{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:37:28Z","timestamp":1756463848018,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T00:00:00Z","timestamp":1609718400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T00:00:00Z","timestamp":1609718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11227-020-03582-7","type":"journal-article","created":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T11:03:20Z","timestamp":1609758200000},"page":"7253-7269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["SS-ITS: secure scalable intelligent transportation systems"],"prefix":"10.1007","volume":"77","author":[{"given":"Asma","family":"Belhadi","sequence":"first","affiliation":[]},{"given":"Youcef","family":"Djenouri","sequence":"additional","affiliation":[]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8768-9709","authenticated-orcid":false,"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,4]]},"reference":[{"key":"3582_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03477-7","author":"ZH Ali","year":"2020","unstructured":"Ali ZH, Ali HA (2020) Towards sustainable smart iot applications architectural elements and design: opportunities, challenges, and open directions. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-020-03477-7","journal-title":"J Supercomput"},{"key":"3582_CR2","doi-asserted-by":"publisher","first-page":"49830","DOI":"10.1109\/ACCESS.2019.2909114","volume":"7","author":"NO Alsrehin","year":"2019","unstructured":"Alsrehin NO, Klaib AF, Magableh A (2019) Intelligent rransportation and control systems using data mining and machine learning techniques: a comprehensive study. IEEE Access 7:49830\u201349857","journal-title":"IEEE Access"},{"issue":"4","key":"3582_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3161602","volume":"51","author":"G Atluri","year":"2018","unstructured":"Atluri G, Karpatne A, Kumar V (2018) Spatio-temporal data mining: a survey of problems and methods. ACM Comput Surveys 51(4):1\u201341","journal-title":"ACM Comput Surveys"},{"key":"3582_CR4","doi-asserted-by":"crossref","unstructured":"Belhadi A, Djenouri Y, Lin JCW (2019)Comparative study on trajectory outlier detection algorithms. In: IEEEE international conference on data mining workshops, pp. 415\u2013423","DOI":"10.1109\/ICDMW.2019.00067"},{"key":"3582_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7245-1_5","volume-title":"Intelligent computing and information and communication. Advances in intelligent systems and computing","author":"K Bhowmick","year":"2018","unstructured":"Bhowmick K, Narvekar M (2018) Trajectory outlier detection for traffic events: a survey. In: Bhalla S, Bhateja V, Chandavale A, Hiwale A, Satapathy S (eds) Intelligent computing and information and communication. Advances in intelligent systems and computing, vol 673. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-10-7245-1_5"},{"key":"3582_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"MM Breunig","year":"2000","unstructured":"Breunig MM, Kriegel HP, Ng RT, Sander J (2000) Lof: identifying density-based local outliers. ACM SIGMOD Record 29:93\u2013104","journal-title":"ACM SIGMOD Record"},{"key":"3582_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3002712","author":"H Chai","year":"2020","unstructured":"Chai H, Leng S, Chen Y, Zhang K (2020) A hierarchical blockchain-enabled federated learning algorithm for knowledge sharing in internet of vehicles. IEEE Trans Intell Transp Syst. https:\/\/doi.org\/10.1109\/TITS.2020.3002712","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"5","key":"3582_CR8","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1109\/TKDE.2010.235","volume":"24","author":"V Chandola","year":"2010","unstructured":"Chandola V, Banerjee A, Kumar V (2010) Anomaly detection for discrete sequences: A survey. IEEE Trans Knowl Data Eng 24(5):823\u2013839","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"3582_CR9","doi-asserted-by":"publisher","first-page":"102370","DOI":"10.1016\/j.ipm.2020.102370","volume":"57","author":"Q Chen","year":"2020","unstructured":"Chen Q, Srivastava G, Parizi RM, Aloqaily M, Al Ridhawi I (2020) An incentive-aware blockchain-based solution for