{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:28:35Z","timestamp":1767338915358,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T00:00:00Z","timestamp":1590796800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T00:00:00Z","timestamp":1590796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11227-020-03350-7","type":"journal-article","created":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T16:04:38Z","timestamp":1590854678000},"page":"2018-2032","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A dynamic priority strategy for IoV data scheduling towards key data"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2100-0259","authenticated-orcid":false,"given":"Chenxi","family":"Huang","sequence":"first","affiliation":[]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Guokai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Gaowei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yongqiang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yonghong","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Kaijian","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,30]]},"reference":[{"key":"3350_CR1","first-page":"4200","volume":"66","author":"D Kim","year":"2017","unstructured":"Kim D et al (2017) A new comprehensive RSU installation strategy for cost-efficient vanet deployment. IEEE Trans Veh Technol 66:4200\u20134421","journal-title":"IEEE Trans Veh Technol"},{"key":"3350_CR2","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/MCOM.2017.1600230CM","volume":"55","author":"S Bouk","year":"2017","unstructured":"Bouk S et al (2017) Named-data-networking based ITS for smart cities. IEEE Commun Mag 55:105\u2013111","journal-title":"IEEE Commun Mag"},{"key":"3350_CR3","doi-asserted-by":"publisher","first-page":"3076","DOI":"10.1109\/TIT.2017.2701807","volume":"63","author":"D Tian","year":"2017","unstructured":"Tian D, Zhou J, Sheng Z (2017) An adaptive fusion strategy for distributed information estimation over cooperative multi-agent networks. IEEE Trans Inf Theory 63:3076\u20133091","journal-title":"IEEE Trans Inf Theory"},{"key":"3350_CR4","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TMC.2016.2591525","volume":"16","author":"G Chochlidakis","year":"2017","unstructured":"Chochlidakis G et al (2017) Mobility aware virtual network embedding. IEEE Trans Mobile Comput 16:1343\u20131356","journal-title":"IEEE Trans Mobile Comput"},{"key":"3350_CR5","doi-asserted-by":"publisher","first-page":"5870","DOI":"10.1109\/JIOT.2018.2880332","volume":"6","author":"CA Kerrache","year":"2019","unstructured":"Kerrache CA et al (2019) TACASHI: trust-aware communication architecture for social internet of vehicles. IEEE Internet Things J 6:5870\u20135877","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"3350_CR6","doi-asserted-by":"publisher","first-page":"4157","DOI":"10.1109\/TVT.2018.2890686","volume":"68","author":"H Yang","year":"2019","unstructured":"Yang H et al (2019) intelligent resource management based on reinforcement learning for ultra-reliable and low-latency IoV communication networks. IEEE Trans Veh Technol 68(5):4157\u20134169","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"3350_CR7","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/JIOT.2018.2841969","volume":"6","author":"R Silva","year":"2019","unstructured":"Silva R, Iqbal R (2019) Ethical implications of social internet of vehicles systems. IEEE Internet Things J 6(1):517\u2013531","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"3350_CR8","doi-asserted-by":"publisher","first-page":"3813","DOI":"10.1109\/TVT.2018.2796443","volume":"67","author":"J Wang","year":"2018","unstructured":"Wang J et al (2018) Internet of vehicles: sensing-aided transportation information collection and diffusion. IEEE Trans Veh Technol 67(5):3813\u20133825","journal-title":"IEEE Trans Veh Technol"},{"issue":"10","key":"3350_CR9","doi-asserted-by":"publisher","first-page":"2740","DOI":"10.1109\/TITS.2017.2657649","volume":"18","author":"Y Liu","year":"2017","unstructured":"Liu Y, Wang Y, Chang G (2017) Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm. IEEE