energy consumption and enhance privacy preservation for large-scale cross-device learning. Regarding blockchain-based privacy protection [30], Contribution 19 introduces privacy-preserving rewritable blockchain. This innovative approach supports flexible policies through an enhanced identity encryption scheme, batch policy support, and improved accountability traceability via a proxy re-encryption mechanism. For privacy protection within mobile crowdsensing applications, Contribution 20 presents PRBFM—a privacy-preserving blockchain framework grounded in thresholded linear secret sharing. By optimizing privacy protection and efficiency through sophisticated policy matching and task delegation mechanisms, this framework sets a new standard in secure data management.
In addressing the challenge of task allocation in spatial crowdsourcing [31], Contribution 21 introduces PKGS—a privacy-preserving hitchhiking task assignment scheme. Leveraging the Paillier cryptosystem, PKGS enables secure computation over encrypted data to safeguard the privacy of both workers and task locations. This innovative approach incorporates a privacy-preserving travel distance calculation protocol and a privacy-preserving comparison protocol to facilitate efficient task assignment while maintaining strict confidentiality. Within the domain of federated learning, Contribution 22 unveils FRIMFL—a fair and reliable incentive mechanism rooted in reverse auctions and reputation trust. Designed to ensure robust client participation and equitable reward distribution, this mechanism incentivizes truthful bidding through integrated reverse auctions. Additionally, it employs a trust-based reputation system to assess the quality of contributions. The proposed method features a weighted trust assessment technique for reliability measurement and utilizes the Shapley value method to allocate rewards fairly based on marginal contributions. Simultaneously, Contribution 23 presents EPTA-T, an advanced task assignment scheme that amalgamates temporal access control with attribute-based encryption. By harnessing an attribute-based encryption framework enhanced by function integration, EPTA-T supports granular and time-bound access control. This ensures effective protection of data privacy during task allocation and significantly enhances overall efficiency. Lastly, tackling the issue of privacy-preserving frequent itemset mining on cloud servers, Contribution 24 proposes PPFIM—a verifiable privacy-preserving frequent itemset mining protocol. Through a dual-cloud architecture and encrypted databases, PPFIM mitigates data leakage risks and fortifies system security, thereby providing a robust solution for preserving privacy in large-scale data analysis tasks.
No new data were created or analyzed in this study.
The authors declare no conflicts of interest.
-
Yue, Q.; Li, J.; Huang, Z.; Xie, X.; Yang, Q. Vulnerability Assessment and Topology Reconstruction of Task Chains in UAV Networks. Electronics 2024, 13, 2126.
https://doi.org/10.3390/electronics13112126 . -
Li, J.; Yue, Q.; Huang, Z.; Xie, X.; Yang, Q. Vulnerability Analysis of UAV Swarm Network with Emergency Tasks. Electronics 2024, 13, 2005.
https://doi.org/10.3390/electronics13112005 . -
Xu, Z.; Chu, C.; Song, S. An Effective Federated Recommendation Framework with Differential Privacy. Electronics 2024, 13, 1589.
https://doi.org/10.3390/electronics13081589 . -
Zhao, F.; Cheng, R.; Li, C.; Su, Z.; Liang, G.; Yang, C. A Proof-of-Multiple-State Consensus Mechanism for Mobile Nodes in Internet of Vehicles. Electronics 2024, 13, 1553.
https://doi.org/10.3390/electronics13081553 . -
Kim, Y.-J.; Lee, S.-P. A Generation of Enhanced Data by Variational Autoencoders and Diffusion Modeling. Electronics 2024, 13, 1314.
https://doi.org/10.3390/electronics13071314 . -
Zhao, M. A Swell Neural Network Algorithm for Solving Time-Varying Path Query Problems with Privacy Protection. Electronics 2024, 13, 1248.
https://doi.org/10.3390/electronics13071248 . -
Ren, J.; Qi, P.; Li, C.; Zhu, P.; Li, Z. Multisource Sparse Inversion Localization with Long-Distance Mobile Sensors. Electronics 2024, 13, 1024.
