Next Article in Journal
Local Property of Depth Information in 3D Images and Its Application in Feature Matching
Next Article in Special Issue
Observability of Discrete-Time Two-Time-Scale Multi-Agent Systems with Heterogeneous Features under Leader-Based Architecture
Previous Article in Journal
Learning Emotion Assessment Method Based on Belief Rule Base and Evidential Reasoning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Toward Zero-Determinant Strategies for Optimal Decision Making in Crowdsourcing Systems

1
College of Mathematics and Computer Science, Zhejiang Normal University, Jinhua 321004, China
2
The Key Laboratory of Smart Manufacturing in Energy Chemical Process, Ministry of Education, East China University of Science and Technology, Shanghai 200237, China
3
College of Physics and Electronics Information Engineering, Zhejiang Normal University, Jinhua 321004, China
4
School of Mathematics, Southeast University, Nanjing 210096, China
5
Department of Electrical Engineering, City University of Hong Kong, Hong Kong SAR, China
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(5), 1153; https://doi.org/10.3390/math11051153
Submission received: 12 January 2023 / Revised: 20 February 2023 / Accepted: 23 February 2023 / Published: 26 February 2023
(This article belongs to the Special Issue Game Theory and Complex Networks)

Abstract

:
The crowdsourcing system is an internet-based distributed problem-solving and production organization model, which has been applied in human–computer interaction, databases, natural language processing, machine learning and other fields. It guides the public to complete some tasks through specific strategies and methods. However, rational and selfish workers in crowdsourcing systems will submit solutions of different qualities in order to maximize their own benefits. Therefore, how to choose optimal strategies for selfish workers to maximize their benefits is important and crucial in such a scenario. In this paper, we propose a decision optimization method with incomplete information in a crowdsourcing system based on zero-determinant (ZD) strategies to help workers make optimal decisions. We first formulate the crowdsourcing problem, where workers have “winner-takes-all” rules as an iterated game with incomplete information. Subsequently, we analyze the optimal decision of workers in crowdsourcing systems in terms of ZD strategies, for which we find conditions to reach the maximum payoff of a focused worker. In addition, the analysis helps understand what solutions selfish workers will submit under the condition of having incomplete information. Finally, numerical simulations illustrate the performances of different strategies and the effects of the parameters on the payoffs of the focused worker.

1. Introduction

1.1. Background and Motivation

A crowdsourcing system refers to the practical framework of a company or organization outsourcing work tasks that used to be performed by workers in a voluntary manner to non-specific mass networks. Over the past decade, crowdsourcing has become a low-cost effective way to obtain simple task solutions that are difficult for humans but easy for computers [1,2,3]. In addition, the crowdsourcing system can be regarded as a network containing many workers as nodes. Furthermore, crowdsourcing has developed into an effective model for many challenging issues, such as algorithm theory, artificial intelligence and algorithm mechanism design [4,5].
Specifically, the core of crowdsourcing lies in the wisdom of the crowd and outsourcing [6]. Firstly, the requesters post tasks on the crowdsourcing platform and provide relevant rewards. Then, the workers accept the tasks according to their own considerations. After the tasks are solved, workers submit their solutions to the crowdsourcing platform, which delivers them to the requesters. Finally, the system rewards the workers based on the quality of the solutions evaluated [7,8].
Workers who accept the tasks are clear about the task objectives. Therefore, they analyze various possible action plans and select the optimal one to form a complete decision-making process. Specifically, each worker has some incomplete information; i.e., he or she only knows his or her own information but not that of the others [9]. In this case, each worker only knows the quality of the solution he or she will provide but does not know the quality of the solutions provided by other workers [10].
Moreover, workers are always strategic by submitting different quality solutions to maximize their own benefits. They will choose the right strategy from their strategy sets to accomplish the tasks. When a worker receives a task posted by a requester, he or she may be selfish, while all workers want to maximize their own benefits. The solution submitted by each worker is the best response to the solutions chosen by other workers [11]. However, in cases where the requester posts more than one task in a crowdsourcing system, each worker chooses to participate in the tasks and submit more than one solution. As a consequence, in the context of incomplete information [12], how to make decisions for selfish and greedy workers to obtain the maximum benefit becomes a crucial issue to explore in crowdsourcing systems. The analysis provides a valuable reference for future research.

1.2. Problem Formulation

In general, crowdsourcing systems classify tasks into different types. For example, some question answering software includes dozens of task types, from study to travel. Therefore, a crowdsourcing process will last for a long time. In this case, there are a number of tasks in the crowdsourcing systems, and the tasks are accomplished through a bundled scheme, i.e., several tasks operate as a group with reward splitting [13]. When a task is published, the requester submits its reward to the crowdsourcing platform. The crowdsourcing platform bundles several tasks, which need to be completed one by one in sequence. As for workers, they can invest different levels of effort to solve a task, which results in different levels of contributions. After the task is resolved and the requester’s comments are received, the crowdsourcing platform distributes the rewards to all workers participating in the task. Specifically, if the quality of the solution is high, the requester will give a large reward to the worker, while if the quality of the solution is low, the requester will give a small reward or even no reward. This is called the “winner-takes-all” rule [13,14].
We consider the problem of optimal decision making under the rule of “winner-takes-all” in crowdsourcing systems [15], that is, how to provide optimal quality of solutions for selfish workers to maximize their own benefits. Here, the problem is challenging in the following aspects. First, the strategies of workers influence each other, as each worker’s choices affect the benefits of other workers as well as the quality of the solutions they submit. Second, the process is iterative toward a number of tasks, in which workers will make certain adaptive decisions according to other workers’ strategies, and each worker’s current choice will influence other workers’ future choices. Third, each worker has only incomplete information. Therefore, under these conditions, it is difficult for a worker to guess the behaviors of other workers so as to make an optimal decision in the iterating process.

1.3. Solution and Contributions

Our focus is to help a worker choose the best strategies in a crowdsourcing system to maximize his or her benefits. Although a worker will not know the strategies of other workers, he or she can try to find the sum benefits of other workers. In 2012, Press and Dyson [16] showed the existence of ZD strategies, which allowed a player to unilaterally enforce a linear relationship between his or her payoff and the co-player’s payoff, regardless of the strategy of the co-player. Inspired by this, we apply ZD strategies to deal with the optimal decision making for workers with incomplete information in a crowdsourcing system. The contributions of this paper are as follows.
  • A crowdsourcing scenario is modeled, where workers have incomplete information, as an iterative game. In this model, the requester allocates the reward according to the “winner-takes-all” rule, for which solutions provided by different workers are independent, and selfish workers compete for the reward also with incomplete information.
  • A theoretic method with ZD strategies is proposed to analyze the optimal decision-making problem in crowdsourcing systems. Moreover, the conditions to reach the maximum payoff of the focused worker who uses ZD strategies are obtained.
  • Our analysis helps understand what solutions selfish workers will submit under the condition of having incomplete information. Furthermore, we provide a new optimization method, by which the optimal decision is reached in a bottom–up manner subject to incomplete information.
This paper is organized as follows. In Section 2, the relevant literature is compared. In Section 3, the crowdsourcing system is modeled as an iterative game. In addition, the ZD strategies are applied to analyze the optimal solutions of crowdsourcing systems. In Section 4, the optimization strategies are simulated numerically. Finally, conclusions are drawn in Section 5.

