{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:07:55Z","timestamp":1759939675614,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2018,2,2]],"date-time":"2018-02-02T00:00:00Z","timestamp":1517529600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Project supported by the National Natural Science Foundation of China","award":["61673200"],"award-info":[{"award-number":["61673200"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s00500-018-3055-7","type":"journal-article","created":{"date-parts":[[2018,2,2]],"date-time":"2018-02-02T04:14:49Z","timestamp":1517544889000},"page":"7893-7899","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cooperation of improved HK networks based on prisoner dilemma game"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2459-8839","authenticated-orcid":false,"given":"Yunsheng","family":"Deng","sequence":"first","affiliation":[]},{"given":"Ping","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Hongyong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,2]]},"reference":[{"key":"3055_CR1","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/S0378-4371(99)00291-5","volume":"272","author":"AL Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si AL, Albert R, Jeong H (1999) Mean-field theory for scale-free random networks. Phys A Stat Mech Appl 272:173\u2013187","journal-title":"Phys A Stat Mech Appl"},{"key":"3055_CR2","doi-asserted-by":"crossref","unstructured":"Chen LQ, Gao JC, Xie G, Liu H.Y, L YA(2015) Routing to enhance traffic capacity for scale-free networks with tunable clustering. In: Advanced information technology, electronic and automation control conference. Chongqing, pp 110\u2013113","DOI":"10.1109\/IAEAC.2015.7428529"},{"key":"3055_CR3","first-page":"37","volume":"42","author":"AX Cui","year":"2015","unstructured":"Cui AX, Fu Y (2015) Accelerated-growth HK network evolution model. Comput Sci 42:37\u201339","journal-title":"Comput Sci"},{"key":"3055_CR4","doi-asserted-by":"publisher","first-page":"108103","DOI":"10.1103\/PhysRevLett.98.108103","volume":"98","author":"J G\u00f3mezgarde\u00f1es","year":"2007","unstructured":"G\u00f3mezgarde\u00f1es J, Campillo M, Flor\u00eda LM, Moreno Y (2007) Dynamical organization of cooperation in complex topologies. Phys Rev Lett 98:108103","journal-title":"Phys Rev Lett"},{"key":"3055_CR5","first-page":"95","volume":"65","author":"P Holme","year":"2001","unstructured":"Holme P, Kim BJ (2001) Growing scale-free networks with tunable clustering. Phys Rev E Stat Nonlinear Soft Matter Phys 65:95\u2013129","journal-title":"Phys Rev E Stat Nonlinear Soft Matter Phys"},{"key":"3055_CR6","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.ins.2017.05.031","volume":"412\u2013413","author":"ZG Huang","year":"2017","unstructured":"Huang ZG, Liu SL, Mao XP, Chen KF, Li J (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412\u2013413:223\u2013241","journal-title":"Inf Sci"},{"key":"3055_CR7","first-page":"121","volume":"35","author":"WG Li","year":"2009","unstructured":"Li WG, Wang LH, Chen MF (2009) Study and improvement on growing HK network model. Comput Eng 35:121\u2013122","journal-title":"Comput Eng"},{"key":"3055_CR8","first-page":"287","volume":"85","author":"PP Li","year":"2012","unstructured":"Li PP, Ke JH, Lin ZQ, Hui PM (2012) Cooperative behavior in evolutionary snowdrift games with the unconditional imitation rule on regular lattices. Phys Rev E 85:287\u2013300","journal-title":"Phys Rev E"},{"key":"3055_CR9","first-page":"1","volume":"11","author":"J Li","year":"2015","unstructured":"Li J, Yan HY, Liu ZL, Chen XF, Huang XY, Wong DS (2015a) Location-sharing systems with enhanced privacy. IEEE Syst J Mob Online Soc Netw 11:1\u201310","journal-title":"IEEE Syst J Mob Online Soc Netw"},{"key":"3055_CR10","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.chaos.2015.06.022","volume":"80","author":"RQ Li","year":"2015","unstructured":"Li