https://doi.org/10.3390/electronics13061024 . -
Zhan, Y.; Zhao, W.; Zhu, C.; Zhao, Z.; Yang, N.; Wang, B. Efficient Electronic Voting System Based on Homomorphic Encryption. Electronics 2024, 13, 286.
https://doi.org/10.3390/electronics13020286 . -
Wei, D.; Wang, D.; Wang, Z.; Ma, Y. A Privacy-Preserving Testing Framework for Copyright Protection of Deep Learning Models. Electronics 2024, 13, 133.
https://doi.org/10.3390/electronics13010133 . -
Liu, Y.; Li, R.; Lu, Y.; Li, A.; Wang, Z.; Li, W. MLPPF: Multi-Label Prediction of piRNA Functions Based on Pretrained k-mer, Positional Embedding and an Improved TextRNN Model. Electronics 2024, 13, 92.
https://doi.org/10.3390/electronics13010092 . -
Geng, H.; Deng, D.; Zhang, W.; Ji, P.; Wu, X. Personalized Federated Learning Based on Bidirectional Knowledge Distillation for WiFi Gesture Recognition. Electronics 2023, 12, 5016.
https://doi.org/10.3390/electronics12245016 . -
Wang, G.; Shen, H.; Chen, L.; Han, J.; Wu, G. Mobile Sensoring Data Verification via a Pairing-Free Certificateless Signature Secure Approach against Novel Public Key Replacement Attacks. Electronics 2023, 12, 4865.
https://doi.org/10.3390/electronics12234865 . -
Liu, Y.; Lan, Y.; Yang, C.; Ding, Y.; Li, C. A New DSGRU-Based Intrusion Detection Method for the Internet of Things. Electronics 2023, 12, 4745.
https://doi.org/10.3390/electronics12234745 . -
He, C.; Zhang, B.; Zhang, L.; Xi, Z.; Fang, Y.; Wang, Y. Improving Throughput of Mobile Sensors via Certificateless Signature Supporting Batch Verification. Electronics 2023, 12, 4700.
https://doi.org/10.3390/electronics12224700 . -
Karras, A.; Giannaros, A.; Theodorakopoulos, L.; Krimpas, G.A.; Kalogeratos, G.; Karras, C.; Sioutas, S. FLIBD: A Federated Learning-Based IoT Big Data Management Approach for Privacy-Preserving over Apache Spark with FATE. Electronics 2023, 12, 4633.
https://doi.org/10.3390/electronics12224633 . -
Dong, S.; Zhao, Z.; Wang, B.; Gao, W.; Zhang, S. Certificateless Encryption Supporting Multi-Ciphertext Equality Test with Proxy-Assisted Authorization. Electronics 2023, 12, 4326.
https://doi.org/10.3390/electronics12204326 . -
Si, X.; Li, M.; Yao, Z.; Zhu, W.; Liu, J.; Zhang, Q. An Efficient and Secure Blockchain Consensus Protocol for Internet of Vehicles. Electronics 2023, 12, 4285.
https://doi.org/10.3390/electronics12204285 . -
Han, B.; Fu, Q.; Zhang, X. Towards Privacy-Preserving Federated Neuromorphic Learning via Spiking Neuron Models. Electronics 2023, 12, 3984.
https://doi.org/10.3390/electronics12183984 . -
Xu, Y.; Li, Z. PIRB: Privacy-Preserving Identity-Based Redactable Blockchains with Accountability. Electronics 2023, 12, 3754.
https://doi.org/10.3390/electronics12183754 . -
Guo, H.; Liang, H.; Zhao, M.; Xiao, Y.; Wu, T.; Xue, J.; Zhu, L. Privacy-Preserving Fine-Grained Redaction with Policy Fuzzy Matching in Blockchain-Based Mobile Crowdsensing. Electronics 2023, 12, 3416.
https://doi.org/10.3390/electronics12163416 . -
He, P.; Xin, Y.; Hou, B.; Yang, Y. PKGS: A Privacy-Preserving Hitchhiking Task Assignment Scheme for Spatial Crowdsourcing. Electronics 2023, 12, 3318.
https://doi.org/10.3390/electronics12153318 . -
Ahmed, A.; Choi, B.J. FRIMFL: A Fair and Reliable Incentive Mechanism in Federated Learning. Electronics 2023, 12, 3259.
https://doi.org/10.3390/electronics12153259 . -
Song, F.; Liu, Y.; Ma, S.; Jiang, Q.; Zhang, X.; Fu, Z. Enabling Efficient and Privacy-Preserving Task Allocation with Temporal Access Control for Mobile Crowdsensing. Electronics 2023, 12, 3016.
https://doi.org/10.3390/electronics12143016 . -
Zhao, Z.; Lan, L.; Wang, B.; Lai, J. Verifiable Privacy-Preserving Outsourced Frequent Itemset Mining on Vertically Partitioned Databases. Electronics 2023, 12, 1952.
https://doi.org/10.3390/electronics12081952 .
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
References
1. Wang, Z.; Cao, Y.; Jiang, K.; Zhou, H.; Kang, J.; Zhuang, Y.; Tian, D.; Leung, V.C. When Crowdsensing Meets Smart Cities: A Comprehensive Survey and New Perspectives. IEEE Commun. Surv. Tutor.; 2024; early access [DOI: https://dx.doi.org/10.1109/COMST.2024.3400121]
2. Liu, K.; Peng, S.; Gong, W.; Zhang, B.; Li, C. Hybrid user based task assignment for mobile crowdsensing: Problem and algorithm. IEEE Internet Things J.; 2024; 11, pp. 19589-19601. [DOI: https://dx.doi.org/10.1109/JIOT.2024.3367958]
3. Deng, L.; Gong, W.; Liwang, M.; Li, L.; Zhang, B.; Li, C. Towards Intelligent Mobile Crowdsensing With Task State Information Sharing over Edge-Assisted UAV Networks. IEEE Trans. Veh. Technol.; 2024; 73, pp. 11773-11788. [DOI: https://dx.doi.org/10.1109/TVT.2024.3369089]
4. Yu, Z.; Zhao, L.; Cui, H.; Song, Y.; Liu, Y.; Luo, Y.; Guo, B. CrowdKit: A Generic Programming Framework for Mobile Crowdsensing Applications. IEEE Trans. Mob. Comput.; 2024; 23, pp. 10584-10597. [DOI: https://dx.doi.org/10.1109/TMC.2024.3381578]
5. Jiang, Z.; Zhu, H.; Zhou, B.; Lu, C.; Sun, M.; Ma, X.; Fan, X.; Wang, C.; Chen, L. CrowdPatrol: A mobile crowdsensing framework for traffic violation hotspot patrolling. IEEE Trans. Mob. Comput.; 2021; 22, pp. 1401-1416. [DOI: https://dx.doi.org/10.1109/TMC.2021.3110592]
6. Wang, W.; Yang, Y.; Xiong, Z.; Niyato, D. Footstone of metaverse: A timely and secure crowdsensing. IEEE Netw.; 2023; 38, pp. 171-178. [DOI: https://dx.doi.org/10.1109/MNET.134.2200598]
7. Zhang, M.; Chen, S.; Shen, J.; Susilo, W. Privacyeafl: Privacy-enhanced aggregation for federated learning in mobile crowdsensing. IEEE Trans. Inf. Forensics Secur.; 2023; 18, pp. 5804-5816. [DOI: https://dx.doi.org/10.1109/TIFS.2023.3315526]
8. Zhao, B.; Li, X.; Liu, X.; Pei, Q.; Li, Y.; Deng, R.H. CrowdFA: A privacy-preserving mobile crowdsensing paradigm via federated analytics. IEEE Trans. Inf. Forensics Secur.; 2023; 18, pp. 5416-5430. [DOI: https://dx.doi.org/10.1109/TIFS.2023.3308714]