2. Literature Review

Lately, crowdsourcing has attracted a lot of attention [17,18,19], which contains applications to the design [20,21] and algorithms [22]. Performance issues in user behavior have also been investigated, with applications to quality management, incentive design, and equity [23]. Crowdsourcing is designed primarily for solving challenging tasks that require specific skills. Elance [7] and Fiverr [8] are two real crowdsourcing systems. The least worker selection was studied in [24] to enable large-scale crowdsourcing systems to improve the effectiveness of perception tasks. In [25], an optimal model and blockchain-based architecture are developed to manage the operation of crowdsourced energy systems. Moreover, there are also some novel optimization algorithms. For example, the combination of data envelopment analysis and the Malmquist index method can be used to assess the efficiency of the cybersecurity industry [26].
In addition, there are some studies focusing on strategic crowdsourcing. In social networks, in order to optimize social welfare and reduce time complexity, two efficient mechanisms are constructed for different-scale applications. However, there are few works focusing on the decision making in crowdsourcing systems. In particular, few works studied the behavior of “winner-takes-all” in crowdsourcing systems [27,28,29]. As an application example, a fully unsupervised pipeline was proposed to train a convolutional neural network that effectively eliminates misclassified pixels. As the model was trained, the quality of the generated labels was improved [30,31].
Meanwhile, game theory is used to explore crowdsourcing. For instance, a game theory framework is built to study user behavior and motivational patterns in social media networks in [32,33]. Especially, ZD strategies are a class of conditional strategies in game theory. Moreover, ZD strategies in finitely repeated (two-person) prisoners dilemma games with a general payoff matrix are discussed in [34,35]. For example, ZD strategies are applied to multi-player social dilemmas to obtain a ZD Nash equilibrium [36,37]. In addition, ZD strategies can also be applied to crowdsourcing systems [38] and blockchain [39].
In this paper, we focus on the decision making of selfish workers with incomplete information under the rule of “winner-takes-all” from the viewpoint of game theory. First, compared with the results of [13], we consider that in the complex interaction process among workers, the solutions submitted by each worker are not only determined by themselves but also influenced by the results of other workers in the last interaction process. In particular, each worker has incomplete information. Second, we consider the effect of “winner-takes-all” on the decision making in crowdsourcing systems. In contrast, in [28], the main concern is the “winner-takes-all” dynamics, and in [13], the incentive mechanism of the crowdsourcing system is studied under the rule of “winner-takes-all”. Third, compared with the results of [14,34,35] which only considered the dynamic problem of the strategy, we extend the multi-player ZD strategy theory and realize the optimization of worker’s payoff in the case of incomplete information. Last, compared with [4,21] which mainly used the ZD strategy to improve the social welfare of the crowdsourcing system, this paper mainly focuses on maximizing the workers’ own payoffs.

3. Method and System Model

3.1. Crowdsourcing System

Generally, there are a number of tasks in a crowdsourcing system. A typical crowdsourcing system categorizes tasks into different types. In this paper, we mainly analyze one type of task, which can be extended to multiple tasks. In so doing, we can regard multiple-task process as a long-term iterative process.
We first consider the crowdsourcing process with one task. The requester publishes the task in the crowdsourcing system and provides reward for any worker to complete the task. A worker can choose to receive the task according to his or her convenience and provide a solution to the requester within the specified time. All workers’ solutions are mutually independent, and they can strategically select the level of the contribution they wish to submit. For simplicity, we focus on two levels of contribution in this paper, which corresponds to a high-quality solution H and a low-quality solution L, respectively. At the same time, each worker only knows the solution he or she proposes but does not know that of other workers. That is, in the case of incomplete information, selfish workers would try to maximize their interests. Once the workers submitted their solutions, the requester evaluates their solutions and distributes the rewards under the “winner-takes-all” rule. The prepared rewards will be distributed to those who provide high-quality solutions, while the workers who provide low-quality solutions will receive no rewards. If no one provides a high-quality solution, then the rewards will be divided equally among all workers.
In crowdsourcing systems, it is common for requesters to distribute rewards based on the quality of workers’ solutions, e.g., Elance [7] and Fiverr [8]. Each worker chooses to take on tasks and demonstrate their skills. After completing the task, the corresponding payoffs will be obtained according to the “winner-takes-all” rule developed by requesters. For clarity, the notations are summarized in Table 1.

3.2. Modeling Crowdsourcing System as an Iterated Game

Consider N workers participating in solving the same task in a crowdsourcing system. Workers will select their strategies from the strategy set S, where S = { H , L } . Obviously, contribution H is greater than L. Meanwhile, solutions of different quality correspond to different costs, where c H > c L . Denote X = ( x 1 , , x k , , x N ) as the strategy combination of N workers, where x k represents worker k’s strategy. Let u k ( X ) be the payoff of worker k taking strategy x k , where x k X . Now, define worker k’s payoffs as follows:
u k ( X ) = R k ( X ) c s ,
where R k ( X ) is worker k’s reward, and c s is the cost corresponding to contribution H or L, i.e., c s = c H (or c s = c L ), if the worker chooses the strategy H (or L). We apply the “winner-takes-all” reward allocation scheme to express R k ( X ) . Under this allocation scheme, R k ( X ) is determined by the number of workers submitting high-quality solutions. Only workers who submit high-quality solutions H will receive rewards; otherwise, there will be no rewards. However, if all workers provide a low-quality solution L, then all workers share the reward equally.
Assume that r > c H and r N c L < 0 , which result from the incentive for each worker for participation and the utility of each worker being smaller than 0, when many workers share the rewards. Thus, there is a threshold value N l that satisfies the inequality r c L > r c H > r N l c H > 0 > r N l + 1 c L > r N l + 1 c H > r N c L > r N c H (see Table 2). Under this condition, providing high-level solutions is not always a best choice for some workers, because the payoff of workers will decrease as the number of high-level solutions increases. The low-level solutions become favorable when too many workers provide high-level solutions ( r N l * + 1 c H < c L ) ). In this case, doing nothing is better than performing the task except for every worker providing low-level solutions. Thus, it is difficult for selfish workers to choose a best strategy under the situation of incomplete information.
As for a multiple-task process, the continuous interactions of workers are modeled as an iterated game in this paper. In the process, it is necessary for workers to consider the impacts of their actions during any rounds of future feedback from the other players. Clearly, for a multiple-task process with repeated interactions of workers in crowdsourcing, the situation becomes more complicated. Thus, how to make decisions for selfishness workers to obtain the maximum payoff over the course of a long iterative process becomes a challenging question. In the following subsection, we will consider how workers can make an optimal decision in an incomplete information scenario.

