移动社会网络中信息传播与控制
上QQ阅读APP看本书,新人免费读10天
设备和账号都新为新人

参考文献

[1]LIN L,XU L,HUANG Y,et al.On exploiting priority relation graph for reliable multi-path communication in mobile social networks[J].Information Sciences,2019,3(477):490-507.

[2]QIU T,CHEN B,SANGAIAH A,et al.A survey of mobile social networks:applications,social characteristicsand challenges[J].IEEE Systems Journal,2018,12(4):3932-3947.

[3]MORENO J.Who shall survive?A new approach to the problem of human interlation[J].JAMA:The Journal of the American Medical Association,1934.DOI:10.1037/10648-000.

[4]ERDOS P,RENYI A.On the evolution of random graph[J].Publications of the Mathematical Institute of the Hungarian Academy of Sciences,1961,5(1):17-60.

[5]KARKI B,HAMALAINEN A,PORRAS J.Social networking on mobile environment[C]// Proceedings of the ACM/IFIP/USENIX Middleware’08 Conference Companion.[S.l.]:[s.n.],2008:93-94.

[6]DONG Z,SONG G,XIE K,et al.An experimental study of large-scale mobile social network[C]// Proceedings of the 18th International Conference on World Wide Web.[S.l.]:[s.n.], 2009:1175-1176.

[7]YU W,SIDDIQUI A.Towards a wireless mobile social network system design in healthcare[C]//2009 Third International Conference on Multimedia and Ubiquitous Engineering.[S.l.]:[s.n.], 2009:429-436.

[8]HU X,CHU T,LEUNG V,et al.A survey on mobile social networks:applications,platforms,system architecturesand future research directions[J].IEEE Communications Surveys and Tutorials,2015,17(3):1557-1581.

[9]MAO Z,JIANG Y,MIN G,et al.Mobile social networks:design requirements,architectureand state-of-the-art technology[J].Computer Communications,2017,100:1-19.

[10]TULU M,MKIRAMWENI M,HOU R,et al.Influential nodes selection to enhance data dissemination in mobile social networks:a survey[J].Journal of Network and Computer Application,2020,169:102768.

[11]NIKOLAOS V,KUN Y.Mobile social networks:architectures,social propertiesand key research challenges[J].IEEE Communications Surveys and Tutorials,2013,15(3):1355-1371.

[12]ZHANG K,NI J,YANG K,et al.Security and privacy in smartcity applications:challenges and solutions[J].IEEE Communications Magazine,2017,55(1):122-129.

[13]ZHANG K,LIANG X,NI J,et al.Exploiting social network to enhance human-to-human infection analysis without privacy leakage[J].IEEE Transactions on Dependable and Secure Computing,2018,15(4):607-619.

[14]ZHANG K,LIANG X,LU R,et al.PIF:A personalized fine-grained spam filtering scheme with privacy preservation in mobile social networks[J].IEEE Transactions on Computational Social Systems,2015,2(3):41-52.

[15]ZHANG K,YANG K,LIANG X,et al.Security and privacy formobile healthcare networks from quality-of-protection perspective[J].IEEE Wireless Communications,2015,22(4):104-112.

[16]HE Q,LEI Z,WANG X,et al.An effective scheme to address influence maximization for opinion formation in social networks[J].Transactions on Emerging Telecommunications Technologies,2019,30(6):e3599.

[17]SHI J,WANG X,HUANG M,et al.Information-centric routing in MSN based on community detection[J].Transactions on Emerging Telecommunications Technologies,2019,30(1):e3554.

[18]YANG S,WANG X,ZHANG S,et al.Trust-based security routing mechanism in mobile social networks[J].Neural Computing and Application,2020,32(10):5609-5620.

[19]HE Q,SUN L,WANG X,et al.Positive opinion maximization in signed social networks[J].Information Science,2021,558:34-49.

[20]陈卫.大数据网络传播模型和算法[M].北京:人民邮电出版社,2020.

[21]CHEN W,CASTILLO C,LAKSHMANAN L.Information and influence propagation in social networks[M].[S.l.]:Synthesis Lectures on Data Management,Morgan & Claypool Publishers ,2013:1-177.

[22]SERINA C,EMMA P,WEI K,et al.Mobility network models of COVID-19 explain inequities and inform reopening[J].Nature,2021,589(7840):82-87.

[23]MILINA B,PILEGGI S,PALAU C,et al.A social framework for content distribution in mobile transient networks[C]//Proceedings of the third international workshop on Use of P2P,grid and agents for the development of content networks.Piscataway:IEEE,2008:29-36.

