{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:26:35Z","timestamp":1762431995493},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10709-2","type":"journal-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T14:02:45Z","timestamp":1614261765000},"page":"19263-19290","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Score-based Incentive Mechanism (SIM) for live multimedia streaming in peer-to-peer network"],"prefix":"10.1007","volume":"80","author":[{"given":"Sarfaraj Alam","family":"Ansari","sequence":"first","affiliation":[]},{"given":"Kunwar","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Mahesh Chandra","family":"Govil","sequence":"additional","affiliation":[]},{"given":"Mushtaq","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Tanvi","family":"Chawla","sequence":"additional","affiliation":[]},{"given":"Anita","family":"Choudhary","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,25]]},"reference":[{"key":"10709_CR1","doi-asserted-by":"crossref","unstructured":"Adar E, Huberman BA (2000) Free riding on gnutella. First Monday Journal on the Internet: 1\u201322","DOI":"10.5210\/fm.v5i10.792"},{"key":"10709_CR2","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1016\/j.procs.2019.04.150","volume":"151","author":"B Alotibi","year":"2019","unstructured":"Alotibi B, Alarifi N, Abdulghani M, Altoaimy L (2019) Overcoming free-riding behavior in peer-to-peer networks using points system approach. Procedia Computer Science 151:1060\u20131065","journal-title":"Procedia Computer Science"},{"key":"10709_CR3","doi-asserted-by":"crossref","unstructured":"Anagnostakis KG, Greenwald MB (2004) Exchange-based incentive mechanisms for peer-to-peer file sharing. In: 24th international conference on distributed computing systems, 2004. Proceedings. IEEE, pp 524\u2013533","DOI":"10.1109\/ICDCS.2004.1281619"},{"key":"10709_CR4","doi-asserted-by":"crossref","unstructured":"Antoniadis P, Le Grand B (2007) Incentives for resource sharing in self-organized communities: from economics to social psychology. In: 2nd international conference on digital information management, 2007. ICDIM\u201907, vol 2. IEEE, pp 756\u2013761","DOI":"10.1109\/ICDIM.2007.4444315"},{"key":"10709_CR5","doi-asserted-by":"crossref","unstructured":"Awiphan S, Su Z, Katto J (2010) Tomo: a two-layer mesh\/tree structure for live streaming in p2p overlay network. In: 2010 7th IEEE consumer communications and networking conference (CCNC). IEEE, pp 1\u20135","DOI":"10.1109\/CCNC.2010.5421709"},{"key":"10709_CR6","doi-asserted-by":"crossref","unstructured":"Baumgart I, Heep B, Krause S (2007) Oversim: a flexible overlay network simulation framework. In: IEEE global internet symposium, 2007. IEEE, pp 79\u201384","DOI":"10.1109\/GI.2007.4301435"},{"key":"10709_CR7","doi-asserted-by":"crossref","unstructured":"Benazir SM, Umarani V (2016) Detection of selfish & malicious behavior using dtn-chord monitoring in mobile networks. In: 2016 international conference on information communication and embedded systems (ICICES). IEEE, pp 1\u20135","DOI":"10.1109\/ICICES.2016.7518882"},{"key":"10709_CR8","doi-asserted-by":"crossref","unstructured":"Bocek T, Shann M, Hausheer D, Stiller B (2008) Game theoretical analysis of incentives for large-scale, fully decentralized collaboration networks. In: IEEE international symposium on parallel and distributed processing, 2008. IPDPS 2008. IEEE, pp 1\u20138","DOI":"10.1109\/IPDPS.2008.4536195"},{"key":"10709_CR9","doi-asserted-by":"crossref","unstructured":"Buragohain C, Agrawal D, Suri S (2003) A game theoretic framework for incentives in p2p systems. In: Third international conference on peer-to-peer computing, 2003. (p2p 2003). Proceedings. IEEE, pp 48\u201356","DOI":"10.1109\/PTP.2003.1231503"},{"key":"10709_CR10","unstructured":"Byun H, Lee M (2009) Hypo: a peer-to-peer based hybrid overlay structure. In: 11th international conference on advanced communication