{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T03:10:36Z","timestamp":1774321836417,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T00:00:00Z","timestamp":1518998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11036-018-1032-0","type":"journal-article","created":{"date-parts":[[2018,2,18]],"date-time":"2018-02-18T22:20:30Z","timestamp":1518992430000},"page":"1003-1014","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3081-7751","authenticated-orcid":false,"given":"Ke","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yuming","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Supeng","family":"Leng","sequence":"additional","affiliation":[]},{"given":"Sabita","family":"Maharjan","sequence":"additional","affiliation":[]},{"given":"Alexey","family":"Vinel","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,19]]},"reference":[{"issue":"7","key":"1032_CR1","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/CC.2016.7559082","volume":"13","author":"Z Qu","year":"2016","unstructured":"Qu Z, Keeney J, Robitzsch S, Zaman F, Wang X (2016) Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. China Commun 13(7):108\u2013116","journal-title":"China Commun"},{"issue":"1","key":"1032_CR2","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2017","unstructured":"Zhou Z, Wang Y, Wu QMJ, Yang C, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12(1):48\u201363","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"1032_CR3","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"1032_CR4","first-page":"91","volume":"18","author":"X Chen","year":"2017","unstructured":"Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the chinese character encoding. J Internet Technol 18(2):91\u201398","journal-title":"J Internet Technol"},{"issue":"9","key":"1032_CR5","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2016","unstructured":"Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546\u20132559","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"12","key":"1032_CR6","doi-asserted-by":"publisher","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z Fu","year":"2016","unstructured":"Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706\u20132716","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1032_CR7","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.knosys.2016.10.016","volume":"115","author":"Y Kong","year":"2017","unstructured":"Kong Y, Zhang M, Ye D (2017) A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl-Based Syst 115:123\u2013132","journal-title":"Knowl-Based Syst"},{"key":"1032_CR8","unstructured":"Shen J, Shen J, Chen X, Huang X, Susilo W An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Information Forensics and Security, accepted"},{"issue":"17","key":"1032_CR9","doi-asserted-by":"publisher","first-page":"4002","DOI":"10.1002\/sec.1582","volume":"9","author":"Q Liu","year":"2016","unstructured":"Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Netw 9(17):4002\u20134012","journal-title":"Secur Commun Netw"},{"issue":"11","key":"1032_CR10","doi-asserted-by":"publisher","first-page":"9247","DOI":"10.1109\/TVT.2016.2521703","volume":"65","author":"X Liu","year":"2016","unstructured":"Liu X, Li Y, Chen H (2016) Wireless resource scheduling based on backoff for multiuser multiservice mobile cloud computing. IEEE Trans Veh Technol 65(11):9247\u20139259","journal-title":"IEEE Trans Veh Technol"},{"key":"1032_CR11","unstructured":"Shen J, Chang S, Shen J, Liu Q, Sun X (2016) A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems"},{"key":"1032_CR12","unstructured":"Gu B, Sheng VS A robust regularization path algorithm for \u03bd-support vector classification. IEEE Trans Neural Networks and Learning Systems, accepted"},{"key":"1032_CR13","doi-asserted-by":"publisher","first-page":"5896","DOI":"10.1109\/ACCESS.2016.2597169","volume":"4","author":"K Zhang","year":"2016","unstructured":"Zhang K, Mao Y, Leng S, Zhao Q, Li L, Peng X, Pan L, Zhang G, Maharjan S, Zhang Y (2016) Energy-efficient offloading for mobile edge computing in 5G heterogenous networks. IEEE Access 4:5896\u20135907","journal-title":"IEEE Access"},{"issue":"12","key":"1032_CR14","doi-asserted-by":"publisher","first-page":"7938","DOI":"10.1109\/TIE.2015.2481792","volume":"62","author":"R Yu","year":"2015","unstructured":"Yu R, Huang X, Kang J, Ding J, Maharjan S, Gjessing S, Zhang Y (2015) Cooperative resource management in cloud-enabled vehicular networks. IEEE Trans Ind Electron 62(12):7938\u20137951","journal-title":"IEEE Trans Ind Electron"},{"key":"1032_CR15","volume-title":"Contract economics","author":"L Werin","year":"1992","unstructured":"Werin L, Wijkander H (1992) Contract economics. Blackwell, Oxford"},{"key":"1032_CR16","doi-asserted-by":"publisher","first-page":"3522","DOI":"10.1109\/ACCESS.2016.2560902","volume":"4","author":"X