[24]CHANG Y,LIU H,WANG T.Mobile social assistive technology:a case study in supported employment for people with serve mental illness[C]//Third International Conference on Convergence and Hybird Information Technology.[S.l.]:IEEE Computer Society,2008,1:442-447.

[25]GALINDO L,MORO D,LOZANO D.The social network behind telecom networks[C]// Proceedings of W3C Workshop Future Social Network.[S.l.]:[s.n.],2009:1-4.

[26]COHEN R,RAZ D.Cost-effective resource allocation of overlay routing relay nodes[J].IEEE/ACM Transactions on Networking,2014,22(2):636-646.

[27]GAO W,CAO G,PORTA T,et al.On exploiting transient social contact patterns for data forwarding in delay-tolerant networks[J].IEEE Transactions on Mobile Computing,2013,12(1):151-165.

[28]GAO L,LI M,BONTI A,et al.Multidimensional routing protocol in human-associated delay-tolerant networks[J].IEEE Transactions on Mobile Computing,2013,12(11):2132-2144.

[29]GAO W,LI Q,ZHAO B,et al.Social-aware multicast in disruption-tolerant networks[J].IEEE/ACM Transactions on Networking,2012,20(5):1553-1566.

[30]KOSTA S,MEI A,STEFA J.Large-scale synthetic social mobile networks with SWIM[J].IEEE Transactions on Mobile Computing,2014,13(1):116-129.

[31]LEE C,EUN D.On the forwarding performance under heterogeneous contact dynamics in mobile opportunistic networks[J].IEEE Transactions on Mobile Computing,2013,12(6):1107-1119.

[32]XIAO M,WU J,HUANG L.Community-aware opportunistic routing in mobile social networks[J].IEEE Transactions on Computers,2014,63(7):1682-1695.

[33]ZHANG X,NEGLIA G,KUROSE J,et al.Benefites of network coding for unicast application in disruption-tolerant networks[J].ACM/IEEE Transactions on Networking,2013,21(5):1407-1420.

[34]林丽美.拓扑图的可靠性分析及其在移动社会网络中的应用[D].福州:福建师范大学,2016.

[35]ZHOU L,LUO E,WANG G,et al.Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks[J].Information Sciences,2021,554:15-32.

[36]WEI K,LIANG X,XU K.A survey of social-aware routing protocols in delay tolerant networks:applications,taxonomy and design-related issues[J].IEEE Communications Surveys and Tutorials,2014,16(1):556-578.

[37]WANG X,CHEN M,LEUNG V,et al.Integrating social networks with mobile device-to-device services[J].IEEE Transactions on Services Computing,2021,14(4):1209-1223.

[38]ZHU Y,XU B,SHI X,et al.A survey of social-based routing in delay tolerant networks:positive and negative social effects[J].IEEE Communications Surveys and Tutorials,2013,15(1):387-401.

[39]WANG R,WANG X,HAO F,et al.Social identity-aware opportunistic routing in mobile social networks[J].Transactions on Emerging Telecommunications Technologies,2018,29(5):e3297.

[40]GAO Z,ZHOU W,WANG Y.Exploiting social relationship for secure routing in mobile social networks[C]//MILCOM 2016-2016 IEEE Military Communications Conference.Piscataway:IEEE,2016:569-575.

[41]KONG X, XIA F, NING Z, et al.Mobility dataset generation for vehicular social networks based on floating car data[J].IEEE Transactions on Vehicular Technology, 2018, 67(5): 3874-3886.

[42]冯伟.信息物理社会系统中对信任的匿名认证[D].西安:西安电子科技大学,2020.

[43]WANG Z, LIAO J, CAO Q, et al.Friendbook: a semantic-based friend recommendation system for social networks[J].IEEE Transactions on Mobile Computing, 2015, 14(3):538-551.

[44]XU J, DENG D, DEMIRYUREK U, et al.Mining the situation: spatiotemporal traffic prediction with big data[J].IEEE Journal of Selected Topics in Signal Processing, 2015, 9(4): 702-715.

[45]KONG X,XU Z,SHEN G,et al.Urban traffic congestion estimation and prediction based on floating car trajectory data[J].Future Generation Computer Systems,2016,61:97-107.

[46]YUAN N,ZHENG Y,XIE X,et al.Discovering urban functional zones using latent activity trajectories[J].IEEE Transactions on Knowledge and Data Engineering,2015,27(3):712-725.

[47]FERREIRA M,CONCEICAO H,FERNANDES R,et al.Stereoscopic aerial photography:an alternative to model-based urban mobility approaches[J].Vehicular Ad Hoc Networks, 2009:53-62.

[48]BEDOGNI L,GRAMAGLIA M,VESCO A,et al.The Bologna ringway dataset:improving road network conversion in sumo and validating urban mobility via navigation services[J].IEEE Transactions on Vehicular Technology,2015,64(12):5464-5476.

[49]KHPWAJ S, KHUWAJA P, DEV K, et al.A secure data sharing scheme in community segmented vehicular social networks for 6G[J].IEEE Transactions on Industrial Informatics,2023, 19(1): 890-899.

[50]SHEN H, ZHOU J, CAO Z, et al.Blockchain-based lightweight certificate authority for efficient privacy-preserving location-based service in vehicular social networks[J].IEEE Internet of Things Journal , 2020, 7(7): 6610-6622.

[51]CHEN B, WUL, WANG H, et al.A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks[J].IEEE Transactions on Vehicular Technology, 2020, 69(6): 5813-5825.

[52]PU Y, XIANG T, HU C, et al.An efficient blockchain-based privacy preserving scheme for vehicular social networks [J].Information Science, 2020, 540: 308-324.

[53]CHEN Y, ZHOU T, ZHOU J, et al.SAVE: efficient privacy-preserving location-based service bundle authentication in self-organizing vehicular social networks[J].IEEE Transactions on Intelligent Transportation Systems, 2022, 23(8): 11752-11766.

[54]MIKAVICAN B, KOSTIC A.Blockchain-based solutions for security, privacy and trustmanagement in vehicular networks: a survey[J].The Journal of Supercomputing, 2021, 77(9):9520-9575.

[55]GROVER J.Security of vehicular ad hoc networks using blockchain: a comprehensive review[J].Vehicular Communications, 2022, 34: 100458.

[56]LU Z, WANG Q, QU G, et al.BARS: a blockchain-based anonymous reputation system for trust management in VANETs[C]// 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE).Piscataway: IEEE, 2018: 98-103.

[57]SUN J, XIONG H, ZHANG S, et al.A secure flexible and tampering-resistant data sharing system for vehicular social networks[J].IEEE Transactions on Vehicular Technology, 2020,69(11): 12938-12950.

[58]杨泽渠.智能电网中用户数据安全及隐私保护研究[D].杭州:浙江大学,2017.

[59]PALENSKY P, DIETRICH D.Demand side management: demand response, intelligent energy systems and smart loads[J].IEEE Transactions on Industrial Informatics, 2011, 7(3): 381-388.

[60]MARTIN A,JUSTIN T.Smart metering for residential energy efficiency:the use of community based social marketing for behavioural change and smart grid introduction[J].Renewable Energy:An International Journal,2014,67:119-127.

[61]HUANG Q,LI X,ZHAO J,et al.Social networking reduces peak power consumption in smart grid[J].IEEE Transactions on Smart Grid,2015,6(3):1403-1413.

[62]CIUCIU I,ROBERT M,THARAM D.Social network of smart-metered homes and SMEs for grid-based renewable energy exchange[C]// 2012 6th IEEE International Conference on Digital Ecosystems and Technologies.Piscataway:IEEE,2012:1-6.

[63]LUO F, RANZIB G, Xibin WANG X, et al.Social information filtering-based electricity retail plan recommender system for smart grid end users[J].IEEE Transactions on Smart Grid,2019,10(1): 95-104.

[64]刁凤,张方国.智能电表的完整隐私保护系统[J].密码学报,2014,1(4):400-409.

[65]DIAO F,ZHANG F,CHENG X.A privacy-preserving smart metering scheme using linkable anonymous credential[J].IEEE Transactions on Smart Grid,2017,6(1):461-467.

[66]TSAI J,LO N.Secure anonymous key distribution scheme for smart grid[J].IEEE Transactions on Smart Grid,2016,7(2):906-914.

[67]NI J,ZHANG K,ALHARBI K,et al.Differentially private smart metering with fault tolerance and range-based filtering[J].IEEE Transactions on Smart Grid,2017,8(5):2483-2493.

[68]LI S,XUE K,YANG Q,et al.PPMA:privacy-preserving multi-subset aggregation in smart grid[J].IEEE Transactions on Industrial Informatics,2017,14(2):462-472.

[69]王海鸥.智能电网建设中的主要技术应用分析[J].高等教育前言,2021-1-25(2):225-236.

[70]施巍松,孙辉,曹杰,等.边缘计算:万物互联时代新型计算模型[J].计算机研究与发展,2017,54(5):907-924.

[71]施巍松,刘芳,孙辉.边缘计算[M].北京:科学出版社,2018.

[72]ABBAS N,ZHANG Y.Mobile edge computing:a survey[J],IEEE Internet Things,2017,5(1):450-465.