technology, 2009. ICACT 2009, vol 1. IEEE, pp 840\u2013844"},{"issue":"3","key":"10709_CR11","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1007\/s11227-014-1204-z","volume":"69","author":"J Chang","year":"2014","unstructured":"Chang J, Pang Z, Xu W, Wang H, Yin G (2014) An incentive compatible reputation mechanism for p2p systems. The Journal of Supercomputing 69(3):1382\u20131409","journal-title":"The Journal of Supercomputing"},{"issue":"1","key":"10709_CR12","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1109\/TDSC.2016.2530705","volume":"15","author":"JH Cho","year":"2016","unstructured":"Cho JH, Chen R (2016) Provest: provenance-based trust model for delay tolerant networks. IEEE Transactions on Dependable and Secure Computing 15 (1):151\u2013165","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10709_CR13","unstructured":"Cohen B (2003) Incentives build robustness in bittorrent. In: Workshop on economics of peer-to-peer systems, vol 6, pp 68\u201372"},{"key":"10709_CR14","unstructured":"DC++. http:\/\/dcplusplus.sourceforge.net\/ (2020), [Online; Accessed 25 March 2020]"},{"key":"10709_CR15","doi-asserted-by":"crossref","unstructured":"Dorji D (2016) Credibility based feedback for reputation computation in peer-to-peer file sharing network. In: 2016 13th international joint conference on computer science and software engineering (JCSSE). IEEE, pp 1\u20136","DOI":"10.1109\/JCSSE.2016.7748924"},{"issue":"4","key":"10709_CR16","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1120717.1120723","volume":"5","author":"M Feldman","year":"2005","unstructured":"Feldman M, Chuang J (2005) Overcoming free-riding behavior in peer-to-peer systems. ACM Sigecom Exchanges 5(4):41\u201350","journal-title":"ACM Sigecom Exchanges"},{"key":"10709_CR17","doi-asserted-by":"crossref","unstructured":"Feldman M, Lai K, Stoica I, Chuang J (2004) Robust incentive techniques for peer-to-peer networks. In: Proceedings of the 5th ACM conference on electronic commerce. ACM, pp 102\u2013111","DOI":"10.1145\/988772.988788"},{"key":"10709_CR18","first-page":"06","volume":"703","author":"C Fry","year":"2006","unstructured":"Fry C, Reiter M (2006) Really truly trackerless bittorrent; school of computer science. Carnegie Mellon 703:06\u2013148","journal-title":"Carnegie Mellon"},{"key":"10709_CR19","doi-asserted-by":"crossref","unstructured":"Golle P, Leyton-Brown K, Mironov I, Lillibridge M (2001) Incentives for sharing in peer-to-peer networks. In: International workshop on electronic commerce. Springer, pp 75\u201387","DOI":"10.1007\/3-540-45598-1_9"},{"key":"10709_CR20","doi-asserted-by":"crossref","unstructured":"Gupta R, Somani AK (2004) Pricing strategy for incentivizing selfish nodes to share resources in peer-to-peer (p2p) networks. In: 12th IEEE international conference on networks, 2004. (ICON 2004). Proceedings, vol 2. IEEE, pp 624\u2013629","DOI":"10.1109\/ICON.2004.1409247"},{"key":"10709_CR21","doi-asserted-by":"publisher","first-page":"95574","DOI":"10.1109\/ACCESS.2020.2995274","volume":"8","author":"TH Hsu","year":"2020","unstructured":"Hsu TH, Tung YM (2020) A social-aware p2p video transmission strategy for multimedia iot devices. IEEE Access 8:95574\u201395584","journal-title":"IEEE Access"},{"key":"10709_CR22","unstructured":"Index CVN (2015) Forecast and methodology, 2014-2019 white paper. Technical Report, Cisco, Tech. Rep., 2015"},{"key":"10709_CR23","doi-asserted-by":"crossref","unstructured":"Iosifidis G, Koutsopoulos I (2008) Reputation-assisted utility maximization algorithmsfor peer-to-peer networks. In: 16th international workshop on quality of service, 2008. IWQos 2008. IEEE, pp 20\u201329","DOI":"10.1109\/IWQOS.2008.8"},{"key":"10709_CR24","doi-asserted-by":"crossref","unstructured":"Irwin D, Chase J, Grit L, Yumerefendi A (2005) Self-recharging virtual currency. In: Proceedings of the 2005 ACM SIGCOMM workshop on economics of peer-to-peer systems. ACM, pp 