{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:05:26Z","timestamp":1742969126957,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811695759"},{"type":"electronic","value":"9789811695766"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-9576-6_4","type":"book-chapter","created":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T13:02:27Z","timestamp":1642856547000},"page":"44-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Credible Information Fusion Method Based on Cascaded Topology Interactive Traceability"],"prefix":"10.1007","author":[{"given":"Yueqing","family":"Gao","sequence":"first","affiliation":[]},{"given":"Yuting","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Huachun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Benhui","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Lulu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chu","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,22]]},"reference":[{"issue":"10","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1810","DOI":"10.3390\/math8101810","volume":"8","author":"M Krnc","year":"2020","unstructured":"Krnc, M., \u0160krekovski, R.: Group degree centrality and centralization in networks. Mathematics 8(10), 1810 (2020)","journal-title":"Mathematics"},{"issue":"23","key":"4_CR2","first-page":"e2","volume":"7","author":"A Samad","year":"2020","unstructured":"Samad, A., Qadir, M., Nawaz, I., Islam, M.A., Aleem, M.: SAM centrality: a hop-based centrality measure for ranking users in social network. EAI Endorsed Trans. Ind. Netw. Intell. Syst. 7(23), e2 (2020)","journal-title":"EAI Endorsed Trans. Ind. Netw. Intell. Syst."},{"issue":"1","key":"4_CR3","first-page":"12","volume":"10","author":"EB Alighanbari","year":"2020","unstructured":"Alighanbari, E.B.: An Influence maximization algorithm in social network using K-shell decomposition and community detection. Netw. Biol. 10(1), 12\u201323 (2020)","journal-title":"Netw. Biol."},{"issue":"4","key":"4_CR4","first-page":"668","volume":"46","author":"T Agryzkov","year":"2019","unstructured":"Agryzkov, T., Tortosa, L., Vicent, J.F., Wilson, R.: A centrality measure for urban networks based on the eigenvector centrality concept. Environ. Plann. B: Urban Anal. City Sci. 46(4), 668\u2013689 (2019)","journal-title":"Environ. Plann. B: Urban Anal. City Sci."},{"issue":"3929","key":"4_CR5","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1126\/science.168.3929.335","volume":"168","author":"G Salton","year":"1970","unstructured":"Salton, G.: Automatic text analysis. Science 168(3929), 335\u2013343 (1970)","journal-title":"Science"},{"issue":"4","key":"4_CR6","doi-asserted-by":"publisher","first-page":"48007","DOI":"10.1209\/0295-5075\/96\/48007","volume":"96","author":"Z Liu","year":"2011","unstructured":"Liu, Z., Zhang, Q.-M., L\u00fc, L., Zhou, T.: Link prediction in complex networks: a local na\u00efve Bayes model. EPL (Europhys. Lett.) 96(4), 48007 (2011)","journal-title":"EPL (Europhys. Lett.)"},{"issue":"9","key":"4_CR7","doi-asserted-by":"publisher","first-page":"e107056","DOI":"10.1371\/journal.pone.0107056","volume":"9","author":"F Tan","year":"2014","unstructured":"Tan, F., Xia, Y., Zhu, B.: Link prediction in complex networks: a mutual information perspective. PLoS One 9(9), e107056 (2014)","journal-title":"PLoS One"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.physa.2017.09.042","volume":"491","author":"Q Zhang","year":"2018","unstructured":"Zhang, Q., Li, M., Deng, Y.: Measure the structure similarity of nodes in complex networks based on relative entropy. Phys. A: Stat. Mech. Appl. 491, 749\u2013763 (2018)","journal-title":"Phys. A: Stat. Mech. Appl."},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/BF02289026","volume":"18","author":"L Katz","year":"1953","unstructured":"Katz, L.: A new status index derived from sociometric analysis. Psychometrika 18, 39\u201343 (1953)","journal-title":"Psychometrika"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"160602","DOI":"10.1103\/PhysRevLett.102.160602","volume":"102","author":"Z Burda","year":"2009","unstructured":"Burda, Z., Duda, J., Luck, J.M., Waclaw, B.: Localization of the maximal entropy random walk. Phys. Rev. Lett. 102, 160602 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Goyal, A., Lu, W., Lakshmanan, L.V.S.: SIMPATH: an efficient algorithm for influence maximization under the linear threshold model. In: 2011 IEEE 11th International Conference on Data Mining, pp. 211\u2013220. IEEE (2011)","DOI":"10.1109\/ICDM.2011.132"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-030-32101-7_29","volume-title":"Financial Cryptography and Data Security","author":"Z Ren","year":"2019","unstructured":"Ren, Z., Erkin, Z.: VAPOR: a value-centric blockchain that is scale-out, decentralized, and flexible by design. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 487\u2013507. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_29"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-9576-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,21]],"date-time":"2022-04-21T16:07:11Z","timestamp":1650557231000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-9576-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811695759","9789811695766"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-9576-6_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isyou.info\/conf\/mobisec21\/I","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}