{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T16:29:07Z","timestamp":1751560147194,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030699987"},{"type":"electronic","value":"9783030699994"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-69999-4_30","type":"book-chapter","created":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T17:03:53Z","timestamp":1615309433000},"page":"225-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Blockchain Technology in Inclusive Finance Under the Background of Big Data"],"prefix":"10.1007","author":[{"given":"Jiayi","family":"Han","sequence":"first","affiliation":[]},{"given":"Yuze","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,10]]},"reference":[{"issue":"1","key":"30_CR1","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/JAS.2017.7510736","volume":"5","author":"W Xu","year":"2018","unstructured":"Xu, W., Zhou, H., Cheng, N., et al.: Internet of vehicles in big data era. IEEE\/CAA J. Autom. Sinica 5(1), 19\u201335 (2018)","journal-title":"IEEE\/CAA J. Autom. Sinica"},{"issue":"1","key":"30_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MWC.2018.1700215","volume":"25","author":"X Wang","year":"2018","unstructured":"Wang, X., Zhang, Y., Leung, V.C.M., et al.: D2D Big data: content deliveries over wireless device-to-device sharing in large scale mobile networks. IEEE Wirel. Commun. 25(1), 32\u201338 (2018)","journal-title":"IEEE Wirel. Commun."},{"issue":"4","key":"30_CR3","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1109\/TCE.2017.015014","volume":"63","author":"AR Al-Ali","year":"2018","unstructured":"Al-Ali, A.R., Zualkernan, I.A., Rashid, M., et al.: A smart home energy management system using IoT and big data analytics approach. IEEE Trans. Consum. Electron. 63(4), 426\u2013434 (2018)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"4","key":"30_CR4","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1109\/TNNLS.2017.2649101","volume":"29","author":"K Gu","year":"2018","unstructured":"Gu, K., Tao, D., Qiao, J.F., et al.: Learning a no-reference quality assessment model of enhanced images with big data. IEEE Trans. Neural Netw. Learn. Syst. 29(4), 1301\u20131313 (2018)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"1","key":"30_CR5","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MWC.2018.1700193","volume":"25","author":"N Zhang","year":"2018","unstructured":"Zhang, N., Yang, P., Ren, J., et al.: Synergy of big data and 5G wireless networks: opportunities, approaches, and challenges. IEEE Wirel. Commun. 25(1), 12\u201318 (2018)","journal-title":"IEEE Wirel. Commun."},{"issue":"2","key":"30_CR6","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2018.1700298","volume":"56","author":"M Mohammadi","year":"2018","unstructured":"Mohammadi, M., Al-Fuqaha, A.: Enabling cognitive smart cities using big data and machine learning: approaches and challenges. IEEE Commun. Mag. 56(2), 94\u2013101 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"30_CR7","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1177\/1094342018778123","volume":"32","author":"JC Andre","year":"2018","unstructured":"Andre, J.C., Antoniu, G., Asch, M., et al.: Big data and extreme-scale computing: pathways to convergence - toward a shaping strategy for a future software and data ecosystem for scientific inquiry. Int. J. High Perform. Comput. Appl. 32(4), 435\u2013479 (2018)","journal-title":"Int. J. High Perform. Comput. Appl."},{"issue":"2","key":"30_CR8","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1214\/18-AOAS1161SF","volume":"12","author":"M Xiao-Li","year":"2018","unstructured":"Xiao-Li, M.: Statistical paradises and paradoxes in big data (I): law of large populations, big data paradox, and the 2016 US presidential election. Ann. Appl. Stat. 12(2), 685\u2013726 (2018)","journal-title":"Ann. Appl. Stat."},{"issue":"1","key":"30_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1111\/dech.12347","volume":"49","author":"L Mann","year":"2018","unstructured":"Mann, L.: Left to other peoples\u2019 devices? A political economy perspective on the big data revolution in development. Dev. Chang. 49(1), 3\u20136 (2018)","journal-title":"Dev. Chang."},{"issue":"6","key":"30_CR10","doi-asserted-by":"publisher","first-page":"2337","DOI":"10.1109\/TNNLS.2017.2654357","volume":"29","author":"M Duan","year":"2018","unstructured":"Duan, M., Li, K., Liao, X., et al.: A parallel multiclassification algorithm for big data using an extreme learning machine. IEEE Trans. Neural Netw. Learn. Syst. 29(6), 2337\u20132351 (2018)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."}],"container-title":["Advances in Intelligent Systems and Computing","Cyber Security Intelligence and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-69999-4_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T17:10:18Z","timestamp":1615309818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-69999-4_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030699987","9783030699994"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-69999-4_30","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Cyber Security Intelligence and Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csia2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csia2021.com.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}