Trans Intell Transp Syst 18(10):2740\u20132749","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"3350_CR10","doi-asserted-by":"publisher","first-page":"58182","DOI":"10.1109\/ACCESS.2018.2874592","volume":"6","author":"R Iqbal","year":"2018","unstructured":"Iqbal R et al (2018) Context-aware data-driven intelligent framework for fog infrastructures in internet of vehicles. IEEE Access 6:58182\u201358194","journal-title":"IEEE Access"},{"key":"3350_CR11","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1109\/JSYST.2014.2298837","volume":"10","author":"O Bello","year":"2016","unstructured":"Bello O, Zeadally S (2016) Intelligent device-to-device communication in the internet of things. IEEE Syst J 10:1172\u20131182","journal-title":"IEEE Syst J"},{"key":"3350_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1049\/iet-wss.2018.5211","volume":"9","author":"H El-Sayed","year":"2019","unstructured":"El-Sayed H et al (2019) Trust enforcement in vehicular networks: challenges and opportunities. IET Wirel Sens Syst 9:237\u2013246","journal-title":"IET Wirel Sens Syst"},{"key":"3350_CR13","doi-asserted-by":"crossref","unstructured":"Wan S et al. (2019) Efficient computation offloading for internet of vehicles in edge computing-assisted 5G networks. J Supercomput 1\u201330","DOI":"10.1007\/s11227-019-03011-4"},{"key":"3350_CR14","doi-asserted-by":"publisher","first-page":"3845","DOI":"10.1109\/TVT.2016.2567062","volume":"65","author":"D Tian","year":"2016","unstructured":"Tian D et al (2016) Robust energy-efficient MIMO transmission for cognitive vehicular networks. IEEE Trans Veh Technol 65:3845\u20133859","journal-title":"IEEE Trans Veh Technol"},{"key":"3350_CR15","doi-asserted-by":"publisher","first-page":"8591","DOI":"10.1109\/TVT.2015.2506599","volume":"65","author":"Y Wang","year":"2016","unstructured":"Wang Y et al (2016) Delivery delay analysis for roadside unit deployment in vehicular ad hoc networks with intermittent connectivity. IEEE Trans Veh Technol 65:8591\u20138602","journal-title":"IEEE Trans Veh Technol"},{"key":"3350_CR16","doi-asserted-by":"publisher","first-page":"4542","DOI":"10.1007\/s11227-018-2305-x","volume":"74","author":"F Aadil","year":"2018","unstructured":"Aadil F et al (2018) Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO). J Supercomput 74:4542\u20134567","journal-title":"J Supercomput"},{"key":"3350_CR17","doi-asserted-by":"publisher","first-page":"160889","DOI":"10.1109\/ACCESS.2019.2945610","volume":"7","author":"W Yao","year":"2019","unstructured":"Yao W et al (2019) A secured and efficient communication scheme for decentralized cognitive radio-based internet of vehicles. IEEE Access 7:160889\u2013160900","journal-title":"IEEE Access"},{"issue":"12","key":"3350_CR18","doi-asserted-by":"publisher","first-page":"11588","DOI":"10.1109\/TVT.2018.2890405","volume":"68","author":"F Kou","year":"2019","unstructured":"Kou F et al (2019) Common semantic representation method based on object attention and adversarial learning for cross-modal data in IoV. IEEE Trans Veh Technol 68(12):11588\u201311598","journal-title":"IEEE Trans Veh Technol"},{"key":"3350_CR19","doi-asserted-by":"publisher","first-page":"3087","DOI":"10.1109\/TMC.2015.2506583","volume":"15","author":"J Kibilda","year":"2016","unstructured":"Kibilda J et al (2016) Modelling multi-operator base station deployment patterns in cellular networks. IEEE Trans Mob Comput 15:3087\u20133099","journal-title":"IEEE Trans Mob Comput"},{"key":"3350_CR20","doi-asserted-by":"crossref","unstructured":"Jo Y, Jeong JRPA (2016) Road-side units placement algorithm for multihop data delivery in vehicular networks. In: Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, Crans-Montana, Switzerland, pp 262\u2013266","DOI":"10.1109\/WAINA.2016.91"},{"key":"3350_CR21","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.pmcj.2015.10.012","volume":"27","author":"J Wang","year":"2016","unstructured":"Wang J, Liao J et al (2016) Game-theoretic model of asymmetrical multipath selection in pervasive computing environment. Pervasive Mob Comput 27:37\u201357","journal-title":"Pervasive Mob Comput"},{"key":"3350_CR22","doi-asserted-by":"crossref","unstructured":"Cumbal R et al. (2016) Optimum deployment of RSU for efficient communications multi-hop from vehicle to infrastructure on VANET. In: Proceedings of the IEEE Colombian Conference on Communications and Computing, Cartagena, Colombia, pp 1\u20136","DOI":"10.1109\/ColComCon.2016.7516394"},{"key":"3350_CR23","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MNET.2016.7474343","volume":"30","author":"H Zhang","year":"2016","unstructured":"Zhang H et al (2016) Smart identifier network: a collaborative architecture for the future internet. IEEE Netw 30:46\u201351","journal-title":"IEEE Netw"},{"key":"3350_CR24","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/TVT.2014.2329481","volume":"64","author":"T Luan","year":"2015","unstructured":"Luan T et al (2015) Feelbored? Joinverse! Engineering vehicular proximity social networks. IEEE Trans Veh Technol 64:1120\u20131131","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"3350_CR25","first-page":"2667","volume":"16","author":"C Wang","year":"2019","unstructured":"Wang C et al (2019) SaliencyGAN: deep learning semi-supervised salient object detection in the fog of IoT. IEEE Trans Ind Inf 16(6):2667\u20132676","journal-title":"IEEE Trans Ind Inf"},{"key":"3350_CR26","doi-asserted-by":"publisher","first-page":"1664","DOI":"10.1109\/TVT.2014.2335201","volume":"64","author":"M Wang","year":"2015","unstructured":"Wang M et al (2015) Real-time path planning based on hybrid-VANET enhanced transportation system. IEEE Trans Veh Technol 64:1664\u20131678","journal-title":"IEEE Trans Veh Technol"},{"key":"3350_CR27","doi-asserted-by":"publisher","first-page":"4187","DOI":"10.1109\/TVT.2014.2363791","volume":"64","author":"M Wang","year":"2015","unstructured":"Wang M et al (2015) Asymptotic throughput capacity analysis of VANETs exploiting mobility diversity. IEEE Trans Veh Technol 64:4187\u20134202","journal-title":"IEEE Trans Veh Technol"},{"key":"3350_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2019.2940713","volume":"7","author":"H Jianwei","year":"2020","unstructured":"Jianwei H et al (2020) A survey on digital forensics in internet of things. IEE Internet Things J 7:1\u201315","journal-title":"IEE Internet Things J"},{"key":"3350_CR29","unstructured":"Zhao P et al. (2019) A survey of local differential privacy for securing internet of vehicles. J Supercomput 1\u20132"},{"key":"3350_CR30","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1109\/TCSS.2019.2927431","volume":"6","author":"L Shancang","year":"2019","unstructured":"Shancang L et al (2019) Blockchain-based digital forensics investigation framework in the internet of things and social systems. IEEE Trans Comput Soc Syst 6:1433\u20131441","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"3350_CR31","doi-asserted-by":"publisher","first-page":"2007","DOI":"10.1007\/s11227-018-2618-9","volume":"75","author":"MS Chen","year":"2019","unstructured":"Chen MS et al (2019) Driving behaviors analysis based on feature selection and statistical approach: a preliminary study. J Supercomput 75:2007\u20132026","journal-title":"J Supercomput"},{"key":"3350_CR32","doi-asserted-by":"publisher","first-page":"71447","DOI":"10.1109\/ACCESS.2019.2919800","volume":"7","author":"Z Huibing","year":"2019","unstructured":"Huibing Z et al (2019) An efficient IoV trajectory compression method in vehicle terminals using width-direction-angle. IEEE Access 7:71447\u201371458","journal-title":"IEEE Access"},{"key":"3350_CR33","doi-asserted-by":"crossref","unstructured":"Liuand J, Kato N (2015) Device-to-device communication overlaying two-hop multi-channel uplink cellular networks. In: Proceedings of ACM MobiHoc, pp 307\u2013316","DOI":"10.1145\/2746285.2746311"},{"key":"3350_CR34","doi-asserted-by":"crossref","unstructured":"Liu J, Zhang S, Nishiyama H, Kato N, Guo J (2015) A stochastic geometry analysis of D2D overlaying multi-channel downlink cellular networks. In: Proceedings of IEEE INFOCOM, pp 46\u201354","DOI":"10.1109\/INFOCOM.2015.7218366"},{"key":"3350_CR35","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/JSYST.2014.2335451","volume":"9","author":"N Kumar","year":"2015","unstructured":"Kumar N et al (2015) Collaborative learning automata-based routing for rescue operations in dense urban regions using vehicular sensor networks. IEEE Syst J 9:1081\u20131090","journal-title":"IEEE Syst J"},{"key":"3350_CR36","doi-asserted-by":"publisher","first-page":"3033","DOI":"10.1109\/TITS.2015.2422144","volume":"16","author":"D Tian","year":"2015","unstructured":"Tian D et al (2015) A dynamic and self-adaptive network selection method for multi-mode communications in heterogeneous vehicular telematics. IEEE Trans Intell Transp Syst 16:3033\u20133049","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"3350_CR37","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.jth.2017.01.009","volume":"4","author":"D Delen","year":"2017","unstructured":"Delen D et al (2017) Investigating injury severity risk factors in automobile crashes with predictive analytics and sensitivity analysis methods. J Transp Health 4:118\u2013131","journal-title":"J Transp Health"},{"key":"3350_CR38","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-981-10-3503-6_4","volume":"548","author":"A Rasheed","year":"2017","unstructured":"Rasheed A et al (2017) Vehicular ad hoc network (VANET): a survey, challenges, and applications. Adv Intell Syst Comput 548:39\u201351","journal-title":"Adv Intell Syst Comput"},{"key":"3350_CR39","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-981-10-1627-1_7","volume":"397","author":"M Ouyous","year":"2017","unstructured":"Ouyous M et al (2017) Multi-channel coordination based MAC protocols in vehicular ad hoc networks (VANETs): a survey. Lect Notes Electr Eng 397:81\u201394","journal-title":"Lect Notes Electr Eng"},{"key":"3350_CR40","first-page":"386","volume":"36","author":"N Zhaolong","year":"2016","unstructured":"Zhaolong N et al (2016) Integration of scheduling and network coding in multi-rate wireless mesh networks. Optim Models Algorithms. 36:386\u2013397","journal-title":"Optim Models Algorithms."},{"issue":"5","key":"3350_CR41","doi-asserted-by":"publisher","first-page":"8804","DOI":"10.1109\/JIOT.2019.2923611","volume":"6","author":"M Wazid","year":"2019","unstructured":"Wazid M et al (2019) AKM-IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J 6(5):8804\u20138817","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"3350_CR42","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1109\/TCC.2017.2712686","volume":"7","author":"J Li","year":"2019","unstructured":"Li J et al (2019) When I\/O interrupt becomes system bottleneck: efficiency and scalability enhancement for SR-IOV network virtualization. EEE Trans Cloud Comput 7(4):1183\u20131196","journal-title":"EEE Trans Cloud Comput"},{"key":"3350_CR43","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/j.isatra.2017.08.017","volume":"71","author":"S Wen","year":"2017","unstructured":"Wen S, Guo Ge (2017) Static-dynamic hybrid communication scheduling and control co-design for network control systems. ISA Trans 71:553\u2013562","journal-title":"ISA Trans"},{"key":"3350_CR44","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.cor.2017.08.012","volume":"89","author":"A Malik","year":"2018","unstructured":"Malik A et al (2018) Satisfiability modulo theory (SMT) formulation for optimal scheduling of task graphs with communication delay. Comput Oper Res 89:113\u2013126","journal-title":"Comput Oper Res"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03350-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-020-03350-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03350-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T18:44:52Z","timestamp":1696185892000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-020-03350-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,30]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["3350"],"URL":"https:\/\/doi.org\/10.1007\/s11227-020-03350-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2020,5,30]]},"assertion":[{"value":"30 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}