Identifying Malicious Players in GWAP-based Disaster Monitoring Crowdsourcing System

Add code
Sep 14, 2019
Figure 1 for Identifying Malicious Players in GWAP-based Disaster Monitoring Crowdsourcing System
Figure 2 for Identifying Malicious Players in GWAP-based Disaster Monitoring Crowdsourcing System

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: