{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T09:57:48Z","timestamp":1773568668876,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2019,7,20]],"date-time":"2019-07-20T00:00:00Z","timestamp":1563580800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,20]],"date-time":"2019-07-20T00:00:00Z","timestamp":1563580800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571104"],"award-info":[{"award-number":["61571104"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s11227-019-02954-y","type":"journal-article","created":{"date-parts":[[2019,7,20]],"date-time":"2019-07-20T10:02:40Z","timestamp":1563616960000},"page":"7460-7478","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":68,"title":["Adaboost-based security level classification of mobile intelligent terminals"],"prefix":"10.1007","volume":"75","author":[{"given":"Feng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Dingde","family":"Jiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2631-9223","authenticated-orcid":false,"given":"Hong","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,20]]},"reference":[{"issue":"9","key":"2954_CR1","doi-asserted-by":"publisher","first-page":"4242","DOI":"10.1007\/s11227-016-1845-1","volume":"74","author":"J Kim","year":"2016","unstructured":"Kim J, Jeon Y, Kim H (2016) The intelligent IoT common service platform architecture and service implementation. J Supercomput 74(9):4242\u20134260","journal-title":"J Supercomput"},{"issue":"2","key":"2954_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCOM.2018.8291108","volume":"56","author":"DE Boubiche","year":"2018","unstructured":"Boubiche DE (2018) Advanced industrial wireless sensor networks and intelligent IoT. IEEE Commun Mag 56(2):14\u201315","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"2954_CR3","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2017.1600349CM","volume":"55","author":"W Dai","year":"2017","unstructured":"Dai W, Qiu M, Qiu L et al (2017) Who moved my data? Privacy protection in smartphones. IEEE Commun Mag 55(1):20\u201325","journal-title":"IEEE Commun Mag"},{"issue":"7","key":"2954_CR4","first-page":"1","volume":"2017","author":"YK Lee","year":"2017","unstructured":"Lee YK, Kim JN, Lim KS et al (2017) Secure mobile device structure for trust IoT. J Supercomput 2017(7):1\u201319","journal-title":"J Supercomput"},{"issue":"2","key":"2954_CR5","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MPRV.2017.26","volume":"16","author":"N Islam","year":"2017","unstructured":"Islam N, Das S, Chen Y (2017) On-device mobile phone security exploits machine learning. IEEE Pervasive Comput 16(2):92\u201396","journal-title":"IEEE Pervasive Comput"},{"key":"2954_CR6","doi-asserted-by":"crossref","unstructured":"Kraijak S, Tuwanut P (2015) A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. In: Proceedings of the WiCOM\u201915, pp 1\u20136","DOI":"10.1049\/cp.2015.0714"},{"issue":"5","key":"2954_CR7","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi W, Cao J, Zhang Q et al (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637\u2013646","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"2954_CR8","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MCOM.2017.1600249CM","volume":"55","author":"T Taleb","year":"2017","unstructured":"Taleb T, Dutta S, Ksentini A et al (2017) Mobile edge computing potential in making cities smarter. IEEE Commun Mag 55(3):38\u201343","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"2954_CR9","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/TCAD.2017.2750067","volume":"37","author":"J Wang","year":"2018","unstructured":"Wang J, Hong Z, Zhang Y et al (2018) Enabling security-enhanced attestation with intel SGX for remote terminal and IoT. IEEE Trans Comput Aided Des Integr Circuits Syst 37(1):88\u201396","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"issue":"1","key":"2954_CR10","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/MCOM.2017.1700342","volume":"56","author":"C Galdi","year":"2018","unstructured":"Galdi C, Nappi M, Dugelay J et al (2018) Exploring new authentication protocols for sensitive data protection on smartphones. IEEE Commun Mag 56(1):136\u2013142","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"2954_CR11","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s11235-016-0168-0","volume":"64","author":"KC Park","year":"2017","unstructured":"Park KC, Shin DH (2017) Security assessment framework for IoT service. Telecommun Syst 64(1):193\u2013209","journal-title":"Telecommun Syst"},{"issue":"1","key":"2954_CR12","first-page":"87","volume":"21","author":"L Lee","year":"2016","unstructured":"Lee L, Chen C (2016) The power of Smartphones. Multimed Syst 21(1):87\u2013101","journal-title":"Multimed