{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:14:10Z","timestamp":1761581650679,"version":"3.41.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"S3","license":[{"start":{"date-parts":[[2018,1,19]],"date-time":"2018-01-19T00:00:00Z","timestamp":1516320000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61461017"],"award-info":[{"award-number":["61461017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Hainan Natural Science Foundation Innovation Research Team Project","award":["2017CXTD0004"],"award-info":[{"award-number":["2017CXTD0004"]}]},{"name":"the Hainan Province Key Research and Development Projects","award":["ZDYF2016002"],"award-info":[{"award-number":["ZDYF2016002"]}]},{"name":"the Innovative Research Project of Postgraduates in Hainan Province","award":["Hyb2017-07"],"award-info":[{"award-number":["Hyb2017-07"]}]},{"name":"the Open Topic of State Key Laboratory of Marine Resources Utilization in South China Sea of Hainan University","award":["2016013A"],"award-info":[{"award-number":["2016013A"]}]},{"name":"the Key Laboratory of Sanya Project","award":["L1410"],"award-info":[{"award-number":["L1410"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s10586-018-1780-4","type":"journal-article","created":{"date-parts":[[2018,1,19]],"date-time":"2018-01-19T22:44:55Z","timestamp":1516401895000},"page":"7481-7489","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Cluster computing data mining based on massive intrusion interference constraints in hybrid networks"],"prefix":"10.1007","volume":"22","author":[{"given":"Kun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Haifeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhuang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,19]]},"reference":[{"issue":"4","key":"1780_CR1","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1109\/TC.2014.2308213","volume":"64","author":"JW Hsieh","year":"2015","unstructured":"Hsieh, J.W., Lam, K.Y., Huang, P.C., et al.: Block-based multi-version B+-Tree for flash-based embedded database systems [J]. IEEE Trans. Comput. 64(4), 925\u2013940 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"1780_CR2","doi-asserted-by":"crossref","unstructured":"Dai, L., Gao, X., Wang, Z.: Energy-efficient hybrid precoding based on successive interference cancelation for millimeter-wave massive MIMO systems [C]. In: Radio and Antenna Days of the Indian Ocean, pp. 1\u20132. IEEE (2015)","DOI":"10.1109\/RADIO.2015.7323368"},{"issue":"12","key":"1780_CR3","first-page":"107","volume":"41","author":"WM Zhang","year":"2014","unstructured":"Zhang, W.M., Chen, Q.Z.: Network intrusion detection algorithm based on HHT with shift hierarchical control [J]. Comput. Sci. 41(12), 107\u2013111 (2014)","journal-title":"Comput. Sci."},{"key":"1780_CR4","doi-asserted-by":"crossref","unstructured":"Jia, W., Xiao, L., Zhu, D.: A mini-ripple control method for doubly salient electromagnetic motor control system [C]. In: Applied Power Electronics Conference and Exposition, pp. 1886\u20131890. IEEE (2017)","DOI":"10.1109\/APEC.2017.7930955"},{"issue":"6","key":"1780_CR5","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1109\/JSTARS.2014.2329330","volume":"7","author":"YC Chen","year":"2014","unstructured":"Chen, Y.C., Lin, Z.H., Zhao, X., et al.: Deep learning-based classification of hyperspectral data [J]. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 7(6), 2094\u20132107 (2014)","journal-title":"IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens."},{"issue":"5","key":"1780_CR6","doi-asserted-by":"publisher","first-page":"2384","DOI":"10.1109\/TGRS.2014.2359933","volume":"53","author":"LJ Wan","year":"2015","unstructured":"Wan, L.J., Tang, K., Li, M.Z., et al.: Collaborative active and semisupervised learning for hyperspectral remote sensing image classification [J]. IEEE Trans. Geosci. Remote Sens. 53(5), 2384\u20132396 (2015)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"issue":"23","key":"1780_CR7","doi-asserted-by":"publisher","first-page":"6093","DOI":"10.1016\/j.ijleo.2013.04.104","volume":"124","author":"H Hao","year":"2013","unstructured":"Hao, H.: Multi component LFM signal detection and parameter estimation based on EEMD-FRFT [J]. Opt. Int. J. Light Electron Opt. 124(23), 6093\u20136096 (2013)","journal-title":"Opt. Int. J. Light Electron Opt."},{"issue":"3","key":"1780_CR8","first-page":"123","volume":"35","author":"B Meng","year":"2016","unstructured":"Meng, B., Zhang, J.L., Lu, J.T.: Automatic analysis of authentication of OpenID connect protocol based on the computational model [J]. J. South Central Univ. Natl. 35(3), 123\u2013129 (2016)","journal-title":"J. South Central Univ. Natl."