Huang","year":"2016","unstructured":"Huang X, Yu R, Kang J, Wang N, Maharjan S, Zhang Y (2016) Software defined networking with pseudonym systems for secure vehicular clouds. IEEE Access 4:3522\u20133534","journal-title":"IEEE Access"},{"issue":"2","key":"1032_CR17","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"11","key":"1032_CR18","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"12","key":"1032_CR19","doi-asserted-by":"publisher","first-page":"7920","DOI":"10.1109\/TIE.2015.2482119","volume":"62","author":"K Zheng","year":"2015","unstructured":"Zheng K, Meng H, Chatzimisios P, Lei L, Shen X (2015) An SMDP-based resource allocation in vehicular cloud computing systems. IEEE Trans Ind Electron 62(12):7920\u20137928","journal-title":"IEEE Trans Ind Electron"},{"key":"1032_CR20","doi-asserted-by":"publisher","first-page":"3617","DOI":"10.1109\/ACCESS.2016.2569585","volume":"4","author":"D Kwak","year":"2016","unstructured":"Kwak D, Liu R, Kim D, Nath B, Iftode L (2016) Seeing is believing: sharing real-time visual traffic information via vehicular clouds. IEEE Access 4:3617\u20133631","journal-title":"IEEE Access"},{"issue":"Part B","key":"1032_CR21","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1016\/j.jvcir.2016.07.018","volume":"40","author":"Z Pan","year":"2016","unstructured":"Pan Z, Jin P, Lei J, Zhang Y, Sun X, Kwong S (2016) Fast reference frame selection based on content similarity for low complexity HEVC encoder. J Vis Commun Image Represent 40(Part B):516\u2013524","journal-title":"J Vis Commun Image Represent"},{"issue":"9","key":"1032_CR22","first-page":"1","volume":"59","author":"Y Chen","year":"2016","unstructured":"Chen Y, Hao C, Wu W, Wu E (2016) Robust dense reconstruction by range merging based on confidence estimation. Sci China Inf Sci 59(9):1\u201311","journal-title":"Sci China Inf Sci"},{"issue":"2","key":"1032_CR23","first-page":"209","volume":"18","author":"C Yuan","year":"2017","unstructured":"Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF. J Internet Technol 18(2):209\u2013216","journal-title":"J Internet Technol"},{"key":"1032_CR24","doi-asserted-by":"crossref","unstructured":"Tong L, Li Y, Gao W (2016) A hierarchical edge cloud architecture for mobile computing. In: Proceedings of the IEEE international conference on computer communications (INFOCOM), pp 1\u20139","DOI":"10.1109\/INFOCOM.2016.7524340"},{"issue":"10","key":"1032_CR25","first-page":"4268","volume":"64","author":"Y Wang","year":"2016","unstructured":"Wang Y, Sheng M, Wang X, Wang L, Li J (2016) Mobile-edge computing: partial computation offloading using dynamic voltage scaling. IEEE Trans Commun 64(10):4268\u20134282","journal-title":"IEEE Trans Commun"},{"key":"1032_CR26","doi-asserted-by":"crossref","unstructured":"Sun X, Ansari N (2016) PRIMAL: profit maximization avatar placement for mobile edge computing. In: Proceedings of IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2016.7511131"},{"key":"1032_CR27","doi-asserted-by":"crossref","unstructured":"Sapienza M, Torre GL, Leombruno G, Guardo E, Cavallo M, Tomarchio O (2016) Solving critical events through mobile edge computing: an approach for smart cities. In: Proceedings of IEEE international conference on smart computing (SMARTCOMP), pp 1\u20135","DOI":"10.1109\/SMARTCOMP.2016.7501719"},{"issue":"10","key":"1032_CR28","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOM.2016.7588230","volume":"54","author":"N Kumar","year":"2016","unstructured":"Kumar N, Zeadally S, Rodrigues JJPC (2016) Vehicular delay-tolerant networks for smart grid data management using mobile edge computing. IEEE Commun Mag 54(10):60\u201366","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"1032_CR29","doi-asserted-by":"publisher","first-page":"2795","DOI":"10.1109\/TNET.2015.2487344","volume":"24","author":"X Chen","year":"2016","unstructured":"Chen X, Jiao L, Li W, Fu X (2016) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE\/ACM Trans Netw 24(5):2795\u20132808","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"4","key":"1032_CR30","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/JSAC.2011.110415","volume":"29","author":"L Gao","year":"2011","unstructured":"Gao L, Wang X, Xu Y, Zhang Q (2011) Spectrum trading in cognitive radio networks: a contract-theoretic modeling approach. IEEE J Sel Areas Commun 29(4):843\u2013855","journal-title":"IEEE J Sel Areas Commun"},{"key":"1032_CR31","doi-asserted-by":"crossref","unstructured":"Li Y, Wang P, Niyato D, Zhang Y (2014) Contract-theoretic modeling for content delivery in relay-based publish-subscribe networks. In: IEEE international conference on communications (ICC), pp 2678\u20132683","DOI":"10.1109\/ICC.2014.6883728"},{"issue":"10","key":"1032_CR32","doi-asserted-by":"publisher","first-page":"2144","DOI":"10.1109\/JSAC.2015.2435356","volume":"33","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Song L, Saad W, Dawy Z, Han Z (2015) Contract-based incentive mechanisms for device-to-device communications in cellular networks. IEEE J Sel Areas Commun 33(10):2144\u20132155","journal-title":"IEEE J Sel Areas Commun"},{"key":"1032_CR33","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1109\/ACCESS.2016.2543841","volume":"4","author":"K Zhang","year":"2016","unstructured":"Zhang K, Mao Y, Leng S, Maharjan S, Zhang Y, Vinel A, Jonsson M (2016) Incentive-driven energy trading in the smart grid. IEEE Access 4:1243\u20131257","journal-title":"IEEE Access"},{"issue":"7","key":"1032_CR34","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/CC.2016.7559076","volume":"13","author":"C Yuan","year":"2016","unstructured":"Yuan C, Sun X, LV R (2016) Fingerprint liveness detection based on multi-scale LPQ and PCA. China Commun 13(7):60\u201365","journal-title":"China Commun"},{"issue":"4","key":"1032_CR35","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.2011.5741145","volume":"49","author":"Y Zhang","year":"2011","unstructured":"Zhang Y, Yu R, Yao W, Xie S, Xiao Y, Guizani M (2011) Home M2M networks: architectures, standards, and QoS improvement. IEEE Commun Mag 49(4):44\u201352","journal-title":"IEEE Commun Mag"},{"key":"1032_CR36","unstructured":"Fu Z, Huang F, Sun X, Vasilakos AV, Yang C Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Services Computing, accepted"},{"issue":"3","key":"1032_CR37","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/TBC.2016.2580920","volume":"62","author":"Z Pan","year":"2016","unstructured":"Pan Z, Lei J, Zhang Y, Sun X, Kwong S (2016) Fast motion estimation based on content property for low-complexity H.265\/HEVC encoder. IEEE Trans Broadcast 62(3):675\u2013684","journal-title":"IEEE Trans Broadcast"},{"key":"1032_CR38","unstructured":"Gu B, Sun X, Sheng VS Structural minimax probability machine. IEEE Trans Neural Networks and Learning Systems, accepted"},{"issue":"2","key":"1032_CR39","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/TBC.2015.2419824","volume":"61","author":"Z Pan","year":"2015","unstructured":"Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans Broadcast 61(2):166\u2013176","journal-title":"IEEE Trans Broadcast"},{"issue":"6","key":"1032_CR40","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1587\/transinf.2015EDP7341","volume":"E99-D","author":"Z Zhou","year":"2016","unstructured":"Zhou Z, Yang C, Chen B, Sun X, Liu Q, Wu QMJ (2016) Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans. Inf Syst E99-D(6):1531\u20131540","journal-title":"IEICE Trans. Inf Syst"},{"issue":"8","key":"1032_CR41","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TIFS.2017.2692728","volume":"12","author":"Z Fu","year":"2017","unstructured":"Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forensics Secur 12(8):1874\u2013 1884","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1032_CR42","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.neucom.2017.01.064","volume":"238","author":"Q Tian","year":"2017","unstructured":"Tian Q, Chen S (2017) Cross-heterogeneous-database age estimation through correlation representation learning. Neurocomputing 238:286\u2013295","journal-title":"Neurocomputing"},{"key":"1032_CR43","first-page":"31","volume-title":"Contract theory","author":"P Bolton","year":"2005","unstructured":"Bolton P, Dewatripont M (2005) Contract theory. MIT Press, Cambridge, pp 31\u201364"},{"issue":"7","key":"1032_CR44","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/CC.2016.7559071","volume":"13","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Sun X, Wang B (2016) Efficient algorithm for K-barrier coverage based on integer linear programming. China Commun 13(7):16\u201323","journal-title":"China Commun"},{"issue":"7","key":"1032_CR45","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Tay KY, Romano W, Li S (2015) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Syst 26(7):1403\u20131416","journal-title":"IEEE Trans Neural Netw Learn Syst"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1032-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1032-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1032-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T06:17:10Z","timestamp":1558937830000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1032-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,19]]},"references-count":45,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["1032"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1032-0","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,19]]},"assertion":[{"value":"19 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}