Syst"},{"issue":"4","key":"2954_CR13","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1007\/s10489-015-0689-3","volume":"43","author":"G Wang","year":"2015","unstructured":"Wang G, Song Q, Zhu X (2015) An improved data characterization method and its application in classification algorithm recommendation. Appl Intell 43(4):892\u2013912","journal-title":"Appl Intell"},{"key":"2954_CR14","doi-asserted-by":"crossref","unstructured":"Jia Q, Guo L, Jin Z et al (2016) Privacy-preserving data classification and similarity evaluation for distributed systems. In: Proceedings of the ICDCS\u201916, pp 690\u2013699","DOI":"10.1109\/ICDCS.2016.94"},{"issue":"11","key":"2954_CR15","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.1109\/TLA.2017.8070423","volume":"15","author":"K Cavalcanti","year":"2017","unstructured":"Cavalcanti K, Viana E, Lins F (2017) An integrated solution for the improvement of the mobile devices security based on the android platform. IEEE Lat Am Trans 15(11):2171\u20132176","journal-title":"IEEE Lat Am Trans"},{"key":"2954_CR16","doi-asserted-by":"crossref","unstructured":"Irwan D, Asnar Y, Hendradjaya B (2015) Confidentiality and privacy information security risk assessment for Android-based mobile devices. In: Proceedings of the ICoDSE\u201915, pp 1\u20136","DOI":"10.1109\/ICODSE.2015.7436972"},{"issue":"4","key":"2954_CR17","doi-asserted-by":"publisher","first-page":"2247","DOI":"10.1109\/TITS.2015.2402438","volume":"16","author":"Z Dong","year":"2015","unstructured":"Dong Z, Wu Y, Pei M et al (2015) Vehicle type classification using a semisupervised convolutional neural network. IEEE Trans Intell Transp Syst 16(4):2247\u20132256","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"4","key":"2954_CR18","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.1109\/TFUZZ.2016.2574915","volume":"25","author":"Y Deng","year":"2017","unstructured":"Deng Y, Ren Z, Kong Y et al (2017) A hierarchical fused fuzzy deep neural network for data classification. IEEE Trans Fuzzy Syst 25(4):1006\u20131012","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"6","key":"2954_CR19","doi-asserted-by":"publisher","first-page":"3036","DOI":"10.1109\/TIP.2018.2808767","volume":"27","author":"Y Guo","year":"2018","unstructured":"Guo Y, Jia X, Paull D (2018) Effective sequential classifier training for SVM-based multitemporal remote sensing image classification. IEEE Trans Image Process 27(6):3036\u20133048","journal-title":"IEEE Trans Image Process"},{"key":"2954_CR20","doi-asserted-by":"crossref","unstructured":"Ding X, Jiang T, Zou W (2017) A new method of dynamic gesture recognition using Wi-Fi signals based on Adaboost. In: Proceedings of the ISCIT\u201917, pp 1\u20135","DOI":"10.1109\/ISCIT.2017.8261216"},{"issue":"3","key":"2954_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNSE.2018.2877597","volume":"5","author":"D Jiang","year":"2018","unstructured":"Jiang D, Wang W, Shi L et al (2018) A compressive sensing-based approach to end-to-end network traffic reconstruction. IEEE Trans Netw Sci Eng 5(3):1\u201312","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"1","key":"2954_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNSE.2018.2877597","volume":"1","author":"D Jiang","year":"2018","unstructured":"Jiang D, Huo L, Song H (2018) Rethinking behaviors and activities of base stations in mobile cellular networks based on big data analysis. IEEE Trans Netw Sci Eng 1(1):1\u201312","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"5","key":"2954_CR23","first-page":"1","volume":"13","author":"D Jiang","year":"2018","unstructured":"Jiang D, Huo L, Li Y (2018) Fine-granularity inference and estimations to network traffic for SDN. PLoS ONE 13(5):1\u201323","journal-title":"PLoS ONE"},{"issue":"10","key":"2954_CR24","doi-asserted-by":"publisher","first-page":"3305","DOI":"10.1109\/TITS.2017.2778939","volume":"19","author":"D Jiang","year":"2018","unstructured":"Jiang D, Huo L, Lv Z et al (2018) A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Trans Intell Transp Syst 19(10):3305\u20133319","journal-title":"IEEE Trans Intell Transp Syst"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-019-02954-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-019-02954-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-019-02954-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T23:09:46Z","timestamp":1595113786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-019-02954-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,20]]},"references-count":24,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["2954"],"URL":"https:\/\/doi.org\/10.1007\/s11227-019-02954-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,20]]},"assertion":[{"value":"20 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}