{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:51:33Z","timestamp":1743090693939,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030590154"},{"type":"electronic","value":"9783030590161"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59016-1_9","type":"book-chapter","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T13:05:10Z","timestamp":1599743110000},"page":"97-108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications"],"prefix":"10.1007","author":[{"given":"Jingjing","family":"Fan","sequence":"first","affiliation":[]},{"given":"Yan","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Qinghe","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Jing","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,10]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Cai, Z., He, Z.: Trading private range counting over big IoT data. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 144\u2013153 (2019)","DOI":"10.1109\/ICDCS.2019.00023"},{"issue":"5","key":"9_CR2","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1109\/JSAC.2020.2980802","volume":"38","author":"X Zheng","year":"2020","unstructured":"Zheng, X., Cai, Z.: Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J. Sel. Areas Commun. 38(5), 968\u2013979 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"9_CR3","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.2018.1700349","volume":"32","author":"Y Liang","year":"2018","unstructured":"Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8\u201314 (2018)","journal-title":"IEEE Netw."},{"issue":"9","key":"9_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MCOM.2018.1701245","volume":"56","author":"X Zheng","year":"2018","unstructured":"Zheng, X., Cai, Z., Li, Y.: Data linkage in smart internet of things systems: a consideration from a privacy perspective. IEEE Commun. Mag. 56(9), 55\u201361 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"9_CR5","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TNSE.2018.2830307","volume":"7","author":"Z Cai","year":"2020","unstructured":"Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng. 7(2), 766\u2013775 (2020)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"6","key":"9_CR6","doi-asserted-by":"publisher","first-page":"3265","DOI":"10.1109\/TWC.2019.2912611","volume":"18","author":"Y Huo","year":"2019","unstructured":"Huo, Y., Fan, X., Ma, L., Cheng, X., Tian, Z., Chen, D.: Secure communications in tiered 5G wireless networks with cooperative jamming. IEEE Trans. Wirel. Commun. 18(6), 3265\u20133280 (2019)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"12","key":"9_CR7","doi-asserted-by":"publisher","first-page":"6492","DOI":"10.1109\/TII.2019.2911697","volume":"15","author":"Z Cai","year":"2019","unstructured":"Cai, Z., Zheng, X., Yu, J.: A differential-private framework for urban traffic flows estimation via taxi companies. IEEE Trans. Ind. Inf. 15(12), 6492\u20136499 (2019)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"1","key":"9_CR8","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/MWC.2017.1700015","volume":"25","author":"Y Huo","year":"2018","unstructured":"Huo, Y., Tian, Y., Ma, L., Cheng, X., Jing, T.: Jamming strategies for physical layer security. IEEE Wirel. Commun. 25(1), 148\u2013153 (2018)","journal-title":"IEEE Wirel. Commun."},{"issue":"6","key":"9_CR9","doi-asserted-by":"crossref","first-page":"4242","DOI":"10.1109\/TII.2019.2950057","volume":"16","author":"J Wang","year":"2020","unstructured":"Wang, J., Cai, Z., Yu, J.: Achieving personalized $$k$$-anonymity-based content privacy for autonomous vehicles in CPS. IEEE Trans. Ind. Inf. 16(6), 4242\u20134251 (2020)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1\u20139 (2017)","DOI":"10.1109\/INFOCOM.2017.8056976"},{"issue":"6","key":"9_CR11","doi-asserted-by":"publisher","first-page":"5820","DOI":"10.1109\/TVT.2019.2912861","volume":"68","author":"M Sadeghzadeh","year":"2019","unstructured":"Sadeghzadeh, M., Maleki, M., Salehi, M.: Large-scale analysis of regularized block diagonalization precoding for physical layer security of multi-user MIMO wireless networks. IEEE Trans. Veh. Technol. 68(6), 5820\u20135834 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"9_CR12","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1109\/TCOMM.2019.2954517","volume":"68","author":"J Xu","year":"2020","unstructured":"Xu, J., Xu, W., Ng, D.W.K., Swindlehurst, A.L.: Secure communication for spatially sparse millimeter-wave massive MIMO channels via hybrid precoding. IEEE Trans. Commun. 68(2), 887\u2013901 (2020)","journal-title":"IEEE Trans. Commun."},{"issue":"11","key":"9_CR13","doi-asserted-by":"publisher","first-page":"7715","DOI":"10.1109\/TCOMM.2019.2937303","volume":"67","author":"Q Gao","year":"2019","unstructured":"Gao, Q., Huo, Y., Jing, T., Ma, L., Wen, Y., Xing, X.: An intermittent cooperative jamming strategy for securing energy-constrained networks. IEEE Trans. Commun. 67(11), 7715\u20137726 (2019)","journal-title":"IEEE Trans. Commun."},{"key":"9_CR14","unstructured":"Choi, Y., Lee, J.H.: A new cooperative jamming technique for a two-hop amplify-and-forward relay network with an eavesdropper. IEEE Trans. Veh. Technol. 67(12), 12447\u201312451 (2018)"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-017-1011-3","volume":"2018","author":"Y Huo","year":"2018","unstructured":"Huo, Y., Xu, M., Fan, X., Jing, T.: A novel secure relay selection strategy for energy-harvesting-enabled internet of things. EURASIP J. Wirel. Commun. Netw. 2018, 1\u201318 (2018)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"4","key":"9_CR16","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1109\/JSAC.2018.2825484","volume":"36","author":"J Wang","year":"2018","unstructured":"Wang, J., Huang, Y., Jin, S., Schober, R., You, X., Zhao, C.: Resource management for device-to-device communication: a physical layer security perspective. IEEE J. Sel. Areas Commun. 36(4), 946\u2013960 (2018)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Huang, L., Fan, X., Huo, Y., Hu, C., Tian, Y., Qian, J.: A novel cooperative jamming scheme for wireless social networks without known CSI. IEEE Access 5, 26476\u201326486 (2017)","DOI":"10.1109\/ACCESS.2017.2768568"},{"issue":"2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1109\/TII.2017.2733001","volume":"14","author":"Z Zhou","year":"2018","unstructured":"Zhou, Z., Gao, C., Xu, C., Zhang, Y., Mumtaz, S., Rodriguez, J.: Social big-data-based content dissemination in internet of vehicles. IEEE Trans. Ind. Inf. 14(2), 768\u2013777 (2018)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"4","key":"9_CR19","doi-asserted-by":"publisher","first-page":"3500","DOI":"10.1109\/TVT.2019.2895639","volume":"68","author":"Y Wen","year":"2019","unstructured":"Wen, Y., Huo, Y., Ma, L., Jing, T., Gao, Q.: A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks. IEEE Trans. Veh. Technol. 68(4), 3500\u20133512 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"6","key":"9_CR20","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1049\/iet-com.2019.1042","volume":"14","author":"H Zhou","year":"2020","unstructured":"Zhou, H., He, D., Wang, H.: Joint relay and jammer selection for secure cooperative networks with a full-duplex active eavesdropper. IET Commun. 14(6), 1043\u20131055 (2020)","journal-title":"IET Commun."},{"issue":"1","key":"9_CR21","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1109\/COMST.2019.2959013","volume":"22","author":"Y Zhou","year":"2020","unstructured":"Zhou, Y., Yu, F.R., Chen, J., Kuo, Y.: Cyber-physical-social systems: a state-of-the-art survey, challenges and opportunities. IEEE Commun. Surv. Tutor. 22(1), 389\u2013425 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"9_CR22","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/TNSM.2016.2559448","volume":"13","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Cai, Z., Wang, X.: Fakemask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Serv. Manag. 13(2), 335\u2013348 (2016)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"4","key":"9_CR23","first-page":"577","volume":"15","author":"Z Cai","year":"2018","unstructured":"Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. 15(4), 577\u2013590 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"9_CR24","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/TVT.2017.2738018","volume":"67","author":"Z He","year":"2018","unstructured":"He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665\u2013673 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"9_CR25","doi-asserted-by":"publisher","first-page":"2323","DOI":"10.1109\/JIOT.2017.2749443","volume":"5","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., Zhang, P., Liu, D., Sun, S.: SRSM-based adaptive relay selection for D2D communications. IEEE Internet Things J. 5(4), 2323\u20132332 (2018)","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"9_CR26","doi-asserted-by":"publisher","first-page":"6621","DOI":"10.1109\/TWC.2015.2457427","volume":"14","author":"Y Zhao","year":"2015","unstructured":"Zhao, Y., Li, Y., Cao, Y., Jiang, T., Ge, N.: Social-aware resource allocation for device-to-device communications underlaying cellular networks. IEEE Trans. Wireless Commun. 14(12), 6621\u20136634 (2015)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"3","key":"9_CR27","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1109\/TETC.2017.2699695","volume":"5","author":"X Zhang","year":"2017","unstructured":"Zhang, X., et al.: Information caching strategy for cyber social computing based wireless networks. IEEE Trans. Emerging Top. Comput. 5(3), 391\u2013402 (2017)","journal-title":"IEEE Trans. Emerging Top. Comput."},{"issue":"5","key":"9_CR28","doi-asserted-by":"publisher","first-page":"4615","DOI":"10.1109\/TVT.2018.2796575","volume":"67","author":"C Ma","year":"2018","unstructured":"Ma, C., et al.: Socially aware caching strategy in device-to-device communication networks. IEEE Trans. Veh. Technol. 67(5), 4615\u20134629 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Mustafa, H.A., Shakir, M.Z., Imran, M.A., Tafazolli, R.: Distance based cooperation region for D2D pair. In: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pp. 1\u20136, May 2015","DOI":"10.1109\/VTCSpring.2015.7145780"},{"issue":"8","key":"9_CR30","doi-asserted-by":"publisher","first-page":"3610","DOI":"10.1109\/TCOMM.2018.2821158","volume":"66","author":"H Wang","year":"2018","unstructured":"Wang, H., Xu, Y., Huang, K., Han, Z., Tsiftsis, T.A.: Cooperative secure transmission by exploiting social ties in random networks. IEEE Trans. Commun. 66(8), 3610\u20133622 (2018)","journal-title":"IEEE Trans. Commun."},{"key":"9_CR31","unstructured":"Gradshteyn, I.S., Ryzhik, I.M.: Table of integrals, series and products, vol. 20, no. 96, pp. 1157\u20131160 (2007)"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59016-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T14:33:44Z","timestamp":1619274824000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59016-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030590154","9783030590161"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59016-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"216","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6-7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}