9. An, J.; Ren, Y.; Li, X.; Zhang, M.; Luo, B.; Miao, Y.; Liu, X.; Deng, R.H. Privacy-preserving user recruitment with sensing quality evaluation in mobile crowdsensing. IEEE Trans. Dependable Secur. Comput.; 2024; 22, pp. 787-803. [DOI: https://dx.doi.org/10.1109/TDSC.2024.3418869]
10. Wu, A.; Luo, W.; Yang, A.; Zhang, Y.; Zhu, J. Efficient bilateral privacy-preserving data collection for mobile crowdsensing. IEEE Trans. Serv. Comput.; 2023; 17, pp. 865-877. [DOI: https://dx.doi.org/10.1109/TSC.2023.3308261]
11. Yu, R.; Oguti, A.M.; Obaidat, M.S.; Li, S.; Wang, P.; Hsiao, K.F. Blockchain-based solutions for mobile crowdsensing: A comprehensive survey. Comput. Sci. Rev.; 2023; 50, 100589. [DOI: https://dx.doi.org/10.1016/j.cosrev.2023.100589]
12. Agrawal, A.; Choudhary, S.; Bhatia, A.; Tiwari, K. Pub-SubMCS: A privacy-preserving publish–subscribe and blockchain-based mobile crowdsensing framework. Future Gener. Comput. Syst.; 2023; 146, pp. 234-249. [DOI: https://dx.doi.org/10.1016/j.future.2023.04.018]
13. Cheng, Y.; Ma, J.; Liu, Z.; Li, Z.; Wu, Y.; Dong, C.; Li, R. A privacy-preserving and reputation-based truth discovery framework in mobile crowdsensing. IEEE Trans. Dependable Secur. Comput.; 2023; 20, pp. 5293-5311. [DOI: https://dx.doi.org/10.1109/TDSC.2023.3276976]
14. Zhang, S.; Li, Z.; Liang, W.; Li, K.C.; Bhuiyan, Z.A. Blockchain-Based Hybrid Reliable User Selection Scheme for Task Allocation in Mobile Crowd Sensing. IEEE Trans. Netw. Sci. Eng.; 2024; 11, pp. 6494-6510. [DOI: https://dx.doi.org/10.1109/TNSE.2024.3449146]
15. Wang, T.; Shen, H.; Chen, J.; Chen, F.; Wu, Q.; Xie, D. A hybrid blockchain-based identity authentication scheme for Mobile Crowd Sensing. Future Gener. Comput. Syst.; 2023; 143, pp. 40-50. [DOI: https://dx.doi.org/10.1016/j.future.2023.01.013]
16. Zheng, Z.; Li, Z.; Huang, C.; Long, S.; Shen, X. Defending Data Poisoning Attacks in DP-Based Crowdsensing: A Game-Theoretic Approach. IEEE Trans. Mob. Comput.; 2024; 24, pp. 1859-1876. [DOI: https://dx.doi.org/10.1109/TMC.2024.3486689]
17. Liu, Y.; Yu, Z.; Cui, H.; Helal, S.; Guo, B. SafeCity: A Heterogeneous Mobile Crowd Sensing System for Urban Public Safety. IEEE Internet Things J.; 2023; 10, pp. 18330-18345. [DOI: https://dx.doi.org/10.1109/JIOT.2023.3279385]
18. Zhao, G.; Wang, X.; Wang, J.; Liu, J. Task recommendation for mobile crowd sensing system based on multi-view user dynamic behavior prediction. Peer-Netw. Appl.; 2023; 16, pp. 1536-1550. [DOI: https://dx.doi.org/10.1007/s12083-023-01504-x]
19. Zeng, H.; Xiong, Y.; She, J.; Yu, A. A Task Assignment Scheme Designed for Online Urban Sensing Based on Sparse Mobile Crowdsensing. IEEE Internet Things J.; 2025; early access [DOI: https://dx.doi.org/10.1109/JIOT.2025.3540501]
20. Peng, S.; Zhang, G.; Zhang, B.; Yao, Z.; Liu, C.; Li, C. A Stable Task Assignment Mechanism for Multi-Platform Mobile Crowdsensing. IEEE Trans. Veh. Technol.; 2025; early access [DOI: https://dx.doi.org/10.1109/TVT.2024.3525401]