3.3. ZD Strategies for Multiple-Player Iterated Games

An iterative game consists of several consecutive games played by the same opponents. For the infinite iterative game, it was found that there was no advantage for the long-memory player over the short-memory player in [16]. Thus, we assume that every player remembers only the previous move, i.e., at the current iteration of the game, the actions of all players depend only on the outcome of the previous round. As a result, players will only adjust their strategies based on the outcome of the previous round. Then, the process can be a stochastic process, which can be represented by a Markov chain. As a result, there is a corresponding transition matrix M, which is calculated based on the output probability of the previous round and the possible output probability of this round. In particular, if M i , j 0 (for all i , j ), then the chain is ergodic. In this case, lim t M t = ( π , π , , π ) , where π is the stationary distribution of the chain and is captured by π T · M = π T . Therefore, the limit distribution is the stationary distribution. This implies that if the repeated round is sufficiently many in number, the finite iterative game can be taken as an approximation of the infinitely repeated game. Since there are many tasks in the crowdsourcing systems, there are many interactions among workers. Therefore, the crowdsourcing system is a long-term iterative process, which can also be taken as an approximation of the infinitely repeated game.
Consider each worker with two strategies in multi-worker games. Assume that there are N workers and two strategies, so that there are 2 N possible results in a round. For worker k, the mixed strategy p k is used to represent the conditional transition probability vector for each possible result.
In addition, p k is a 2 N -dimensional vector, i.e.,
p k = [ p 1 k , , p i k , , p 2 N k ] T ,
where p i k is the probability that worker k chooses to provide a high-quality solution in this round under the premise of the i-th output result of the previous round.
Suppose that worker k provides a high-quality solution H in the last round. In addition, there are n ( 0 , 1 , 2 , , N 1 ) opponents chosen to provide high-quality solutions for worker k. Then, the probability that he or she provides a high-quality solution in this round is p H , n . In contrast, if he or she provides a low-quality solution L in the last round, and worker k has n ( 0 , 1 , 2 , , N 1 ) opponents chosen to provide high-quality solutions; then, the probability that he or she chooses to provide a high-quality solution in this round is p L , n . However, it is not important for worker k to know the strategy of a specific opponent. What is important is to know how many opponents chosen to provide high-quality solutions H. Therefore, the 2 N components in (2) can be transformed into a 2 N -dimensional vector:
p k = [ p H , 0 k , , p H , n k , , p H , N 1 k , p L , 0 k , , p L , n k , , p L , N 1 k ] T ,
where p H , n k and p L , n k each contain N 1 n terms. For instance, the outcomes H H L and H L H when N = 3 have the same transition probabilities from the same state. Therefore, we can reduce the dimensions of vector p k from 2 N to 2 N . According to the payoff matrix in Table 2, for a worker k who submits a solution at the level of H in the outcome i, the payoff is
U i k = r / ( n + 1 ) c H .
In outcome i, if worker k submits an L-level solution, the payoff will be
U i k = r / N c L , i f n = 0 c L , o t h e r w i s e .
Hence, the payoff vector of worker k is
U k = [ U 1 k , , U i k , , U 2 N k ] T .
If worker k chooses H (or L), and the number of opponents who choose to provide a high-quality solution is n, then
U k = [ U H , 0 k , , U H , n k , , U H , N 1 k , U L , 0 k , , U L , n k , , U L , N 1 k ] T .
There is a Markov chain with a state transition matrix M to represent this process. In this paper, we assume that the transition matrix M is regular. There is a stationary vector. Let M M I , where I is the identity matrix. Define v as a stationary vector, satisfying v T · M = v T and v T · M = 0 . In addition, define f as the last column of M . In [40], the equation v T · f = d e t ( p 1 , , p k , , f ) is derived, where ( p 1 , , p k , , f ) is a 2 N × 2 N matrix. By Laplace expansion, f can be replaced by α U 1 + k = 2 N β k U k γ 1 . Then, a linear combination of all the players’ expected payoffs is obtained, i.e.,
α E 1 + k = 2 N β k E k γ = d e t ( p 1 , , p k , , α U 1 + k = 2 N β k U k γ 1 ) d e t ( p 1 , , p k , , 1 ) ,
where γ is a scalar, and α , β k ( k 2 , 3 , 4 , , N ) are weight factors of U k .
If worker j selects p j properly to satisfy the following equation:
p j ˜ = λ ( α U 1 + k = 2 N β k U k γ 1 ) ,
where λ is a scaling coefficient. For worker j, he/she can unilaterally form a linear relationship among the excepted payoffs of all workers:
α E 1 + k = 2 N β k E k γ = 0 .
The linear relationship of p j ˜ can be called ZD strategies, in which d e t ( p 1 , , p j , , f ) = 0 . Note that p j ˜ is the last column of M . We can know that it is determined by p j . We denote it as
p j ˜ = [ 1 + p H , 0 j , , 1 + p H , N 1 j , p L , 0 j , , p L , N 1 j ] .
For example, consider a 3-player repeated game that follows the “winner-takes-all” rule. Each player chooses his or her own strategy independently during each step of the game. Each player is set to have only one memory. The choices that each player makes in one round are related to the choices they had made in the last round and to the number of players who chose to cooperate in the previous round. As before, we express the strategy of high-level work as H and that of low-level work as L. As a result, in the three-player crowdsourcing system, the outcome would be { H H H , H H L , H L H , H L L , L H H , L H L , L L H , L L L } . For an arbitrary player x { 1 , 2 , 3 } , a mixed strategy p x is a vector that consists of conditional probabilities for high-quality solutions with respect to each of the following possible outcomes:
p 1 = [ p H , 2 1 , p H , 1 1 , p H , 1 1 , p H , 0 1 , p L , 2 1 , p L , 1 1 , p L , 1 1 , p L , 0 1 ] T p 2 = [ p H , 2 2 , p H , 1 2 , p L , 2 2 , p L , 1 2 , p H , 1 2 , p H , 0 2 , p L , 1 2 , p L , 0 2 ] T p 3 = [ p H , 2 3 , p L , 2 3 , p H , 1 3 , p L , 1 3 , p H , 1 3 , p L , 1 3 , p H , 0 3 , p L , 0 3 ] T
We consider an update to the “winner-take-all” rule. The modified rule would imply that only those who provide high-quality solutions would receive rewards. However, if no one chooses to deliver a high-quality solution, then all of them would share the reward equally. We set the reward to r. Then, we can obtain the payoff vectors u x for the three-player games using the “winner-takes-all” rule as follows.
u 1 = r 3 c H , r 2 c H , r 2 c H , r c H , c L , c L , c L , r 3 c L u 2 = r 3 c H , r 2 c H , c L , c L , r 2 c H , r c H , c L , r 3 c L u 3 = r 3 c H , c L , r 2 c H , c L , r 2 c H , c L , r c H , r 3 c L
Let u denote the last column of M . After some elementary column operations on matrix M , the dot product of an arbitrary vector u with the stationary vector v is obtained to be equal to the determinant d e t ( p 1 , p 2 , p 3 , u ) , in which the fourth, sixth, and seventh columns p 1 ˜ , p 2 ˜ , and p 3 ˜ are controlled only by the worker 1, 2, and 3, respectively. Specifically,
v T · u = d e t ( p 1 , p 2 , p 3 , u ) = d e t 1 + p H , 2 1 p H , 2 2 p H , 2 3 1 + p H , 2 1 1 + p H , 2 3 u 1 p H , 1 1 p H , 1 2 p L , 2 3 1 + p H , 1 1 p L , 2 3 u 2 p H , 1 1 p L , 2 2 p H , 1 3 1 + p H , 1 1 1 + p H , 1 3 u 3 p H , 0 1 p L , 1 2 p L , 1 3 1 + p H , 0 1 p L , 1 3 u 4 p L , 2 1 p H , 1 2 p H , 1 3 p L , 2 1 1 + p H , 1 3 u 5 p L , 1 1 p H , 0 2 p L , 1 3 p L , 1 1 p L , 1 3 u 6 p L , 1 1 p L , 1 2 p H , 0 3 p L , 1 1 1 + p H , 0 3 u 7 p L , 0 1 p L , 0 2 p L , 0 3 p L , 0 1 p L , 0 3 u 8 .
If player 1 can properly set p 1 , then p 1 ˜ would satisfy p 1 ˜ = α u 1 + β 2 u 2 + β 3 u 3 + μ , where α , β 2 , β 3 and μ are all correlation coefficients. Thus, each player’s expected payoff can be made linear, i.e., α E 1 + β 2 E 2 + β 3 E 3 + μ = 0 . This is called the three-player zero-determinant strategy.