93\u201398","DOI":"10.1145\/1080192.1080194"},{"key":"10709_CR25","doi-asserted-by":"crossref","unstructured":"Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on World Wide Web. ACM, pp 640\u2013651","DOI":"10.1145\/775152.775242"},{"issue":"3","key":"10709_CR26","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.comnet.2007.11.002","volume":"52","author":"M Karakaya","year":"2008","unstructured":"Karakaya M, K\u00f6rpeo\u011flu \u0130, Ulusoy \u00d6. (2008) Counteracting free riding in peer-to-peer networks. Comput Netw 52(3):675\u2013694","journal-title":"Comput Netw"},{"issue":"9","key":"10709_CR27","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1109\/JSAC-OCN.2007.023405","volume":"25","author":"B Li","year":"2007","unstructured":"Li B, Xie S, Keung GY., Liu J, Stoica I, Zhang H, Zhang X (2007) An empirical study of the coolstreaming+ system. IEEE Journal on Selected Areas in Communications 25(9):1627\u20131639","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10709_CR28","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.knosys.2018.12.024","volume":"166","author":"M Li","year":"2019","unstructured":"Li M, Jin X, Guo C, Liu J, Cui G, Qiu T (2019) Rimnet: recommendation incentive mechanism based on evolutionary game dynamics in peer-to-peer service networks. Knowl-Based Syst 166:156\u2013169","journal-title":"Knowl-Based Syst"},{"key":"10709_CR29","doi-asserted-by":"crossref","unstructured":"Lian Q, Zhang Z, Yang M, Zhao BY, Dai Y, Li X (2007) An empirical study of collusion behavior in the maze p2p file-sharing system. In: 27th international conference on distributed computing systems, 2007. ICDCS\u201907. IEEE, pp 56\u201356","DOI":"10.1109\/ICDCS.2007.84"},{"issue":"1","key":"10709_CR30","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/s12083-007-0006-y","volume":"1","author":"Y Liu","year":"2008","unstructured":"Liu Y, Guo Y, Liang C (2008) A survey on peer-to-peer video streaming systems. Peer-to-Peer Networking and Applications 1(1):18\u201328","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"10709_CR31","unstructured":"Liu Y, Zhang J, An B, Sen S (2014) A practical robustness measure of incentive mechanisms. In: Proceedings of the 2014 international conference on autonomous agents and multi-agent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp 1379\u20131380"},{"key":"10709_CR32","unstructured":"Lu K, Wang S (2015) A reward-and-punishment aware incentive mechanism in p2p networks. In: 2015 12th international conference on fuzzy systems and knowledge discovery (FSKD). IEEE, pp 2049\u20132053"},{"issue":"2","key":"10709_CR33","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/COMST.2005.1610546","volume":"7","author":"EK Lua","year":"2005","unstructured":"Lua EK, Crowcroft J, Pias M, Sharma R, Lim S (2005) A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys & Tutorials 7(2):72\u201393","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"5","key":"10709_CR34","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/TNET.2006.882904","volume":"14","author":"RT Ma","year":"2006","unstructured":"Ma RT, Lee S, Lui J, Yau DK (2006) Incentive and service differentiation in p2p networks: a game theoretic approach. IEEE\/ACM Transactions on Networking (TON) 14(5):978\u2013991","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"key":"10709_CR35","doi-asserted-by":"crossref","unstructured":"Magharei N, Rejaie R (2006) Understanding mesh-based peer-to-peer streaming. In: Proceedings of the 2006 international workshop on network and operating systems support for digital audio and video. ACM, pp 1\u20136","DOI":"10.1145\/1378191.1378204"},{"issue":"8","key":"10709_CR36","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1109\/TMM.2010.2077623","volume":"12","author":"A Magnetto","year":"2010","unstructured":"Magnetto A, Gaeta R, Grangetto M, Sereno M (2010) Turinstream: a totally push, robust, and efficient p2p