internet of fake media things. Inf Process Manag 57:102370","journal-title":"Inf Process Manag"},{"issue":"3","key":"3582_CR10","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MNET.2019.1800376","volume":"33","author":"Y Dai","year":"2019","unstructured":"Dai Y, Xu D, Maharjan S, Chen Z, He Q, Zhang Y (2019) Blockchain and deep reinforcement learning empowered intelligent 5g beyond. IEEE Netw 33(3):10\u201317","journal-title":"IEEE Netw"},{"issue":"4","key":"3582_CR11","doi-asserted-by":"publisher","first-page":"4312","DOI":"10.1109\/TVT.2020.2973705","volume":"69","author":"Y Dai","year":"2020","unstructured":"Dai Y, Xu D, Zhang K, Maharjan S, Zhang Y (2020) Deep reinforcement learning and permissioned blockchain for content caching in vehicular edge computing and networks. IEEE Trans Veh Technol 69(4):4312\u20134324","journal-title":"IEEE Trans Veh Technol"},{"key":"3582_CR12","doi-asserted-by":"crossref","unstructured":"Djenouri Youcef AZ, Chiarandini M (2018)Outlier detection in urban traffic flow distributions. In: IEEE international conference on data mining, pp. 935\u2013940","DOI":"10.1109\/ICDM.2018.00114"},{"key":"3582_CR13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.ins.2018.05.031","volume":"459","author":"Y Djenouri","year":"2018","unstructured":"Djenouri Y, Belhadi A, Fournier-Viger P, Fujita H (2018) Mining diversified association rules in big datasets: A cluster\/GPU\/genetic approach. Inf Sci 459:117\u2013134","journal-title":"Inf Sci"},{"key":"3582_CR14","doi-asserted-by":"publisher","first-page":"12192","DOI":"10.1109\/ACCESS.2019.2893124","volume":"7","author":"Y Djenouri","year":"2019","unstructured":"Djenouri Y, Belhadi A, Lin JCW, Djenouri D, Cano A (2019) A survey on urban traffic anomalies detection algorithms. IEEE Access 7:12192\u201312205","journal-title":"IEEE Access"},{"issue":"9","key":"3582_CR15","doi-asserted-by":"publisher","first-page":"e3836","DOI":"10.1002\/cpe.3836","volume":"29","author":"Y Djenouri","year":"2017","unstructured":"Djenouri Y, Bendjoudi A, Habbas Z, Mehdi M, Djenouri D (2017) Reducing thread divergence in gpu-based bees swarm optimization applied to association rule mining. Concurr Comput Pract Exp 29(9):e3836","journal-title":"Concurr Comput Pract Exp"},{"issue":"4","key":"3582_CR16","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1007\/s11227-014-1366-8","volume":"71","author":"Y Djenouri","year":"2015","unstructured":"Djenouri Y, Bendjoudi A, Mehdi M, Nouali-Taboudjemat N, Habbas Z (2015) Gpu-based bees swarm optimization for association rules mining. J Supercomput 71(4):1318\u20131344","journal-title":"J Supercomput"},{"key":"3582_CR17","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.ins.2018.07.020","volume":"496","author":"Y Djenouri","year":"2018","unstructured":"Djenouri Y, Djenouri D, Belhadi A, Cano A (2018) Exploiting GPU and cluster parallelism in single scan frequent itemset mining. Inf Sci 496:363\u2013377","journal-title":"Inf Sci"},{"key":"3582_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3001493","author":"Y Djenouri","year":"2020","unstructured":"Djenouri Y, Srivastava G, Jerry Lin  C-W (2020) Fast and accurate convolution neural network for detecting manufacturing datas. IEEE Trans Ind Inf. https:\/\/doi.org\/10.1109\/TII.2020.3001493","journal-title":"IEEE Trans Ind Inf"},{"key":"3582_CR19","doi-asserted-by":"crossref","unstructured":"Djenouri Y, Zimek A (2018) Outlier detection in urban traffic data. In: International Conference on Web Intelligence, Mining and Semantics, p.\u00a03","DOI":"10.1109\/ICDM.2018.00114"},{"key":"3582_CR20","doi-asserted-by":"crossref","unstructured":"Doshi K, Yilmaz Y (2020) Fast unsupervised anomaly detection in traffic videos. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp. 624\u2013625","DOI":"10.1109\/CVPRW50498.2020.00320"},{"key":"3582_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03496-4","author":"S Feizollahibarough","year":"2020","unstructured":"Feizollahibarough S, Ashtiani M (2020) A security-aware virtual machine placement in the cloud using hesitant fuzzy decision-making processes. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-020-03496-4","journal-title":"J Supercomput"},{"key":"3582_CR22","doi-asserted-by":"publisher","first-page":"2056","DOI":"10.1109\/ACCESS.2016.2553681","volume":"4","author":"Z Feng","year":"2016","unstructured":"Feng Z, Zhu Y (2016) A survey on trajectory data mining: Techniques and applications. IEEE Access 4:2056\u20132067","journal-title":"IEEE Access"},{"key":"3582_CR23","doi-asserted-by":"crossref","unstructured":"Feremans L, Vercruyssen V, Cule B, Meert W (2019) Goethals B Pattern-based anomaly detection in mixed-type time series. In: Joint European conference on machine learning and knowledge discovery in databases, pp. 240\u2013256","DOI":"10.1007\/978-3-030-46150-8_15"},{"issue":"9","key":"3582_CR24","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.1109\/TKDE.2013.184","volume":"26","author":"M Gupta","year":"2014","unstructured":"Gupta M, Gao J, Aggarwal CC, Han J (2014) Outlier detection for temporal data: A survey. IEEE Trans Knowl Data Eng 26(9):2250\u20132267","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"3582_CR25","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s11280-017-0487-4","volume":"21","author":"X Kong","year":"2018","unstructured":"Kong X, Song X, Xia F, Guo H, Wang J, Tolba A (2018) Lotad: Long-term traffic anomaly detection based on crowdsourced bus trajectory data. World Wide Web 21(3):825\u2013847","journal-title":"World Wide Web"},{"key":"3582_CR26","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","volume":"107","author":"PJTCXL Li Xiaoqi","year":"2020","unstructured":"Li, X. Jiang, P., Chen, T., Luo, X., Wen, Q. (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841\u2013853","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"3582_CR27","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/JIOT.2017.2720635","volume":"5","author":"W Li","year":"2018","unstructured":"Li W, Song H, Zeng F (2018) Policy-based secure and trustworthy sensing for internet of things in smart cities. IEEE Internet Things J 5(2):716\u2013723","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"3582_CR28","doi-asserted-by":"publisher","first-page":"3516","DOI":"10.1109\/TII.2018.2890203","volume":"15","author":"CH Liu","year":"2018","unstructured":"Liu CH, Lin Q, Wen S (2018) Blockchain-enabled data collection and sharing for industrial iot with deep reinforcement learning. IEEE Trans Ind Inf 15(6):3516\u20133526","journal-title":"IEEE Trans Ind Inf"},{"issue":"6","key":"3582_CR29","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1109\/TII.2019.2897805","volume":"15","author":"M Liu","year":"2019","unstructured":"Liu M, Yu FR, Teng Y, Leung VC, Song M (2019) Performance optimization for blockchain-enabled industrial internet of things (iiot) systems: A deep reinforcement learning approach. IEEE Trans Ind Inf 15(6):3559\u20133570","journal-title":"IEEE Trans Ind Inf"},{"key":"3582_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2905606","author":"Y Liu","year":"2019","unstructured":"Liu Y, Li Z, Zhou C, Jiang Y, Sun J, Wang M, He X (2019) Generative adversarial active learning for unsupervised outlier detection. IEEE Trans Knowl Data Eng. https:\/\/doi.org\/10.1109\/TKDE.2019.2905606","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"3582_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03435-3","author":"A Louati","year":"2020","unstructured":"Louati A, Louati H, Li Z (2020) Deep learning and case-based reasoning for predictive and adaptive traffic emergency management. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-020-03435-3","journal-title":"J Supercomput"},{"issue":"4","key":"3582_CR32","doi-asserted-by":"publisher","first-page":"4298","DOI":"10.1109\/TVT.2020.2973651","volume":"69","author":"Y Lu","year":"2020","unstructured":"Lu Y, Huang X, Zhang K, Maharjan S, Zhang Y (2020) Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans Veh Technol 69(4):4298\u20134311","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"3582_CR33","doi-asserted-by":"publisher","first-page":"5466","DOI":"10.1109\/JIOT.2020.2978516","volume":"7","author":"J Luo","year":"2020","unstructured":"Luo J, Chen Q, Richard Yu F, Tang L (2020) Blockchain-enabled software-defined industrial internet of things with deep reinforcement learning. IEEE Internet Things J 7(6):5466\u20135480","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"3582_CR34","doi-asserted-by":"publisher","first-page":"2437","DOI":"10.1007\/s10462-018-9619-1","volume":"52","author":"F Meng","year":"2019","unstructured":"Meng F, Yuan G, Lv S, Wang Z, Xia S (2019) An overview on trajectory outlier detection. Artif Intell Rev 52(4):2437\u20132456","journal-title":"Artif Intell Rev"},{"key":"3582_CR35","doi-asserted-by":"crossref","unstructured":"Na GS, Kim D, Yu H (2018)Dilof: Effective and memory efficient local outlier detection in data streams. In: ACM International conference on knowledge discovery & data mining, pp. 1993\u20132002","DOI":"10.1145\/3219819.3220022"},{"key":"3582_CR36","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.future.2017.11.021","volume":"82","author":"N Nesa","year":"2018","unstructured":"Nesa N, Ghosh T, Banerjee I (2018) Non-parametric sequence-based learning approach for outlier detection in iot. Future Gener Comput Syst 82:412\u2013421","journal-title":"Future Gener Comput Syst"},{"key":"3582_CR37","doi-asserted-by":"crossref","unstructured":"Po\u0142ap D, Srivastava G, Jolfaei A, Parizi RM (2020)Blockchain technology and neural networks for the internet of medical things. In: IEEE conference on computer communications workshops, pp. 508\u2013513","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162735"},{"issue":"3","key":"3582_CR38","doi-asserted-by":"publisher","first-page":"4627","DOI":"10.1109\/JIOT.2018.2871394","volume":"6","author":"C Qiu","year":"2018","unstructured":"Qiu C, Yu FR, Yao H, Jiang C, Xu F, Zhao C (2018) Blockchain-based software-defined industrial internet of things: A dueling deep q-learning approach. IEEE Internet Things J 6(3):4627\u20134639","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"3582_CR39","doi-asserted-by":"publisher","first-page":"5171","DOI":"10.1109\/JIOT.2020.2977383","volume":"7","author":"Y Qu","year":"2020","unstructured":"Qu Y, Gao L, Luan TH, Xiang Y, Yu S, Li B, Zheng G (2020) Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Internet Things J 7(6):5171\u20135183. https:\/\/doi.org\/10.1109\/JIOT.2020.2977383","journal-title":"IEEE Internet Things J"},{"key":"3582_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09762-z","author":"MG Raman","year":"2019","unstructured":"Raman MG, Somu, N, Jagarapu S, Manghnani T, Selvam T, Krithivasan K, Sriram VS (2019) An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif Intell Rev. https:\/\/doi.org\/10.1007\/s10462-019-09762-z","journal-title":"Artif Intell Rev"},{"issue":"5","key":"3582_CR41","doi-asserted-by":"publisher","first-page":"2105","DOI":"10.1109\/TAES.2018.2807558","volume":"54","author":"V Roberge","year":"2018","unstructured":"Roberge V, Tarbouchi M, Labont\u00e9 G (2018) Fast genetic algorithm path planner for fixed-wing military UAV Using GPU. IEEE Trans Aerosp Electron Syst 54(5):2105\u20132117","journal-title":"IEEE Trans Aerosp Electron Syst"},{"issue":"1","key":"3582_CR42","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/s10618-012-0300-z","volume":"28","author":"E Schubert","year":"2014","unstructured":"Schubert E, Zimek A, Kriegel HP (2014) Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection. Data Min Knowl Discov 28(1):190\u2013237","journal-title":"Data Min Knowl Discov"},{"key":"3582_CR43","doi-asserted-by":"publisher","first-page":"106181","DOI":"10.1016\/j.asoc.2020.106181","volume":"90","author":"OB Sezer","year":"2020","unstructured":"Sezer OB, Gudelek MU, Ozbayoglu AM (2020) Financial time series forecasting with deep learning: A systematic literature review: 2005\u20132019. Appl Soft Comput 90:106181","journal-title":"Appl Soft Comput"},{"issue":"1","key":"3582_CR44","first-page":"307","volume":"9","author":"K Singh","year":"2012","unstructured":"Singh K, Upadhyaya S (2012) Outlier detection: applications and techniques. Int J Comput Sci Issues 9(1):307","journal-title":"Int J Comput Sci Issues"},{"key":"3582_CR45","doi-asserted-by":"crossref","unstructured":"Vercruyssen V, Meert W, Davis J (2020) Transfer learning for anomaly detection through localized and unsupervised instance