Copy reference, caption or embed code

Figure 4 - Confidentiality Protection in Crowdsourcing

Figure 4.1: Stages in which information leak is possible in the crowdsourcing cycle.
1: Stages in which information leak is possible in the crowdsourcing cycle.
Go to figure page
Reference
Caption
Embed code