Human intelligence tasks(HITs),such as labeling images for machine learning,are widely utilized for crowdsourcing human *** crowdsourcing platforms face challenges of a single point of failure and a lack of service **...
详细信息
Human intelligence tasks(HITs),such as labeling images for machine learning,are widely utilized for crowdsourcing human *** crowdsourcing platforms face challenges of a single point of failure and a lack of service *** blockchain-based crowdsourcing approaches overlook the low scalability problem of permissionless blockchains or inconveniently rely on existing ground-truth data as the root of trust in evaluating the quality of workers’*** propose a blockchain-based crowdsourcing scheme for ensuring dual fairness(i.e.,preventing false reporting and free riding)and improving on-chain efficiency concerning on-chain storage and smart contract *** proposed scheme does not rely on trusted authorities but rather depends on a public blockchain to guarantee dual *** efficient and publicly verifiable truth discovery scheme is designed based on majority voting and cryptographic *** truth discovery scheme aims at inferring ground truth from workers’*** ground truth is further utilized to estimate the quality of workers’***,a novel blockchain-based protocol is designed to further reduce on-chain costs while ensuring *** scheme has O(n)complexity for both on-chain storage and smart contract computation,regardless of the number of questions,where𝑛denotes the number of *** security analysis is provided,and extensive experiments are conducted to evaluate its effectiveness and performance.
In this paper we investigate the problem of searching for a black hole in a dynamic graph by a set of scattered agents (i.e., the agents start from arbitrary locations of the graph). The black hole is a node that sile...
详细信息
Coverage hole restoration and connectivity is a typical problem for underwater wireless sensor networks. In underwater applications like underwater oilfield reservoirs, undersea minerals and monitoring etc., where nod...
详细信息
Benefited from their flexibility and on-demand deployment capability, unmanned aerial vehicles (UAVs) have emerged as critical aerial communication platforms in future Internet of Vehicles (IoV). However, limited spec...
详细信息
Various applications, including space exploration, transportation, factories, and the military, demand the presence of mobile robots. In those applications, navigation algorithms are essential for enabling mobile robo...
详细信息
Agrivoltaic (AV) systems can simultaneously produce food and energy, providing a much-needed solution to balance the food-energy nexus for the growing global population. In this context, it is crucial to identify opti...
详细信息
Noise as an unwanted interference can significantly degrade speech signals, especially those recorded by many microphones. This interference is modeled as additive noise that originates from a range of sources includi...
详细信息
The research discusses a multimodal framework for analyzing and detecting fake news and understanding its impact on society. This framework employs diverse strategies, including linguistic analysis, social network mon...
详细信息
This research introduces a Hybrid Intrusion Detection System (HIDS) that merges signature-based detection, with AI-powered anomaly detection to enhance the accuracy and effectiveness of identifying cyber threats. The ...
详细信息
Owing to the explosive growth of the Internet of Things (IoT), there have been vast volumes of sensor-generated time series data in various locations. A lot of network usage occurs through these locations to process t...
详细信息
暂无评论