3.4. Game Analysis with ZD Strategies

In this subsection, we discuss optimization for workers with ZD strategies in Equation (9).
When p j ˜ = λ ( α U 1 + k = 2 N β k U k γ 1 ) , according to Equation (10), we have α E 1 = k = 2 N β k E k + γ . Then
p H , n j = 1 + λ ( α U H , n 1 + k = 2 N β k U H , n k α E 1 k = 2 N β k E k ) p L , n j = λ ( α U L , n 1 + k = 2 N β k U L , n k α E 1 k = 2 N β k E k ) .
If we want to obtain an optimal decision in the multi-worker crowdsourcing game, the maximum payoff of E 1 can be transformed into the following optimization problem:
max E 1 s . t . 0 p H , n j , p L , n j 1 , n { 0 , , N 1 } p j ˜ = λ ( α U 1 + k = 2 N β k U k γ 1 ) λ 0 .
Theorem 1.
In the multi-worker crowdsourcing game, when worker j uses the ZD strategies p j ˜ , and the parameters satisfy α 0 , β k = β = 0 , the expected payoff for worker j is ( E 1 ) m a x .
Proof. 
See Appendix A. □
Theorem 2.
In the multi-worker crowdsourcing game, when worker j uses the ZD strategies p j ˜ , and the parameters satisfy α 0 , β k = β 0 , the expected payoff for each worker j is ( E 1 ) m a x .
Proof. 
See Appendix B. □
Theorem 3.
In the multi-worker crowdsourcing game, when worker j takes the ZD strategies p j ˜ , and the parameters satisfy α 0 , β k β 0 , the expected payoff for worker j is ( E 1 ) m a x .
Proof. 
See Appendix C. □
Remark 1.
From the above theorems, we obtain the maximum payoff of the focused worker under different values of α and β k , respectively. That is, we can clearly see the range of payoffs for the focused worker with ZD strategies, where the focused worker can make optimal decisions under different values of α and β k . Take Theorem 1 as an example. In Equation (A5), E m a x 1 = r N c H + 1 λ α , where λ > 0 and α > 0 . We can see that with the increase of α, the payoff of the focused worker will decrease. Therefore, in this case, the focused worker should choose as small an α as possible when choosing strategies. In contrast, in Equations (A8) and (A11), λ > 0 and α < 0 . We can see that as α increases, so does the payoff to the focused worker; therefore, the focused worker should choose as large α value as possible when choosing strategy.
Remark 2.
The total revenue of other players, k = 2 N E k , can be calculated using mathematical expectation. However, the calculation process uses scaling, so the result may not be accurate. Nevertheless, we can always obtain the simulation results.

4. Numerical Results and Discussion

In this section, we evaluate the performances of the ZD strategies for different situations discussed in Section 3 through several simulation experiments.
Let the initial probability be v 0 = [ 0.15 , 0.15 , 0.15 , 0.15 , 0.15 , 0.15 , 0.15 , 0.15 ] , and r = 3 , c L = 0.1 , c H = 0.2 in the three-worker iterated games. We consider this to be a simulation run when the payoffs of all workers converge from the random initial state to the stable state. We set the step size to 50 and average 20 independent runs.
To verify the effectiveness of our proposed method, ZD strategies are compared with other possible strategies. In Figure 1, Figure 2 and Figure 3, the results of Theorem 1 are displayed, where α = 0.1 , β 2 = β 3 = 0 . As shown in Figure 1, when worker 1 adopts ZD1 strategies to maximize his or her payoff and other workers follow the strategies of p 1 = [ 1 , 1 , 0 , 0 , 0 , 0 , 0 , 1 ] T and p 2 = [ 1 , 0 , 0.1 , 0.1 , 0.1 , 0 , 0 , 1 ] T , the payoff of worker 1 is greater than that of worker 2 or 3. In addition, their payoffs basically reach the stable state, which are 1.5 , 1.1 and 0.5 , respectively. We can see that worker 1 will benefit most from adopting ZD strategies. In Figure 2, the effect of the weight factor on the payoff of worker 1 is shown. When worker 1 adopts ZD1 strategies with different α values, the payoff of worker 1 is basically stable between 1.2 and 1.6 . However, the payoff of worker 1 decreases as the parameter α increases. In Figure 3, we compare ZD1 strategies with TFT and WSLS, respectively. We can see that if worker 1 takes ZD1 strategies, while other workers take TFT strategies, the payoff of worker 1 will reach the maximum value 1.4 .
Remark 3.
TFT strategies have two steps: (1) cooperate in the first round; (2) next round depends on the strategies of the others in the last round. If the other worker betrayed last time, worker 1 will also betray this round. If the other workers cooperated the last time, they will cooperate again in this round, where the cooperation is equivalent to high-quality solutions submitted by workers (conversely, defection is equivalent to low-quality solutions submitted by workers). As for WSLS strategies, when the yield meets the expected value, the previous behavior will continue, but if the yield value is too low, the behavior will change.
For ZD2 strategies of Theorem 2, we conduct simulation experiments with the weight factor λ = 0.001 (see Figure 4, Figure 5, Figure 6 and Figure 7). As shown in Figure 4, when worker 1 adopts ZD2 strategies to maximize the payoff and other workers follow the strategies of p 1 = [ 1 , 1 , 0 , 0 , 0 , 0 , 0 , 1 ] T and p 2 = [ 1 , 1 , 0.1 , 0.1 , 0.1 , 0 , 0 , 1 ] T , the payoff of worker 1 can be the most, which can be basically stable around value 2. In addition, the payoff of workers 2 and 3 converge to about 1.45 and 0.65 , respectively. The effect of α on the payoff of worker 1 in Theorem 2 is shown by Figure 5. We set β = 0.3 with different values of α . In this situation, when worker 1 adopts ZD2 strategies, the payoff of worker 1 is basically stable between 1.7 and 2.2 . However, the payoff of worker 1 is inversely proportional to the parameter α . Next, in Figure 6, the effect of β on the payoff of worker 1 in Theorem 2 is shown. We note that under the premise of constant α , the smaller the value of β , the greater the payoff of worker 1. It can be seen that with the change of β , the payoff of worker 1 is still stable between 1.95 and 2.1 , which is in a convergent state. In Figure 7, we compare ZD2 strategies with WSLS and TFT, respectively. We can see that if worker1 takes ZD2 strategies, while another worker takes TFT strategies, the payoff of worker 1 will reach the maximum value of 1.9 .
For ZD3 strategies in Theorem 3, we performed simulation experiments with the weight factor λ = 0.001 (see Figure 8 and Figure 9). As shown in Figure 8, when worker 1 adopts ZD3 strategies and other workers follow the strategies of p 1 = [ 1 , 1 , 0 , 0 , 0 , 0 , 0 , 1 ] T and p 2 = [ 1 , 1 , 0.1 , 0.1 , 0.1 , 0 , 0 , 1 ] T , the payoff of worker 1 can be stable around 2.1 . Worker 1 obtains the highest payoff among three workers. After about 200 iterations, workers’ payoffs gradually leveled off. By Figure 9, the effect of λ on the payoff of worker 1 in Theorem 3 is shown. We set β 1 = 0.005 , β 2 = 0.006 , α = 0.008 and different values of λ . We find that the larger the value of λ , the greater the payoff of worker 1.
In conclusion, we find that when worker 1 adopts ZD strategies, his or her payoff is always the highest among three workers. It can be observed that the payoffs of three workers finally converge to stable states (see Figure 1, Figure 4 and Figure 8). When analyzing the effects of parameters on worker 1’s payoff, some figures fail to reach the convergent state due to the uncertainty of parameters. However, these figures show that worker 1’s payoff is basically stable within a range.
Remark 4.
To further verify the accuracy of our theoretical results, we also conducted some simulation experiments with 4 workers (see Figure 10 and Figure 11). We found that all the results are similar and consistent; therefore, they are not repeated here.
Remark 5.
In simulations, only three (or four) workers participated in the crowdsourcing process, but the previous theoretical part of this article is also applicable to more workers. All the results verify that when the focused worker adopts the ZD strategy, its benefits can be maximized.