selection. In: AAAI conference on artificial intelligence, pp. 6054\u20136061","DOI":"10.1609\/aaai.v34i04.6068"},{"key":"3582_CR46","doi-asserted-by":"publisher","first-page":"14322","DOI":"10.1109\/ACCESS.2020.2966553","volume":"8","author":"F Wang","year":"2020","unstructured":"Wang F, Li M, Mei Y, Li W (2020) Time series data mining: A case study with big data analytics approach. IEEE Access 8:14322\u201314328","journal-title":"IEEE Access"},{"key":"3582_CR47","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2952332","author":"J Weng","year":"2019","unstructured":"Weng J, Weng J, Zhang J, Li M, Zhang Y, Luo W (2019) Deepchain: auditable and privacy-preserving deep learning with blockchain-based incentive.  IEEE Trans Depend Sec Comput. https:\/\/doi.org\/10.1109\/TDSC.2019.2952332","journal-title":"IEEE Trans Depend Sec Comput"},{"key":"3582_CR48","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/COMST.2020.2969706","volume":"22","author":"NZWL XiaoYang","year":"2020","unstructured":"Xiao, Y., Zhang, N., Lou, W., Hou, Y.T.: (2020) A survey of distributed consensus protocols for blockchain networks. IEEE Commun Surv Tutor 22:1432\u20131465","journal-title":"IEEE Commun Surv Tutor"},{"issue":"6","key":"3582_CR49","doi-asserted-by":"publisher","first-page":"2207","DOI":"10.1109\/JIOT.2017.2756025","volume":"4","author":"T Yu","year":"2017","unstructured":"Yu T, Wang X, Shami A (2017) Recursive principal component analysis-based data outlier detection and sensor data aggregation in iot systems. IEEE Internet Things J 4(6):2207\u20132216","journal-title":"IEEE Internet Things J"},{"key":"3582_CR50","unstructured":"Yu Z, Yoon JS, Venkatesh P, Park J, Yu J, Park HS (2018)Humbi 1.0: Human multiview behavioral imaging dataset. arXiv preprint arXiv:1812.00281"},{"key":"3582_CR51","doi-asserted-by":"crossref","unstructured":"Zhang C, Song D, Chen Y, Feng X, Lumezanu C, Cheng W, Ni J, Zong B, Chen H, Chawla NV (2019) A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. In: The International Conference on Artificial Intelligence vol. 33, pp. 1409\u20131416","DOI":"10.1609\/aaai.v33i01.33011409"},{"issue":"5","key":"3582_CR52","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSMCC.2008.923876","volume":"38","author":"J Zhang","year":"2008","unstructured":"Zhang J, Zulkernine M, Haque A (2008) Random-forests-based network intrusion detection systems. IEEE Trans Syst Man Cybern Part C (Applications and Reviews) 38(5):649\u2013659","journal-title":"IEEE Trans Syst Man Cybern Part C (Applications and Reviews)"},{"issue":"3","key":"3582_CR53","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/2743025","volume":"6","author":"Y Zheng","year":"2015","unstructured":"Zheng Y (2015) Trajectory data mining: an overview. ACM Trans Intell Syst Technol 6(3):29","journal-title":"ACM Trans Intell Syst Technol"},{"issue":"3","key":"3582_CR54","first-page":"38","volume":"5","author":"Y Zheng","year":"2014","unstructured":"Zheng Y, Capra L, Wolfson O, Yang H (2014) Urban computing: concepts, methodologies, and applications. ACM Trans Intell Syst Technol 5(3):38","journal-title":"ACM Trans Intell Syst Technol"},{"issue":"1","key":"3582_CR55","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/TPWRS.2017.2756339","volume":"33","author":"G Zhou","year":"2018","unstructured":"Zhou G, Bo R, Chien L, Zhang X, Yang S, Su D (2018) GPU-accelerated algorithm for online probabilistic power flow. IEEE Trans Power Syst 33(1):1132\u20131135","journal-title":"IEEE Trans Power Syst"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03582-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-020-03582-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03582-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T10:29:28Z","timestamp":1624271368000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-020-03582-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,4]]},"references-count":55,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["3582"],"URL":"https:\/\/doi.org\/10.1007\/s11227-020-03582-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2021,1,4]]},"assertion":[{"value":"15 December 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}