Privacy-Preserving User Recruitment with Sensing Quality Evaluation in Mobile Crowdsensing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING(2025)
Key words
Sensors,Recruitment,Task analysis,Protection,Privacy,Differential privacy,Perturbation methods,Mobile crowdsensing,user recruitment,privacy protection,combinatorial multi-armed bandit
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined