{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T21:10:01Z","timestamp":1748553001747,"version":"3.41.0"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319218366"},{"type":"electronic","value":"9783319218373"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21837-3_71","type":"book-chapter","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T13:40:31Z","timestamp":1438350031000},"page":"725-734","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications"],"prefix":"10.1007","author":[{"given":"Luke","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Li","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,1]]},"reference":[{"issue":"10","key":"71_CR1","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1109\/LCOMM.2014.2351400","volume":"18","author":"L Wang","year":"2014","unstructured":"Wang, L., Wu, H.: Fast pairing of device-to-device link underlay for spectrum sharing with cellular users. IEEE Commu. Lett. 18(10), 1803\u20131806 (2014)","journal-title":"IEEE Commu. Lett."},{"issue":"2","key":"71_CR2","first-page":"413","volume":"10","author":"H Min","year":"2011","unstructured":"Min, H., Seo, W., Lee, J., Park, S., Hong, D.: Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks. IEEE ITWC 10(2), 413\u2013418 (2011)","journal-title":"IEEE ITWC"},{"key":"71_CR3","doi-asserted-by":"crossref","unstructured":"Wang, L., Araniti, G., Cao, C., Wang, W., Liu, Y.: Device-to-device users clustering based on physical and social characteristics. IEEE JDSN (2015)","DOI":"10.1155\/2015\/165608"},{"key":"71_CR4","doi-asserted-by":"crossref","unstructured":"Wen, S., Zhu, X., Lin, Z., Zhang, X., Yang, D.: Energy efficient power allocation schemes for device-to-device (D2D) communication. In: IEEE VTC Fall, Las Vegas, USA, pp. 1\u20135, September 2013","DOI":"10.1109\/VTCFall.2013.6692186"},{"key":"71_CR5","doi-asserted-by":"crossref","unstructured":"Tang, H., Ding, Z., Yoo, S.J.B., Hamalainen, J.: Outage constrained joint precoding for D2D underlay cellular networks. In: IEEE GLOBECOM, Atlanta, USA, pp. 3540\u20133545, December 2013","DOI":"10.1109\/GLOCOM.2013.6831622"},{"issue":"99","key":"71_CR6","first-page":"1","volume":"10","author":"L Wang","year":"2014","unstructured":"Wang, L., Tang, H., Ciemy, M.: Device-to-device link admission policy based on social interaction information. IEEE TVT 10(99), 1\u20137 (2014)","journal-title":"IEEE TVT"},{"key":"71_CR7","doi-asserted-by":"crossref","unstructured":"Chen, X., Ian Proulx, B., Gong, X., Zhang, J.: Social trust and social reciprocity based cooperative D2D communications. In: ACM MobiHoc, Bangalore, India, pp. 187\u2013196, July 2013","DOI":"10.1145\/2491288.2491302"},{"key":"71_CR8","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wu, J.: Social-tie-based information dissemination in mobile opportunistic social networks. In: WWMMN, Madrid, Spain, pp. 1\u20136, June 2013","DOI":"10.1109\/WoWMoM.2013.6583411"},{"issue":"9","key":"71_CR9","first-page":"548","volume":"31","author":"K-C Chen","year":"2013","unstructured":"Chen, K.-C., Chiang, M., Poor, V.: From technological networks to social networks. IEEE JSAC 31(9), 548\u2013572 (2013)","journal-title":"IEEE JSAC"},{"issue":"4","key":"71_CR10","first-page":"465","volume":"22","author":"U Gupta","year":"2010","unstructured":"Gupta, U., Ranganathan, N.: A game theoretic approach for simultaneous compaction and equipartitioning of spatial data sets. IEEE TKDE 22(4), 465\u2013478 (2010)","journal-title":"IEEE TKDE"},{"key":"71_CR11","doi-asserted-by":"crossref","unstructured":"Park, G.Y., Kim, H., Jeong, H.W., Youn, H.Y.: A novel cluster head selection method based on k-means algorithm for energy efficient wireless sensor network. In: IEEE ICAINAW, Barcelona, Spain, pp. 910\u2013915, March 2013","DOI":"10.1109\/WAINA.2013.123"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21837-3_71","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T20:48:47Z","timestamp":1748551727000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21837-3_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319218366","9783319218373"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21837-3_71","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}