},{"issue":"8","key":"1780_CR9","first-page":"1193","volume":"35","author":"HX Wang","year":"2014","unstructured":"Wang, H.X., Wang, S.Y., Wang, X., et al.: Analysis of LFM signals and improvement of IFM system [J]. Acta Armamentarii 35(8), 1193\u20131199 (2014)","journal-title":"Acta Armamentarii"},{"issue":"1","key":"1780_CR10","first-page":"477","volume":"2174","author":"KQ Yan","year":"2009","unstructured":"Yan, K.Q., Wang, S.C., Liu, C.W.: A hybrid intrusion detection system of cluster-based wireless sensor networks [J]. Lect. Notes Eng. Comput. Sci. 2174(1), 477\u2013480 (2009)","journal-title":"Lect. Notes Eng. Comput. Sci."},{"issue":"13","key":"1780_CR11","doi-asserted-by":"publisher","first-page":"2271","DOI":"10.1016\/j.comnet.2010.03.012","volume":"54","author":"P Thulasiraman","year":"2010","unstructured":"Thulasiraman, P., Shen, X.: Interference aware resource allocation for hybrid hierarchical wireless networks [J]. Comput. Netw. 54(13), 2271\u20132280 (2010)","journal-title":"Comput. Netw."},{"key":"1780_CR12","doi-asserted-by":"crossref","unstructured":"Tran, H., Zepernick, H.J., Phan, H., et al.: Cognitive cooperative networks with cluster-based relaying under interference constraints[C]. In: International Conference on Ubiquitous & Future Networks, pp. 542\u2013546. IEEE (2013)","DOI":"10.1109\/ICUFN.2013.6614879"},{"issue":"24","key":"1780_CR13","first-page":"53","volume":"16","author":"MG Xie","year":"2017","unstructured":"Xie, M.G., Jia, X.D., Zhou, M.: Research on energy efficiency of hybrid networks based on massive MIMO and D2D [J]. J. Signal Process. 16(24), 53\u201358 (2017)","journal-title":"J. Signal Process."},{"issue":"3","key":"1780_CR14","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1504\/IJAHUC.2016.075379","volume":"21","author":"W Feng","year":"2016","unstructured":"Feng, W., Feng, S., Ding, Y., et al.: Scalable cross-layer multipath routing under interference constraints in wireless mesh networks [J]. Int. J. Ad Hoc Ubiquitous Comput. 21(3), 194\u2013206 (2016)","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"issue":"1","key":"1780_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1504\/IJWMC.2007.013794","volume":"2","author":"Y Liu","year":"2007","unstructured":"Liu, Y., Li, Y., Man, H., et al.: A hybrid data mining anomaly detection technique in ad hoc networks [J]. Int. J. Wirel. Mobile Comput. 2(1), 37\u201346 (2007)","journal-title":"Int. J. Wirel. Mobile Comput."},{"issue":"9","key":"1780_CR16","first-page":"13","volume":"6","author":"EL Yousef","year":"2015","unstructured":"Yousef, E.L., Toumanari, A., Bouirden, A., et al.: Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection [J]. Int. J. Adv. Comput. Sci. Appl. 6(9), 13\u201317 (2015)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"2","key":"1780_CR17","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TMC.2011.261","volume":"12","author":"Y Ding","year":"2013","unstructured":"Ding, Y., Pongaliur, K., Xiao, L.: Channel allocation and routing in hybrid multichannel multiradio wireless mesh networks [J]. IEEE Trans. Mobile Comput. 12(2), 206\u2013218 (2013)","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"2","key":"1780_CR18","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/TMC.2014.2320255","volume":"14","author":"H Shen","year":"2015","unstructured":"Shen, H., Li, Z., Yu, L.: A P2P-based market-guided distributed routing mechanism for high-throughput hybrid wireless networks [J]. IEEE Trans. Mobile Comput. 14(2), 245\u2013260 (2015)","journal-title":"IEEE Trans. Mobile Comput."},{"key":"1780_CR19","doi-asserted-by":"crossref","unstructured":"Kurras, M., Thiele, L., Caire, G.: Multi-stage beamforming for interference coordination in massive MIMO networks[C]. In: Asilomar Conference on Signals, Systems and Computers, pp. 700\u2013703. IEEE (2015)","DOI":"10.1109\/ACSSC.2015.7421223"},{"issue":"11","key":"1780_CR20","doi-asserted-by":"publisher","first-page":"9397","DOI":"10.1109\/TVT.2016.2519893","volume":"65","author":"K An","year":"2016","unstructured":"An, K., Lin, M., Zhu, W.P., et al.: Outage performance of cognitive hybrid satellite-terrestrial networks with interference constraint [J]. IEEE Trans. Veh. Technol. 65(11), 9397\u20139404 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"03","key":"1780_CR21","first-page":"555","volume":"31","author":"HH Wu","year":"2016","unstructured":"Wu, H.H., Mu, Y., Qu, Z.F., et al.: Similarity and nearness relational degree based on panel data [J]. Control Decis. 31(03), 555\u2013558 (2016)","journal-title":"Control Decis."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-1780-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-1780-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-1780-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T23:05:59Z","timestamp":1751238359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-1780-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,19]]},"references-count":21,"journal-issue":{"issue":"S3","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["1780"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-1780-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2018,1,19]]},"assertion":[{"value":"17 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}