video streaming architecture. IEEE Transactions on Multimedia 12(8):901\u2013914","journal-title":"IEEE Transactions on Multimedia"},{"key":"10709_CR37","doi-asserted-by":"crossref","unstructured":"Montazeri A, Akbari B (2011) Mesh based p2p video streaming with a distributed incentive mechanism. In: 2011 international conference on information networking (ICOIN). IEEE, pp 108\u2013113","DOI":"10.1109\/ICOIN.2011.5723143"},{"key":"10709_CR38","doi-asserted-by":"crossref","unstructured":"Nishi Y, Sasabe M, Kasahara S (2020) Impact of locality-awareness on tit-for-tat-based p2p file distribution. In: 2020 IEEE 17th annual consumer communications & networking conference (CCNC). IEEE, pp 1\u20136","DOI":"10.1109\/CCNC46108.2020.9045338"},{"issue":"18","key":"10709_CR39","doi-asserted-by":"publisher","first-page":"24427","DOI":"10.1007\/s11042-018-5741-y","volume":"77","author":"K Pal","year":"2018","unstructured":"Pal K, Govil MC, Ahmed M (2018) Priority-based scheduling scheme for live video streaming in peer-to-peer network. Multimedia Tools and Applications 77(18):24427\u201324457","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"10709_CR40","doi-asserted-by":"publisher","first-page":"e3440","DOI":"10.1002\/dac.3440","volume":"31","author":"K Pal","year":"2018","unstructured":"Pal K, Govil MC, Ahmed M (2018) Slack time\u2013based scheduling scheme for live video streaming in p2p network. Int J Commun Syst 31(2):e3440","journal-title":"Int J Commun Syst"},{"issue":"23","key":"10709_CR41","doi-asserted-by":"publisher","first-page":"33679","DOI":"10.1007\/s11042-019-08010-4","volume":"78","author":"K Pal","year":"2019","unstructured":"Pal K, Govil MC, Ahmed M (2019) Flhyo: fuzzy logic based hybrid overlay for p2p live video streaming. Multimedia Tools and Applications 78(23):33679\u201333702","journal-title":"Multimedia Tools and Applications"},{"key":"10709_CR42","doi-asserted-by":"crossref","unstructured":"Pal K, Govil M, Ahmed M (2015) A new hybrid approach for overlay construction in p2p live streaming. In: 2015 international conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 431\u2013437","DOI":"10.1109\/ICACCI.2015.7275647"},{"key":"10709_CR43","unstructured":"PayPal. https:\/\/www.paypal.com\/ (2020), [Online; Accessed 10 April 2020]"},{"key":"10709_CR44","unstructured":"PPTV. http:\/\/www.pplive.com (2020), [Online; Accessed 05 April 2020]"},{"issue":"3","key":"10709_CR45","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1007\/s11042-016-3710-x","volume":"76","author":"F Peng","year":"2017","unstructured":"Peng F, Gong XQ, Long M, Sun XM (2017) A selective encryption scheme for protecting h. 264\/avc video in multimedia social network. Multimedia Tools and Applications 76(3):3235\u20133253","journal-title":"Multimedia Tools and Applications"},{"key":"10709_CR46","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-662-46578-3_17","volume":"339","author":"V Romero","year":"2015","unstructured":"Romero V, Festin CA (2015) A hybrid incentive-based peer selection scheme for unstructured peer-to-peer media streaming systems. Information Science and Applications 339:143\u2013150","journal-title":"Information Science and Applications"},{"key":"10709_CR47","doi-asserted-by":"crossref","unstructured":"Saeed S, Zubair I, Islam MH (2009) Detection of selfish nodes in peer-to-peer networks. In: First international conference on networked digital technologies, 2009. NDT\u201909. IEEE, pp 504\u2013507","DOI":"10.1109\/NDT.2009.5272098"},{"issue":"4","key":"10709_CR48","doi-asserted-by":"publisher","first-page":"1142","DOI":"10.1109\/SURV.2011.082911.00067","volume":"14","author":"P Seeling","year":"2012","unstructured":"Seeling P, Reisslein M (2012) Video transport evaluation with H.264 video traces. IEEE Communications Surveys and Tutorials, in print 14(4):1142\u20131165. Traces available at trace.eas.asu.edu","journal-title":"IEEE Communications Surveys and Tutorials, in