{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:12:20Z","timestamp":1750997540752,"version":"3.41.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T00:00:00Z","timestamp":1508457600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"The National Key R & D Programs of China","award":["No. 2017YFB0803300"],"award-info":[{"award-number":["No. 2017YFB0803300"]}]},{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61300178"],"award-info":[{"award-number":["61300178"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s00521-017-3231-1","type":"journal-article","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T02:18:44Z","timestamp":1508465924000},"page":"2813-2825","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Deep trajectory: a deep learning approach for mobile advertising in vehicular networks"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4257-4347","authenticated-orcid":false,"given":"Xin","family":"Li","sequence":"first","affiliation":[]},{"given":"Liang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,20]]},"reference":[{"key":"3231_CR1","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/COMST.2008.4625806","volume":"10","author":"Y Toor","year":"2008","unstructured":"Toor Y, Muhlethaler P, Laouiti A, Da Le Fortelle A (2008) Vehicle ad hoc networks: applications. IEEE Commun Surv Rutor 10:74\u201388","journal-title":"IEEE Commun Surv Rutor"},{"key":"3231_CR2","doi-asserted-by":"crossref","unstructured":"Haghirian P, Madlberger M, Tanuskova A (2005) Increasing advertising value of mobile marketing-an empirical study of antecedents. In: Proceedings of the 38th annual Hawaii international conference on system sciences, pp 32c\u201332c","DOI":"10.1109\/HICSS.2005.311"},{"key":"3231_CR3","doi-asserted-by":"crossref","unstructured":"de Castro JE, Shimakawa H (2006) Mobile advertisement system utilizing user\u2019s contextual information. In: 7th international conference on mobile data management (MDM\u201906), pp 91\u201391","DOI":"10.1109\/MDM.2006.105"},{"key":"3231_CR4","doi-asserted-by":"crossref","unstructured":"Haddadi H, Hui P, Brown I (2010) MobiAd: private and scalable mobile advertising. In: Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture, pp 33\u201338","DOI":"10.1145\/1859983.1859993"},{"key":"3231_CR5","doi-asserted-by":"publisher","first-page":"1770","DOI":"10.1109\/TPDS.2015.2467392","volume":"27","author":"J Qin","year":"2016","unstructured":"Qin J, Zhu H, Zhu Y, Lu L, Xue G, Li M (2016) Post: exploiting dynamic sociality for mobile advertising in vehicular networks. IEEE Trans Parallel Distrib Syst 27:1770\u20131782","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3231_CR6","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9 (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"3231_CR7","doi-asserted-by":"crossref","unstructured":"Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 199\u2013208","DOI":"10.1145\/1557019.1557047"},{"key":"3231_CR8","doi-asserted-by":"crossref","unstructured":"Wang Y, Cong G, Song G, Xie K (2010) Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 1039\u20131048","DOI":"10.1145\/1835804.1835935"},{"key":"3231_CR9","doi-asserted-by":"crossref","unstructured":"Korkmaz G, Ekici E, \u00d6zg\u00fcner F, \u00d6zg\u00fcner \u00dc (2004) Urban multi-hop broadcast protocol for inter-vehicle communication systems. In: Proceedings of the 1st ACM international workshop on vehicular ad hoc networks, pp 76\u201385","DOI":"10.1145\/1023875.1023887"},{"key":"3231_CR10","unstructured":"Saha AK, Johnson DB (2004) Modeling mobility for vehicular ad-hoc networks. In: Proceedings of the 1st ACM international workshop on vehicular ad hoc networks, pp 91\u201392"},{"key":"3231_CR11","doi-asserted-by":"crossref","unstructured":"Wu H, Fujimoto R, Guensler R, Hunter M (2004) MDDV: a mobility-centric data dissemination algorithm for vehicular networks. In: Proceedings of the 1st ACM international workshop on vehicular ad hoc networks, pp 47\u201356","DOI":"10.1145\/1023875.1023884"},{"key":"3231_CR12","doi-asserted-by":"crossref","unstructured":"Lochert C, Hartenstein H, Tian J, Fussler H, Hermann D, Mauve M (2003) A routing strategy for vehicular ad hoc networks in city environments. In: Intelligent Vehicles Symposium, 2003. Proceedings. IEEE, pp 156\u2013161","DOI":"10.1109\/IVS.2003.1212901"},{"key":"3231_CR13","doi-asserted-by":"crossref","unstructured":"Heinzelman WR, Kulik J, Balakrishnan H (1999) Adaptive protocols for information dissemination in wireless sensor networks. In: Proceedings of the 5th annual ACM\/IEEE international conference on Mobile computing and networking, pp 174\u2013185","DOI":"10.1145\/313451.313529"},{"key":"3231_CR14","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/TITS.2004.842407","volume":"6","author":"L Wischhof","year":"2005","unstructured":"Wischhof L, Ebner A, Rohling H (2005) Information dissemination in self-organizing intervehicle networks. IEEE Trans Intell Transp Syst 6:90\u2013101","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"3231_CR15","doi-asserted-by":"crossref","unstructured":"Jeung H, Liu Q, Shen HT, Zhou X (2008) A hybrid prediction model for moving objects. In: IEEE international conference on data engineering, pp 70\u201379","DOI":"10.1109\/ICDE.2008.4497415"},{"key":"3231_CR16","first-page":"432","volume-title":"A new European approach for intersection safety the EC-Project INTERSAFE","author":"K F\u00fcrstenberg","year":"2005","unstructured":"F\u00fcrstenberg K, R\u00f6ssler B (2005) A new European approach for intersection safety the EC-Project INTERSAFE. Springer, Berlin, pp 432\u2013436"},{"key":"3231_CR17","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","volume":"50","author":"S Zeadally","year":"2012","unstructured":"Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2012) Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun Syst 50:217\u2013241","journal-title":"Telecommun Syst"},{"key":"3231_CR18","doi-asserted-by":"crossref","unstructured":"Bai F, Stancil DD, Krishnan H (2010) Toward understanding characteristics of dedicated short range communications (DSRC) from a perspective of vehicular network engineers. In: International conference on mobile computing and networking, MOBICOM 2010, Chicago, Illinois, USA, September, pp 329\u2013340","DOI":"10.1145\/1859995.1860033"},{"key":"3231_CR19","unstructured":"Sun L, Axhausen KW, Lee D-H, Huang X (2013) Understanding the collective encounter patterns in an empirical urban contact network, CoRR, abs\/1301.5979"},{"key":"3231_CR20","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521:436\u2013444","journal-title":"Nature"},{"key":"3231_CR21","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/JSAC.2012.120511","volume":"30","author":"F Ye","year":"2012","unstructured":"Ye F, Roy S, Wang H (2012) Efficient data dissemination in vehicular ad hoc networks. IEEE J Sel Areas Commun 30:769\u2013779","journal-title":"IEEE J Sel Areas Commun"},{"key":"3231_CR22","doi-asserted-by":"crossref","unstructured":"Chen K, Chen L, Mao J, Zhao D (2013) A multiple metrics gateway selection algorithm for vehicular ad hoc networks in fading channels. In: Proceedings of the 9th international conference on computational intelligence and security (CIS), pp 648\u2013652","DOI":"10.1109\/CIS.2013.142"},{"key":"3231_CR23","doi-asserted-by":"crossref","unstructured":"Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, pp 57\u201366","DOI":"10.1145\/502512.502525"},{"key":"3231_CR24","doi-asserted-by":"crossref","unstructured":"Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp 61\u201370","DOI":"10.1145\/775047.775057"},{"key":"3231_CR25","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter M (1978) Threshold models of collective behavior. Am J Sociol 83:1420\u20131443","journal-title":"Am J Sociol"},{"key":"3231_CR26","doi-asserted-by":"publisher","first-page":"5766","DOI":"10.1073\/pnas.082090499","volume":"99","author":"DJ Watts","year":"2002","unstructured":"Watts DJ (2002) A simple model of global cascades on random networks. Proc Natl Acad Sci USA 99:5766\u20135771","journal-title":"Proc Natl Acad Sci USA"},{"key":"3231_CR27","doi-asserted-by":"crossref","unstructured":"Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 1029\u20131038","DOI":"10.1145\/1835804.1835934"},{"key":"3231_CR28","first-page":"1371","volume":"7","author":"M Kimura","year":"2007","unstructured":"Kimura M, Saito K, Nakano R (2007) Extracting influential nodes for information diffusion on a social network. AAAI 7:1371\u20131376","journal-title":"AAAI"},{"key":"3231_CR29","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1109\/TII.2016.2605629","volume":"13","author":"H Zhang","year":"2017","unstructured":"Zhang H, Cao X, Ho JKL, Chow TWS (2017) Object-level video advertising: an optimization framework. IEEE Trans Ind Inform 13:520\u2013531","journal-title":"IEEE Trans Ind Inform"},{"key":"3231_CR30","unstructured":"Wu Y, Zhu Y, Li B (2011) Trajectory improves data delivery in vehicular networks. In: Proceedings of the 30th IEEE international conference on computer communications. INFOCOM 2011, pp 2183\u20132191"},{"key":"3231_CR31","doi-asserted-by":"publisher","first-page":"2332","DOI":"10.1109\/TVT.2007.897656","volume":"56","author":"V Namboodiri","year":"2007","unstructured":"Namboodiri V, Gao L (2007) Prediction-based routing for vehicular ad hoc networks. IEEE Trans Veh Technol 56:2332\u20132345","journal-title":"IEEE Trans Veh