5. Conclusions

In this paper, we consider the optimal decision-making problem for selfish workers with incomplete information in a crowdsourcing system according to the “winner-takes-all” rule. We reformulate crowdsourcing as an iterative game, in which a group of workers complete a task and each worker with a strategy that is relevant not only to itself but also to other workers. We applied ZD strategies to analyze the behavior of workers in crowdsourcing, in which the crowdsourcing system is modeled as a multi-player iterative game. Taking the advantage of ZD strategies that workers can form a linear relationship in the sum of their opponents’ payoffs and their payoffs, we analyze the theoretic conditions to reach the maximum payoff of the focused worker. Finally, we perform numerical simulations to analyze the effect of the parameters on focused players’ payoff and compare the performances of different strategies. The optimization objective of the existing spatial crowdsourcing research is mainly a single objective. However, practical applications often require the joint optimization of several factors. Therefore, we plan to consider joint optimization objectives as well as the consideration of incentives and budgets in future works.

Author Contributions

Conceptualization, J.W.; methodology, C.T.; software, J.W.; validation, J.L. and G.C.; formal analysis, J.W.; investigation, C.T.; resources, C.T.; data curation, J.L.; writing—original draft preparation, J.W.; writing—review and editing, J.W. and C.T.; visualization, J.W.; supervision, G.C.; project administration, C.T. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partly supported by the National Natural Science Foundation of China (No. 62103375) and the Zhejiang Provincial Natural Science Foundation of China (No. LY22F030006).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Theorem 1.
According to Equation (10), we have
α E 1 γ = 0 .
i.e.,
E 1 = γ α .
According to Equation (15), we have
p H , n j = 1 + λ α ( U H , n 1 α E 1 ) p L , n j = λ α ( U L , n 1 α E 1 ) .
When λ > 0 , it is assumed that α > 0 . The probabilities are 0 p H , n j 1 and 0 p L , n j 1 . For different n, we have
E 1 m i n { U L , n 1 , U H , n 1 + 1 λ α } E 1 m a x { U H , n 1 , U L , n 1 1 λ α } .
If n = 0 , then U H , 0 1 = r c H , U L , 0 1 = r N c L and E 1 m i n { r N c L , r c H + 1 λ α } . Since r N c L < 0 < r c H < r c H + 1 λ α , we have E 1 U L , 0 1 . In addition, we can obtain E 1 m a x { U H , 0 1 , U L , 0 1 1 λ α } = r c H in the same way. We denote it E 1 U H , 0 1 . However, U H , 0 1 > U L , 0 1 . Obviously, this is a contradiction. As a result, E 1 does not exist in this case.
If n 0 , then U H , n 1 = r n + 1 c H , U L , n 1 = c L . Now, we analyze the properties of U H , n 1 . Because r > 0 and c H > 0 , U H , n 1 decreases monotonically with respect to n. When n = N 1 , U H , n 1 can obtain the minimum r N c 2 . After a comparison with U L , n 1 , we can draw the following conclusions. When r N ( c H c L ) , m i n { U L , n 1 , U H , n 1 + 1 λ α } = U L , n 1 = c L . When r < N ( c H c L ) , m i n { U L , n 1 , U H , n 1 + 1 λ α } = U H , N 1 1 + 1 λ α = r N c H + 1 λ α . Because E 1 m a x { U H , n 1 , U L , n 1 1 λ α } , U H , n 1 can obtain the maximum r 2 c H when n = 1 . After comparing U H , 1 1 with U L , n 1 1 λ α , we have E 1 U H , 1 1 . Because m i n { U L , n 1 , U H , n 1 + 1 λ α } m a x { U H , n 1 , U L , n 1 1 λ α } , we reach the following conclusions: when r > N ( c H c L ) , E 1 does not exist; when 2 c H r m i n { N ( c H c L ) , N λ α ( N 1 ) } , E 1 exists and
E m a x 1 = U H , N 1 1 + 1 λ α = r N c H + 1 λ α .
Another situation is λ > 0 and α < 0 . Since 0 p H , n j 1 and 0 p L , n j 1 , we have
E 1 m i n { U H , n 1 , U L , n 1 1 λ α } E 1 m a x { U L , n 1 , U H , n 1 + 1 λ α } .
This situation is similar to the first one. We can easily reach the conclusions after some calculations. At first, we discuss the situation of n = 0 . When 0 < r N N 1 ( c H c L 1 λ α ) ,
E m a x 1 = U H , 0 1 ;
when N N 1 ( c H c L 1 λ α ) < r N N 1 ( c H c L 2 λ α ) ,
E m a x 1 = U L , 0 1 1 λ α .
When N ( c H c L ) < r c H c L 1 λ α , and 2 < N < 1 1 ( c H c L ) λ α , E 1 exists and
E m a x 1 = U H , N 1 1 .
When c H c L 1 λ α < r < m i n { N ( c H c L 1 λ α ) , N ( 1 N ) λ α } , E 1 exists and
E m a x 1 = U H , N 1 1 .
When N ( c H c L 1 λ α ) r < c H c L 2 λ α and N < 1 1 ( c H c L ) λ α 1 , E 1 exists and
E m a x 1 = U L , n 1 1 λ α .
Thus, the proof is completed. □