print"},{"key":"10709_CR49","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.jnca.2018.07.008","volume":"123","author":"AM Shabut","year":"2018","unstructured":"Shabut AM, Kaiser MS, Dahal KP, Chen W (2018) A multidimensional trust evaluation model for manets. J Netw Comput Appl 123:32\u201341","journal-title":"J Netw Comput Appl"},{"key":"10709_CR50","doi-asserted-by":"crossref","unstructured":"Shahriar I, Qiu D, Jaumard B (2017) Modeling of free riders in p2p live streaming systems. In: 2017 international conference on computing, networking and communications (ICNC). IEEE, pp 729\u2013734","DOI":"10.1109\/ICCNC.2017.7876220"},{"key":"10709_CR51","doi-asserted-by":"crossref","unstructured":"Shetty A, Mhatre S, Sinvhal N, Devadkar KK (2019) Peer assisted parallel downloading system. In: 2019 international conference on communication and signal processing (ICCSP). IEEE, pp 0650\u20130655","DOI":"10.1109\/ICCSP.2019.8697914"},{"issue":"7","key":"10709_CR52","doi-asserted-by":"publisher","first-page":"10083","DOI":"10.1007\/s11042-016-3599-4","volume":"76","author":"Y Song","year":"2017","unstructured":"Song Y, Yang G, Xie H, Zhang D, Xingming S (2017) Residual domain dictionary learning for compressed sensing video recovery. Multimedia Tools and Applications 76(7):10083\u201310096","journal-title":"Multimedia Tools and Applications"},{"key":"10709_CR53","unstructured":"SopCast. http:\/\/www.sopcast.org (2020), [Online; Accessed 30 March 2020]"},{"issue":"8","key":"10709_CR54","doi-asserted-by":"publisher","first-page":"2047","DOI":"10.1109\/TIFS.2018.2807793","volume":"13","author":"Z Tang","year":"2018","unstructured":"Tang Z, Ding X, Zhong Y, Yang L, Li K (2018) A self-adaptive bell\u2013lapadula model based on model training with historical access logs. IEEE Transactions on Information Forensics and Security 13(8):2047\u20132061","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"10709_CR55","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/s11767-009-0018-2","volume":"27","author":"J Tian","year":"2010","unstructured":"Tian J, Yang L, Li J, Tian R (2010) A peer-to-peer incentive scheme for overcoming free riding. Journal of Electronics (China) 27(1):60\u201367","journal-title":"Journal of Electronics (China)"},{"key":"10709_CR56","unstructured":"UUSee. http:\/\/www.uusee.com (2020), [Online; Accessed 19 March 2020]"},{"key":"10709_CR57","doi-asserted-by":"crossref","unstructured":"Venkataraman V, Francis P (2006) Chunkyspread: multi-tree unstructured peer-to-peer multicast. In: 5th international workshop on peer-to-peer systems, IPTPS 2006, Santa Barbara, CA, USA","DOI":"10.1109\/ICNP.2006.320193"},{"key":"10709_CR58","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.future.2019.07.034","volume":"102","author":"EK Wang","year":"2020","unstructured":"Wang EK, Chen CM, Yiu SM, Hassan MM, Alrubaian M, Fortino G (2020) Incentive evolutionary game model for opportunistic social networks. Futur Gener Comput Syst 102:14\u201329","journal-title":"Futur Gener Comput Syst"},{"key":"10709_CR59","doi-asserted-by":"crossref","unstructured":"Wang F, Xiong Y, Liu J (2007) Mtreebone: a hybrid tree\/mesh overlay for application-layer live video multicast. In: 27th international conference on distributed computing systems, 2007. ICDCS\u201907. IEEE, pp 49\u201349","DOI":"10.1109\/ICDCS.2007.122"},{"key":"10709_CR60","doi-asserted-by":"crossref","unstructured":"Wang H, Liu C, Wang Y, Sun D (2018) A novel incentive mechanism based on reputation and trust for mobile crowd sensing network. In: 2018 international conference on control, automation and information sciences (ICCAIS). IEEE, pp 526\u2013530","DOI":"10.1109\/ICCAIS.2018.8570670"},{"issue":"8","key":"10709_CR61","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1109\/TMM.2007.907469","volume":"9","author":"S Xie","year":"2007","unstructured":"Xie S, Li B, Keung GY, Zhang X (2007) Coolstreaming: design, theory, and