21. Guo, Q.; He, Y.; Li, Q.; Liu, A.; Xiong, N.N.; He, Q.; Yang, Q.; Zhang, S. PPAT: An effective scheme ensuring privacy-preserving, accuracy, and trust for worker selection in mobile crowdsensing networks. Future Gener. Comput. Syst.; 2025; 163, 107536. [DOI: https://dx.doi.org/10.1016/j.future.2024.107536]
22. Kim, J.W.; Edemacu, K.; Jang, B. Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey. J. Netw. Comput. Appl.; 2022; 200, 103315. [DOI: https://dx.doi.org/10.1016/j.jnca.2021.103315]
23. Suhag, D.; Jha, V. A comprehensive survey on mobile crowdsensing systems. J. Syst. Archit.; 2023; 142, 102952. [DOI: https://dx.doi.org/10.1016/j.sysarc.2023.102952]
24. Wang, N.; Yang, W.; Wang, X.; Wu, L.; Guan, Z.; Du, X.; Guizani, M. A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles. Digit. Commun. Networks; 2024; 10, pp. 126-134. [DOI: https://dx.doi.org/10.1016/j.dcan.2022.05.020]
25. Al Sibahee, M.A.; Nyangaresi, V.O.; Abduljabbar, Z.A.; Luo, C.; Zhang, J.; Ma, J. Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks. IEEE Internet Things J.; 2023; 11, pp. 14253-14266. [DOI: https://dx.doi.org/10.1109/JIOT.2023.3340259]
26. Haines, T.; Mueller, J.; Mosaheb, R.; Pryvalov, I. Sok: Secure e-voting with everlasting privacy. Proceedings of the Privacy Enhancing Technologies Symposium (PETS); Lausanne, Switzerland and Online, 10–15 July 2023.
27. Shankar, A.; Pandiaraja, P.; Sumathi, K.; Stephan, T.; Sharma, P. Privacy preserving E-voting cloud system based on ID based encryption. Peer-Netw. Appl.; 2021; 14, pp. 2399-2409. [DOI: https://dx.doi.org/10.1007/s12083-020-00977-4]
28. Zhang, X.; Li, R.; Yu, J.; Xu, Y.; Li, W.; Zhang, J. Editguard: Versatile image watermarking for tamper localization and copyright protection. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition; Seattle, WA, USA, 16–22 June 2024; pp. 11964-11974.
29. Zhang, X.; Xu, Y.; Li, R.; Yu, J.; Li, W.; Xu, Z.; Zhang, J. V2a-mark: Versatile deep visual-audio watermarking for manipulation localization and copyright protection. Proceedings of the 32nd ACM International Conference on Multimedia; Melbourne, VIC, Australia, 28 October–1 November 2024; pp. 9818-9827.
30. Ferrag, M.A.; Shu, L. The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial. IEEE Internet Things J.; 2021; 8, pp. 17236-17260. [DOI: https://dx.doi.org/10.1109/JIOT.2021.3078072]
31. Wang, L.; Yu, Z.; Wu, K.; Yang, D.; Wang, E.; Wang, T.; Mei, Y.; Guo, B. Towards robust task assignment in mobile crowdsensing systems. IEEE Trans. Mob. Comput.; 2022; 22, pp. 4297-4313. [DOI: https://dx.doi.org/10.1109/TMC.2022.3151190]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Details
1 School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China
2 School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China;
3 School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China;