{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:14:16Z","timestamp":1750997656415,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685045"},{"type":"electronic","value":"9783319685052"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68505-2_28","type":"book-chapter","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T01:08:03Z","timestamp":1509325683000},"page":"326-338","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Android App Recommendation Approach by Merging Network Traffic Cost"],"prefix":"10.1007","author":[{"given":"Xin","family":"Su","sequence":"first","affiliation":[]},{"given":"Xuchong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiuchuan","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Tong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Grace, M.C., Zhou, W., Jiang, X., Sadeghi, A.: Unsafe exposure analysis of mobile in-app advertisements. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 101\u2013112 (2012)","DOI":"10.1145\/2185448.2185464"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Dai, S., Tongaonkar, A., Wang, X., Nucci, A., Song, D.: NetworkProfiler: towards automatic fingerprinting of android apps. In: 2013 Proceedings IEEE INFOCOM, pp. 809\u2013817 (2013)","DOI":"10.1109\/INFCOM.2013.6566868"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Falaki, H., Lymberopoulos, D., Mahajan, R., Kandula, S., Estrin, D.: A first look at traffic on smartphones. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 281\u2013287 (2013)","DOI":"10.1145\/1879141.1879176"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Yan, B., Chen, G.L.: AppJoy: personalized mobile application discovery. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 113\u2013126 (2011)","DOI":"10.1145\/1999995.2000007"},{"issue":"1","key":"28_CR5","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"98","author":"ZJ Fu","year":"2015","unstructured":"Fu, Z.J., Sun, X.M., Liu, Q., Zhou, L., Shu, J.G.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190\u2013200 (2015)","journal-title":"IEICE Trans. Commun."},{"key":"28_CR6","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.neunet.2014.05.009","volume":"58","author":"HR Xie","year":"2014","unstructured":"Xie, H.R., Li, Q., Mao, X.D., Li, X.D., Cai, Y., Rao, Y.H.: Community-aware user profile enrichment in folksonomy. Neural Netw. 58, 111\u2013121 (2014)","journal-title":"Neural Netw."},{"key":"28_CR7","unstructured":"Sentz, K., Ferson, S.: Combination of evidence in Dempster-Shafer theory. Technical report, Sandia National Laboratories (2014)"},{"key":"28_CR8","unstructured":"Cost-benefit analysis. http:\/\/en.wikipedia.org\/wiki\/Cost-benefit_analysis"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, W.N., Wang, J., Chen, B.W., Zhao, X.X.: To personalize or not: a risk management perspective. In: Proceedings of the 7th ACM Conference on Recommender Systems (2013)","DOI":"10.1145\/2507157.2507167"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Luo, C.Y., Xiong, H., Zhou, W.J., Guo, Y.H., Deng, G.S.: Enhancing investment decisions in P2P lending: an investor composition perspective. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 292\u2013300 (2011)","DOI":"10.1145\/2020408.2020458"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., Karagiannis, T.: Rise of the planet of the apps: a systematic study of the mobile app ecosystem. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 277\u2013290 (2013)","DOI":"10.1145\/2504730.2504749"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Chris, B., Tal, S., Erin, R., Ari, L., Matt, D., Nicole, H., Greg, H.: Learning to rank using gradient descent. In: Proceedings of the 22nd International Conference on Machine Learning, pp. 89\u201396 (2005)","DOI":"10.1145\/1102351.1102363"},{"key":"28_CR13","first-page":"933","volume":"4","author":"F Yoav","year":"2005","unstructured":"Yoav, F., Raj, I., Robert, E.S., Yoram, S.: An efficient boosting algorithm for combining preferences. J. Mach. Learn. Res. 4, 933\u2013969 (2005)","journal-title":"J. Mach. Learn. Res."},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Cao, Z., Qin, T., Liu, T.Y., Tsai, M.F., Li, H.: Learning to rank: from pairwise approach to listwise approach. In: Proceedings of the 24th International Conference on Machine Learning, pp. 129\u2013136 (2007)","DOI":"10.1145\/1273496.1273513"},{"key":"28_CR15","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.knosys.2016.10.016","volume":"115","author":"Y Kong","year":"2017","unstructured":"Kong, Y., Zhang, M.J., Ye, D.Y.: A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl. Based Syst. 115, 123\u2013132 (2017)","journal-title":"Knowl. Based Syst."},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Bae, D., Han, K.J., Park, J., Yi, M.Y.: AppTrends: a graph-based mobile app recommendation system using usage history. In: International Conference on Big Data and Smart Computing, pp. 210\u2013216 (2015)","DOI":"10.1109\/35021BIGCOMP.2015.7072833"},{"key":"28_CR17","unstructured":"Xu, X.Y., Dutta, K., Datta, A.: Functionality-based mobile app recommendation by identifying aspects from user reviews. In: Proceedings of the International Conference on Information Systems - Building a Better World through Information Systems, pp. 1\u201310 (2014)"},{"key":"28_CR18","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.neucom.2014.12.109","volume":"172","author":"HR Xie","year":"2016","unstructured":"Xie, H.R., Li, X.D., Wang, T., Chen, L., Li, K., Wang, F.L., Cai, Y., Li, Q., Min, H.Q.: Personalized search for social media via dominating verbal context. Neurocomputing 172, 27\u201337 (2016)","journal-title":"Neurocomputing"},{"issue":"17","key":"28_CR19","doi-asserted-by":"publisher","first-page":"4002","DOI":"10.1002\/sec.1582","volume":"9","author":"Q Liu","year":"2016","unstructured":"Liu, Q., Cai, W.D., Shen, J., Fu, Z.J., Liu, X.D., Linge, N.: A speculative approach to spatialtemporal efficiency with multiobjective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002\u20134012 (2016)","journal-title":"Secur. Commun. Netw."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68505-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:52:48Z","timestamp":1750967568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68505-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685045","9783319685052"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68505-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"31 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}