practice. IEEE Transactions on Multimedia 9(8):1661\u20131671","journal-title":"IEEE Transactions on Multimedia"},{"key":"10709_CR62","doi-asserted-by":"crossref","unstructured":"Xing-Wei W, Qu DP, Huang M (2012) Selfish nodes detection mechanism and stimulation mechanism over mobile peer-to-peer networks. In: 2012 7th IEEE conference on industrial electronics and applications (ICIEA). IEEE, pp 1030\u20131034","DOI":"10.1109\/ICIEA.2012.6360874"},{"key":"10709_CR63","doi-asserted-by":"crossref","unstructured":"Yang B, Garcia-Molina H (2003) Ppay: micropayments for peer-to-peer systems. In: Proceedings of the 10th ACM conference on Computer and communications security. ACM, pp 300\u2013310","DOI":"10.1145\/948109.948150"},{"issue":"17","key":"10709_CR64","doi-asserted-by":"publisher","first-page":"10201","DOI":"10.1007\/s11042-015-3079-2","volume":"75","author":"Q Yang","year":"2016","unstructured":"Yang Q, Peng F, Li JT, Long M (2016) Image tamper detection based on noise estimation and lacunarity texture. Multimedia Tools and Applications 75 (17):10201\u201310211","journal-title":"Multimedia Tools and Applications"},{"issue":"12","key":"10709_CR65","doi-asserted-by":"publisher","first-page":"7003","DOI":"10.1007\/s11227-018-2596-y","volume":"74","author":"J Yao","year":"2018","unstructured":"Yao J, Zhang K, Dai Y, Wang J (2018) Power function-based signal recovery transition optimization model of emergency traffic. The Journal of Supercomputing 74(12):7003\u20137023","journal-title":"The Journal of Supercomputing"},{"key":"10709_CR66","unstructured":"Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. In: 2004 IEEE first symposium on multi-agent security and survivability. IEEE, pp 1\u201310"},{"issue":"8","key":"10709_CR67","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMM.2019.2957953","volume":"14","author":"J Zhang","year":"2019","unstructured":"Zhang J, Zhang Y, Shen M (2019) A distance-driven alliance for a p2p live video system. IEEE Transactions on Multimedia 14(8):1\u201310","journal-title":"IEEE Transactions on Multimedia"},{"key":"10709_CR68","doi-asserted-by":"crossref","unstructured":"Zhang K, Antonopoulos N, Mahmood Z (2009) A review of incentive mechanism in peer-to-peer systems. In: First international conference on advances in p2p systems, 2009. AP2PS\u201909. IEEE, pp 45\u201350","DOI":"10.1109\/AP2PS.2009.15"},{"key":"10709_CR69","doi-asserted-by":"crossref","unstructured":"Zhang X, Liu J, Li B, Yum YS (2005) Coolstreaming\/donet: a data-driven overlay network for peer-to-peer live media streaming. In: Proceedings IEEE 24th annual joint conference of the ieee computer and communications societies, vol 3. IEEE, pp 2102\u20132111","DOI":"10.1109\/INFCOM.2005.1498486"},{"key":"10709_CR70","doi-asserted-by":"crossref","unstructured":"Zhang Z, Li Y, Wang C, Wang M, Tu Y, Wang J (2018) An ensemble learning method for wireless multimedia device identification. Security and Communication Networks 2018","DOI":"10.1155\/2018\/5264526"},{"issue":"4","key":"10709_CR71","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/TPDS.2007.1021","volume":"18","author":"R Zhou","year":"2007","unstructured":"Zhou R, Hwang K (2007) Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems 18(4):460\u2013473","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10709-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10709-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10709-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T17:09:47Z","timestamp":1621616987000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10709-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,25]]},"references-count":71,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10709"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10709-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,25]]},"assertion":[{"value":"17 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}