RQ, Sun SW, Ma YL, Wang L, Xia CY (2015b) Effect of clustering on attack vulnerability of interdependent scale-free networks. Chaos Solitons Fractals 80:109\u2013116","journal-title":"Chaos Solitons Fractals"},{"key":"3055_CR11","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.future.2017.02.006","volume":"74","author":"P Li","year":"2017","unstructured":"Li P, Li J, Huang Z, Li T, Gao CZ, Yiu SM, Chen K (2017a) Multi-key privacy-preserving deep learning in cloud computing. Future Gen Comput Syst 74:76\u201385","journal-title":"Future Gen Comput Syst"},{"key":"3055_CR12","doi-asserted-by":"crossref","unstructured":"Li P, Li J, Huang Z, Gao CZ, Chen WB, Chen K (2017b) Privacy-preserving outsourced classification in cloud computing. Clust Comput 1\u201310","DOI":"10.1007\/s10586-017-0849-9"},{"key":"3055_CR13","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1016\/j.physa.2016.01.032","volume":"450","author":"C Luo","year":"2016","unstructured":"Luo C, Zhang XL, Liu H, Shao R (2016) Cooperation in memory-based prisoner\u2019s dilemma game on interdependent networks. Phys A Stat Mech Appl 450:560\u2013569","journal-title":"Phys A Stat Mech Appl"},{"key":"3055_CR14","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.physa.2015.08.031","volume":"441","author":"XK Meng","year":"2016","unstructured":"Meng XK, Sun SW, Li XX, Wang L, Xia CY, Sun JQ (2016) Interdependency enriches the spatial reciprocity in prisoner\u2019s dilemma game on weighted networks. Phys A Stat Mech Appl 441:388\u2013396","journal-title":"Phys A Stat Mech Appl"},{"key":"3055_CR15","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1038\/359826a0","volume":"359","author":"MA Nowak","year":"1992","unstructured":"Nowak MA, May RM (1992) Evolutionary games and spatial chaos. Nature 359:826\u2013829","journal-title":"Nature"},{"key":"3055_CR16","doi-asserted-by":"publisher","first-page":"098104","DOI":"10.1103\/PhysRevLett.95.098104","volume":"95","author":"FC Santos","year":"2005","unstructured":"Santos FC, Pacheco JM (2005) Scale-free networks provide a unifying framework for the emergence of cooperation. Phys Rev Lett 95:098104","journal-title":"Phys Rev Lett"},{"key":"3055_CR17","first-page":"375","volume":"65","author":"YP Song","year":"2016","unstructured":"Song YP, Ni J (2016) Effect of variable network clustering on the accuracy of node centrality. Acta Phys Sin 65:375\u2013382","journal-title":"Acta Phys Sin"},{"key":"3055_CR18","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of \u2018small-world\u2019networks. Nature 393:440\u2013442","journal-title":"Nature"},{"key":"3055_CR19","first-page":"106","volume":"29","author":"YZ Xu","year":"2016","unstructured":"Xu YZ, Zhang DM, Zeng C, Sun YQ (2016) Research on and modeling of the improved HK network model. Electron Sci Tech 29:106\u2013109","journal-title":"Electron Sci Tech"},{"key":"3055_CR20","doi-asserted-by":"publisher","first-page":"1650093","DOI":"10.1142\/S0129183116500935","volume":"27","author":"XJ Zhang","year":"2016","unstructured":"Zhang XJ, G B, Guan XM, Zhu YB, Lv RL (2016) Cascading failure in scale-free networks with tunable clustering. Int J Mod Phys C 27:1650093\u20131650093","journal-title":"Int J Mod Phys C"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3055-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3055-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3055-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T01:24:38Z","timestamp":1570670678000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3055-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,2]]},"references-count":20,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["3055"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3055-7","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2018,2,2]]},"assertion":[{"value":"2 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standard"}}]}}