Technol"},{"key":"3231_CR32","doi-asserted-by":"crossref","unstructured":"Xue G et al (2012) A novel vehicular location prediction based on mobility patterns for routing in urban vanet. EURASIP J Wirel Commun Netw C7\u2013222(2012):1\u201314","DOI":"10.1186\/1687-1499-2012-222"},{"key":"3231_CR33","unstructured":"Burgess J, Gallagher B, Jensen D, Levine BN (2006) MaxProp: routing for vehicle-based disruption-tolerant networks. In: Proceedings of the 25th IEEE international conference on computer communications. INFOCOM 2006, vol 6, pp 1\u201311"},{"key":"3231_CR34","unstructured":"Choi O, Kim S, Jeong J, Lee H, Chong S (2013) Delay-optimal data forwarding in vehicular sensor networks. In: Proceedings of the 11th international symposium on modeling and optimization in mobile, ad hoc and wireless networks. WiOpt 2013, pp 532\u2013539"},{"key":"3231_CR35","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural networks. In: Advances in neural information processing systems, vol 25, pp 1097\u20131105"},{"key":"3231_CR36","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1038\/nature16961","volume":"529","author":"D Silver","year":"2016","unstructured":"Silver D, Huang A, Maddison CJ, Guez A, Sifre L, Van Den Driessche G, Schrittwieser J, Antonoglou I, Panneershelvam V, Lanctot M (2016) Mastering the game of Go with deep neural networks and tree search. Nature 529:484\u2013489","journal-title":"Nature"},{"key":"3231_CR37","doi-asserted-by":"crossref","unstructured":"Rumelhart DE, Hinton GE, Williams RJ (1985) Learning internal representations by error propagation. DTIC Document","DOI":"10.21236\/ADA164453"},{"key":"3231_CR38","first-page":"1","volume":"5","author":"DE Rumelhart","year":"1988","unstructured":"Rumelhart DE, Hinton GE, Williams RJ (1988) Learning representations by back-propagating errors. Cogn Model 5:1","journal-title":"Cogn Model"},{"key":"3231_CR39","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"5","author":"K Hornik","year":"1989","unstructured":"Hornik K, Stinchcombe M, White H (1989) Multilayer feedforward networks are universal approximators. Neural Netw 5:359\u2013366","journal-title":"Neural Netw"},{"key":"3231_CR40","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1038\/35016072","volume":"405","author":"RHR Hahnloser","year":"2000","unstructured":"Hahnloser RHR, Sarpenshkar R, Mahowald MA, Douglas RJ, Seung HS (2000) Digital selection and analogue amplification coesist in a cortex-inspired silicon circuit. Nature 405:947\u2013951","journal-title":"Nature"},{"key":"3231_CR41","unstructured":"de Br\u00e9bisson A, Simon \u00c9, Auvolat A, Vincent P, Bengio Y (2015) Artificial neural networks applied to taxi destination prediction. arXiv:1508.00021"},{"key":"3231_CR42","first-page":"1137","volume":"3","author":"Y Bengio","year":"2003","unstructured":"Bengio Y, Ducharme R, Vincent P, Jauvin C (2003) A neural probabilistic language model. J Mach Learn Res 3:1137\u20131155","journal-title":"J Mach Learn Res"},{"key":"3231_CR43","unstructured":"S. J. U. Traffic Information Grid Team, Grid Computing Center (2005) Shanghai taxi trace data. http:\/\/wirelesslab.sjtu.edu.cn\/"},{"key":"3231_CR44","unstructured":"Kaggle (2015) ECML\/PKDD 15: taxi trajectory prediction(I). http:\/\/www.kaggle.com\/c\/pkdd-15-predict-taxi-service-trajectory-i"},{"issue":"8","key":"3231_CR45","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"issue":"2","key":"3231_CR46","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/TII.2016.2601521","volume":"13","author":"H Zhang","year":"2017","unstructured":"Zhang H, Li J, Ji Y, Yue H (2017) Understanding subtitles by character-level sequence-to-sequence learning. IEEE Trans Ind Inform 13(2):616\u2013624","journal-title":"IEEE Trans Ind Inform"},{"key":"3231_CR47","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/72.279181","volume":"5","author":"Y Bengio","year":"1994","unstructured":"Bengio Y, Simard P, Frasconi P (1994) Learning long-term dependencies with gradient descent is difficult. IEEE Trans Neural Netw 5:157\u2013166","journal-title":"IEEE Trans Neural Netw"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-017-3231-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-017-3231-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-017-3231-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T15:51:52Z","timestamp":1750953112000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-017-3231-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,20]]},"references-count":47,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["3231"],"URL":"https:\/\/doi.org\/10.1007\/s00521-017-3231-1","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2017,10,20]]},"assertion":[{"value":"10 May 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}