Appendix B

Proof of Theorem 2.
According to Equation (9), p j ˜ satisfies
p j ˜ = λ α U 1 + β k = 2 N U k γ 1 ,
therefore, worker j can unilaterally form a linear relationship between all excepted payoffs: α E 1 + β k = 2 N E k γ = 0 . After a mathematical transformation, the payoff of worker j is E 1 = β α k = 2 N E k + γ α . Without loss of generality, we suppose λ > 0 , α > 0 and β < 0 . According to Equation (15),
p H , n j = 1 + λ ( α U H , n 1 + β k = 2 N U H , n k α E 1 β k = 2 N E k ) p L , n j = λ ( α U L , n 1 + β k = 2 N U L , n k α E 1 β k = 2 N E k ) .
Denote W H ( n ) = α U H , n 1 + β k = 2 N U H , n k and W L ( n ) = α U L , n 1 + β k = 2 N U L , n k , respectively. When λ > 0 , as 0 p H , n j 1 and 0 p L , n j 1 , we obtain
1 λ ( W H ( n ) α E 1 β k = 2 N E k ) 0 0 λ ( W L ( n ) α E 1 β k = 2 N E k ) 1 .
Using mathematical derivations, we have
E 1 m i n { 1 α [ W H ( n ) β k = 2 N E k ) + 1 λ ] , 1 α [ W L ( n ) β k = 2 N E k ) ] } E 1 m a x { 1 α [ W H ( n ) β k = 2 N E k ] , 1 α [ W L ( n ) β k = 2 N E k ) 1 λ ] } .
First, we discuss the situation of n = 0 . When n = 0 , W H ( 0 ) = α ( r c H ) β c L ( N 1 ) , and W L ( 0 ) = α ( r N c L ) + β ( r N c L ) ( N 1 ) . Since E 1 m i n { 1 α [ W H ( 0 ) β k = 2 N E k + 1 λ ] , 1 α [ W L ( 0 ) β k = 2 N E k ] } , comparing W H ( 0 ) β k = 2 N E k + 1 λ with W L ( 0 ) β k = 2 N E k is equivalent to comparing W H ( 0 ) + 1 λ with W L ( 0 ) . As a consequence, when r > α N ( c H c L ) N λ ( N 1 ) ( α β ) , m i n { 1 α [ W H ( 0 ) β k = 2 N E k + 1 λ ] , 1 α [ W L ( 0 ) β k = 2 N E k ] } = 1 α [ W L ( 0 ) β k = 2 N E k ] . We have
E 1 1 α W L ( 0 ) β k = 2 N E k .
Furthermore, when 0 < r α N ( c H c L ) N λ ( N 1 ) ( α β ) , m i n { 1 α [ W H ( 0 ) β k = 2 N E k + 1 λ ] , 1 α [ W L ( 0 ) β k = 2 N E k ] } = 1 α [ W H ( 0 ) β k = 2 N E k + 1 λ ] . That is,
E 1 1 α W H ( 0 ) β k = 2 N E k + 1 λ .
On the other hand, E 1 m a x { 1 α [ W H ( n ) β k = 2 N E k ] , 1 α [ W L ( n ) β k = 2 N E k ) 1 λ ] } . After some calculations, we have the following conclusion: when r > α N ( c H c L ) N λ ( N 1 ) ( α β ) , m a x { 1 α [ W H ( 0 ) β k = 2 N E k ] , 1 α [ W L ( 0 ) β k = 2 N E k 1 λ ] } = 1 α [ W H ( 0 ) β k = 2 N E k ] . Therefore,
E 1 1 α W H ( 0 ) β k = 2 N E k .
Furthermore, when 0 < r α N ( c H c L ) N λ ( N 1 ) ( α β ) , m a x { 1 α [ W H ( 0 ) β k = 2 N E k ] , 1 α [ W L ( 0 ) β k = 2 N E k 1 λ ] } = 1 α [ W L ( 0 ) β k = 2 N E k 1 λ ] . That is,
E 1 1 α W L ( 0 ) β k = 2 N E k 1 λ .
Based on what has been discussed above, when 0 < r α N ( c H c L ) N λ ( N 1 ) ( α β ) , according to Equations (A15) and (A17), E m i n 1 < E m a x 1 . Thus, when m a x { 0 , α N ( c H c L ) 2 N λ ( N 1 ) ( α β ) } < r < α N ( c H c L ) N λ ( N 1 ) ( α β ) ,
E m a x 1 = 1 α W H ( 0 ) β k = 2 N E k + 1 λ .
Furthermore, when α N ( c H c L ) N λ ( N 1 ) ( α β ) < r < α N ( c H c L ) ( N 1 ) ( α β ) , according to Equations (A14) and (A16),
E m a x 1 = 1 α W L ( 0 ) β k = 2 N E k .
Secondly, we discuss the situation of n 0 . After some calculations, we have
W H ( n ) = α r + β r n n + 1 + β ( c L c H ) n ( α c H + β c L ( N 1 ) ) W L ( n ) = β ( c L c H ) n + β r α c L β c L ( N 1 ) .
We notice that W H ( n ) and W L ( n ) are functions of n. Since β < 0 , and c L c H < 0 , the function W L ( n ) increases with n. Furthermore, the function can obtain a minimum value when n = 1 , i.e.,
min 0 n N 1 W L ( n ) = W L ( 1 ) = β ( c L c H ) + β r α c L β c L ( N 1 ) .
Now, consider another function. The stagnation point of the function can be obtained by deriving the function W H ( n ) . Meanwhile, the monotonicity of the function can be verified by taking a derivative. The function W H ( n ) is decreasing first and then increasing. Therefore, n = β r α r β ( c H c L ) 1 is identified as the minimum point of function W H ( n ) . However, n must be an integer. Therefore, n is rounded off to the nearest value n 1 . Furthermore, when r > β ( c H c L ) β α , n = n 1 , the minimum value of W H ( n ) can be obtained, i.e.,
min 0 n N 1 W H ( n ) = W H ( n 1 ) .
Next, when 0 < r β ( c H c L ) β α , W H ( n ) is monotonically increasing. Then, at n = 1 , W H ( n ) obtains a minimum value, i.e.,
min 0 n N 1 W H ( n ) = W H ( 1 ) .
Compare [ W H ( n ) ] m i n + 1 λ with [ W L ( n ) ] m i n first. When 0 < r β ( c H c L ) β α , we have the following conclusions according to Equations (A21) and (A23).
If 2 α ( c H c L ) 2 λ α β > β ( c H c L ) β α , a minimum does not exist. Therefore, it must satisfy 2 α ( c H c L ) 2 λ α β < β ( c H c L ) β α . When 0 < r 2 α ( c H c L ) 2 λ α β , m i n { 1 α [ W H ( n ) β k = 2 N E k + 1 λ ] , 1 α [ W L ( n ) β k = 2 N E k ] } = 1 α [ W H ( 1 ) β k = 2 N E k + 1 λ ] . Therefore,
E 1 1 α W H ( 1 ) β k = 2 N E k + 1 λ .
Furthermore, when 2 α ( c H c L ) 2 λ α β < r β ( c H c L ) β α , m i n { 1 α [ W H ( n ) β k = 2 N E k + 1 λ ] ,   1 α [ W L ( n ) β k = 2 N E k ] } = 1 α [ W L ( 1 ) β k = 2 N E k ] . Therefore,
E 1 1 α W L ( 1 ) β k = 2 N E k .
When r > β ( c H c L ) β α , we have the following conclusions according to Equations (A21) and (A23).
If β ( c H c L ) β α < n 1 + 1 α β [ β ( c H c L ) ( n 1 1 ) + α ( c H c L ) 1 λ ] and r > n 1 + 1 α β [ β ( c H c L ) ( n 1 1 ) + α ( c H c L ) 1 λ ] , m i n { 1 α [ W H ( n ) β k = 2 N E k + 1 λ ] , 1 α [ W L ( n ) β k = 2 N E k ] } = 1 α [ W L ( 1 ) β k = 2 N E k ] . We have
E 1 1 α W L ( 1 ) β k = 2 N E k .
When β ( c H c L ) β α < r n 1 + 1 α β [ β ( c H c L ) ( n 1 1 ) + α ( c H c L ) 1 λ ] , m i n { 1 α [ W H ( n ) β k = 2 N E k + 1 λ ] , 1 α [ W L ( n ) β k = 2 N E k ] } = 1 α [ W H ( n 1 ) β k = 2 N E k + 1 λ ] . We have
E 1 1 α W H ( n 1 ) β k = 2 N E k + 1 λ .
However, if β ( c H c L ) β α > n 1 + 1 α β [ β ( c H c L ) ( n 1 1 ) + α ( c H c L ) 1 λ ] and r > β ( c H c L ) β α , m i n { 1 α [ W H ( n ) β k = 2 N E k + 1 λ ] , 1 α [ W L ( n ) β k = 2 N E k ] } = 1 α [ W L ( 1 ) β k = 2 N E k ] . We have
E 1 1 α W L ( 1 ) β k = 2 N E k .
In addition, we need to know the value of β k = 2 N E k . To this end, the proof is completed. □

Appendix C

Proof of Theorem 2.
According to the payoff (2), W H ( n ) = ( β 2 + + β N n ) · u L , n + 1 k + ( α + β N n + 1 + + β N ) · u H , n k and W L ( n ) = ( α + β 2 + + β N n ) · u L , n k + ( β N n + 1 + + β N ) · u H , n 1 k are obtained. Therefore, when λ > 0 , appropriate parameters can be chosen to obtain the maximum value γ m a x = m i n { W L ( n ) , W H ( n ) + 1 λ } , which is independent of other workers’ strategies. The similarity also applies to the case of λ < 0 , in which γ m a x = m a x { W L ( n ) 1 λ , W H ( n ) } .
Furthermore, α E 1 = γ k = 2 N β k E k is obtained. Since the value of parameter α is uncertain, we need to know the minimum value and the maximum value of k = 2 N β k E k . Thus, the proof is completed. □

References

  1. Slivkins, A.; Vaughan, J.W. Online decision making in crowdsourcing markets: Theoretical challenges. ACM SIGecom Exch. 2014, 12, 4–23. [Google Scholar] [CrossRef]
  2. Wang, N.; Wu, J. Cost-efficient heterogeneous worker recruitment under coverage requirement in spatial crowdsourcing. IEEE Trans. Big Data 2021, 7, 407–420. [Google Scholar] [CrossRef] [Green Version]
  3. Ma, Q.; Gao, L.; Liu, Y.F.; Huang, J. Incentivizing Wi-Fi network crowdsourcing: A contract theoretic approach. IEEE ACM Trans. Netw. 2018, 26, 1035–1048. [Google Scholar] [CrossRef]
  4. Tang, C.; Li, X.; Cao, M.; Zhang, Z.; Yu, X. Incentive mechanism for macrotasking crowdsourcing: A zero-determinant strategy approach. IEEE Internet Things J. 2019, 6, 8589–8601. [Google Scholar] [CrossRef]
  5. Giglio, C.; Maio, A.D. A structural equation model for analysing the determinants of crowdshipping adoption in the last-mile delivery within university cities. Int. J. Appl. Decis. Sci. 2022, 15, 117–142. [Google Scholar] [CrossRef]
  6. Dortheimer, J. Collective Intelligence in Design Crowdsourcing. Mathematics 2022, 10, 539. [Google Scholar] [CrossRef]
  7. Elance. Available online: https://www.elance.com/ (accessed on 1 October 2022).
  8. Fiverr. Available online: https://www.fiverr.com/ (accessed on 1 October 2022).
  9. Lu, W.; Hu, S.; Liu, X.; He, C.; Gong, Y. Incentive mechanism based cooperative spectrum sharing for OFDM cognitive IoT network. IEEE Trans. Netw. Sci. Eng. 2019, 7, 662–672. [Google Scholar] [CrossRef]
  10. Zha, W.; Chen, J.; Peng, Z. Dynamic multi-team antagonistic games model with incomplete information and its application to multi-UAV. IEEE/CAA J. Autom. Sin. 2015, 2, 74–84. [Google Scholar]
  11. Ghosh, A.; McAfee, P. Incentivizing high-quality user-generated content. In Proceedings of the 20th International Conference on World Wide Web, Hyderabad, India, 28 March–1 April 2011; pp. 137–146. [Google Scholar]
  12. Shen, D. Iterative learning control with incomplete information: A survey. IEEE/CAA J. Autom. Sin. 2018, 5, 885–901. [Google Scholar] [CrossRef]
  13. Xie, H.; Lui, J.C. Incentive mechanism and rating system design for crowdsourcing systems: Analysis, tradeoffs and inference. IEEE Trans. Serv. Comput. 2016, 11, 90–102. [Google Scholar] [CrossRef]
  14. Wang, J.; Tang, C.; Liu, Y.; Zhang, Z. Zero-Determinant Strategies in Winner Takes All Game. In Proceedings of the 2019 Chinese Control Conference (CCC), Guangzhou, China, 27–30 July 2019; pp. 892–897. [Google Scholar]
  15. Jin, L.; Liang, S.; Luo, X.; Zhou, M. Distributed and Time-Delayed k-Winner-Take-All Network for Competitive Coordination of Multiple Robots. IEEE Trans. Cybern. 2022, 53, 641–652. [Google Scholar] [CrossRef]
  16. Press, W.H.; Dyson, F.J. Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent. Proc. Natl. Acad. Sci. USA 2012, 109, 10409–10413. [Google Scholar] [CrossRef] [Green Version]
  17. Jiang, J.; An, B.; Jiang, Y.; Lin, D. Context-aware reliable crowdsourcing in social networks. IEEE Trans. Syst. Man Cybern. Syst. 2017, 50, 617–632. [Google Scholar] [CrossRef]
  18. He, S.; Shin, D.H.; Zhang, J.; Chen, J.; Lin, P. An exchange market approach to mobile crowdsensing: Pricing, task allocation, and walrasian equilibrium. IEEE J. Sel. Areas Commun. 2017, 35, 921–934. [Google Scholar] [CrossRef]
  19. Zhang, J. Knowledge Learning With Crowdsourcing: A Brief Review and Systematic Perspective. IEEE/CAA J. Autom. Sin. 2022, 9, 749–762. [Google Scholar] [CrossRef]
  20. Mason, W.; Suri, S. Conducting behavioral research on Amazon’s Mechanical Turk. Behav. Res. Methods 2012, 44, 1–23. [Google Scholar] [CrossRef]
  21. Hu, Q.; Wang, S.; Ma, P.; Cheng, X.; Lv, W.; Bie, R. Quality control in crowdsourcing using sequential zero-determinant strategies. IEEE Trans. Knowl. Data Eng. 2019, 32, 998–1009. [Google Scholar] [CrossRef]
  22. Liu, Z.; Li, K.; Zhou, X.; Zhu, N.; Gao, Y.; Li, K. Multi-stage complex task assignment in spatial crowdsourcing. Inf. Sci. 2022, 586, 119–139. [Google Scholar] [CrossRef]
  23. Hyman, P. Software aims to ensure fairness in crowdsourcing projects. Commun. ACM 2013, 56, 19–21. [Google Scholar] [CrossRef]
  24. Lu, Z.; Wang, Y.; Tong, X.; Mu, C.; Chen, Y.; Li, Y. Data-driven many-objective crowd worker selection for mobile crowdsourcing in industrial IoT. IEEE Trans. Industr. Inform. 2021, 19, 531–540. [Google Scholar] [CrossRef]
  25. Wang, S.; Taha, A.F.; Wang, J.; Kvaternik, K.; Hahn, A. Energy crowdsourcing and peer-to-peer energy trading in blockchain-enabled smart grids. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1612–1623. [Google Scholar] [CrossRef] [Green Version]
  26. Wang, C.N.; Yang, F.C.; Vo, N.T.; Nguyen, V.T.T. Wireless communications for data security: Efficiency assessment of cybersecurity industry—A promising application for UAVs. Drones 2022, 6, 363. [Google Scholar] [CrossRef]
  27. Binas, J.; Rutishauser, U.; Indiveri, G.; Pfeiffer, M. Learning and stabilization of winner-take-all dynamics through interacting excitatory and inhibitory plasticity. Front. Comput. Neurosci. 2014, 8, 68. [Google Scholar] [CrossRef] [PubMed]
  28. Li, S.; Zhou, M.; Luo, X.; You, Z.H. Distributed winner-take-all in dynamic networks. IEEE Trans. Autom. Control 2016, 62, 577–589. [Google Scholar] [CrossRef]
  29. Qi, Y.; Jin, L.; Luo, X.; Shi, Y.; Liu, M. Robust k-WTA network generation, analysis, and applications to multiagent coordination. IEEE Trans. Cybern. 2021, 52, 8515–8527. [Google Scholar] [CrossRef]
  30. Dlugosz, R.; Talaska, T.; Pedrycz, W.; Wojtyna, R. Realization of the conscience mechanism in CMOS implementation of winner-takes-all self-organizing neural networks. IEEE Trans. Neural Netw. 2010, 21, 961–971. [Google Scholar] [CrossRef]
  31. Zuo, Y.; Guo, J.; Zhang, Y.; Hu, Y.; Lei, B.; Qiu, X.; Ding, C. Winner Takes All: A Superpixel Aided Voting Algorithm for Training Unsupervised PolSAR CNN Classifiers. IEEE Trans. Geosci. Remote Sens. 2022, 60, 1–9. [Google Scholar] [CrossRef]
  32. Singh, V.K.; Jain, R.; Kankanhalli, M.S. Motivating contributors in social media networks. In Proceedings of the First SIGMM Workshop on Social Media, Beijing, China, 23 October 2009; pp. 11–18. [Google Scholar]
  33. Fei, L.; Dong, X.; Yu, J.; Hua, Y.; Li, Q.; Ren, Z. Distributed Nash equilibrium seeking of N-coalition non-cooperative games with application to UAV swarms. IEEE Trans. Netw. Sci. Eng. 2022, 9, 2392–2405. [Google Scholar]
  34. Ichinose, G.; Masuda, N. Zero-determinant strategies in finitely repeated games. J. Theor. Biol. 2018, 438, 61–77. [Google Scholar] [CrossRef]
  35. Taha, M.A.; Ghoneim, A. Zero-determinant strategies in repeated asymmetric games. Appl. Math. Comput. 2020, 369, 124862. [Google Scholar] [CrossRef]
  36. Govaert, A.; Cao, M. Zero-determinant strategies in repeated multiplayer social dilemmas with discounted payoffs. IEEE Trans. Autom. Control 2020, 66, 4575–4588. [Google Scholar] [CrossRef]
  37. Zhang, H.; Niyato, D.; Song, L.; Jiang, T.; Han, Z. Zero-determinant strategy for resource sharing in wireless cooperations. IEEE Trans. Wirel. Commun. 2015, 15, 2179–2192. [Google Scholar] [CrossRef]
  38. Miao, Y.; Tang, C.; Lu, J.; Li, X. Zero-determinant strategy for cooperation enforcement in crowdsourcing. In Proceedings of the 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), Shenzhen, China, 26–29 June 2017; pp. 1–6. [Google Scholar]
  39. Tang, C.; Li, C.; Yu, X.; Zheng, Z.; Chen, Z. Cooperative mining in blockchain networks with zero-determinant strategies. IEEE Trans. Cybern. 2019, 50, 4544–4549. [Google Scholar] [CrossRef]
  40. He, X.; Dai, H.; Ning, P.; Dutta, R. Zero-determinant strategies for multi-player multi-action iterated games. IEEE Signal Process. Lett. 2016, 23, 311–315. [Google Scholar] [CrossRef]
Figure 1. The payoff of 3 workers where worker 1 uses the ZD1 strategies.
Figure 1. The payoff of 3 workers where worker 1 uses the ZD1 strategies.
Mathematics 11 01153 g001
Figure 2. The payoff of worker 1 using ZD1 strategies with different α .
Figure 2. The payoff of worker 1 using ZD1 strategies with different α .
Mathematics 11 01153 g002
Figure 3. ZD1 strategies vs. WSLS and TFT.
Figure 3. ZD1 strategies vs. WSLS and TFT.
Mathematics 11 01153 g003
Figure 4. The payoff of 3 workers where worker 1 uses the ZD2 strategies.
Figure 4. The payoff of 3 workers where worker 1 uses the ZD2 strategies.
Mathematics 11 01153 g004
Figure 5. The payoff of worker 1 using ZD2 strategies with different α .
Figure 5. The payoff of worker 1 using ZD2 strategies with different α .
Mathematics 11 01153 g005
Figure 6. The payoff of worker 1 using ZD2 strategies with different β .
Figure 6. The payoff of worker 1 using ZD2 strategies with different β .
Mathematics 11 01153 g006
Figure 7. ZD2 strategies vs WSLS and TFT.
Figure 7. ZD2 strategies vs WSLS and TFT.
Mathematics 11 01153 g007
Figure 8. The payoff of 3 workers where worker 1 uses ZD3 strategies.
Figure 8. The payoff of 3 workers where worker 1 uses ZD3 strategies.
Mathematics 11 01153 g008
Figure 9. The payoff of worker 1 using ZD3 strategies with different λ .
Figure 9. The payoff of worker 1 using ZD3 strategies with different λ .
Mathematics 11 01153 g009
Figure 10. The payoff of 4 workers where worker 1 uses ZD1 strategies.
Figure 10. The payoff of 4 workers where worker 1 uses ZD1 strategies.
Mathematics 11 01153 g010
Figure 11. The payoff of worker 1 using ZD1 strategies with different α .
Figure 11. The payoff of worker 1 using ZD1 strategies with different α .
Mathematics 11 01153 g011
Table 1. Symbolic notations.
Table 1. Symbolic notations.
NotationsMeaning of Expression
NTotal number of players
rThe reward provided by requester
c s The cost of worker with the s-th level of the solution
R k The reward of worker k
kThe index of worker
jThe index of focused worker
x k The strategy of worker k
N l The threshold value of strategy t s
iThe i-th result of each round
nThe number of workers with high-quality solutions except the focused worker
p k Worker k’s mixed strategy vector
p j ˜ The focused worker j takes a ZD strategy
p i k The conditional probability of worker k with outcome i
U k The payoff vector of worker k
U i k The payoff of worker k of i-th outcome
p X , n k Conditional probability of worker k in the case that he uses X. Meanwhile, his opponents had n workers using H in the previous round
U X , n k The payoff of worker k in the case that he uses X. Meanwhile, his opponents had n workers using H in the previous round
E k The expected payoff of worker k
M The transition probabilistic matrix
γ Parameter of the system
α , β k The weight factors of payoff function U k
Table 2. Payoff matrix of workers.
Table 2. Payoff matrix of workers.
Number of HN − 1 N l 1 10
Payoff of H r N c H r N l c H r 2 c H r c H
Payoff of L c L c L c L r N c L
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, J.; Tang, C.; Lu, J.; Chen, G. Toward Zero-Determinant Strategies for Optimal Decision Making in Crowdsourcing Systems. Mathematics 2023, 11, 1153. https://doi.org/10.3390/math11051153

AMA Style

Wang J, Tang C, Lu J, Chen G. Toward Zero-Determinant Strategies for Optimal Decision Making in Crowdsourcing Systems. Mathematics. 2023; 11(5):1153. https://doi.org/10.3390/math11051153

Chicago/Turabian Style

Wang, Jiali, Changbing Tang, Jianquan Lu, and Guanrong Chen. 2023. "Toward Zero-Determinant Strategies for Optimal Decision Making in Crowdsourcing Systems" Mathematics 11, no. 5: 1153. https://doi.org/10.3390/math11051153

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop