{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:52Z","timestamp":1740123592769,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T00:00:00Z","timestamp":1649635200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T00:00:00Z","timestamp":1649635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s11227-022-04423-5","type":"journal-article","created":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T10:07:08Z","timestamp":1649671628000},"page":"15014-15041","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A novel social deep autoencoder NMF incentive scheme to detect a selfish node in delay tolerant network"],"prefix":"10.1007","volume":"78","author":[{"given":"Rakhi","family":"Sharma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9533-2304","authenticated-orcid":false,"given":"Shail Kumar","family":"Dinkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,11]]},"reference":[{"key":"4423_CR1","doi-asserted-by":"crossref","unstructured":"Fall K (2003) A delay-tolerant network architecture for challenged internets. In\u00a0Proceedings of the 2003 Con ference on Applications, Technologies, Architectures, and Protocols for Computer Communications\u00a0(pp. 27\u201334)","DOI":"10.1145\/863955.863960"},{"key":"4423_CR2","doi-asserted-by":"publisher","first-page":"65560","DOI":"10.1109\/ACCESS.2019.2916685","volume":"7","author":"R Wang","year":"2019","unstructured":"Wang R, Wang Z, Ma W, Deng S, Huang H (2019) Epidemic routing performance in dtn with selfish nodes. IEEE Access 7:65560\u201365568","journal-title":"IEEE Access"},{"key":"4423_CR3","doi-asserted-by":"crossref","unstructured":"Jain S, Verma A (2019) Bubble rap incentive scheme for prevention of node selfishness in delay-tolerant networks. In\u00a0Smart innovations in communication and computational sciences\u00a0(pp. 289\u2013303). Springer, Singapore","DOI":"10.1007\/978-981-10-8968-8_25"},{"issue":"4","key":"4423_CR4","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1007\/s12083-018-0667-8","volume":"12","author":"C Chakrabarti","year":"2019","unstructured":"Chakrabarti C, Roy S, Basu S (2019) Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN. Peer-to-Peer Network Appl 12(4):705\u2013723","journal-title":"Peer-to-Peer Network Appl"},{"key":"4423_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/6359806","volume":"2019","author":"A Socievole","year":"2019","unstructured":"Socievole A, Caputo A, de Rango F, Fazio P (2019) Routing in mobile opportunistic social networks with selfish nodes. Wireless Commun Mobile Comput 2019:1\u201315","journal-title":"Wireless Commun Mobile Comput"},{"issue":"10","key":"4423_CR6","doi-asserted-by":"publisher","first-page":"3000","DOI":"10.3390\/s20103000","volume":"20","author":"GU Rehman","year":"2020","unstructured":"Rehman GU, Ghani A, Muhammad S, Singh M, Singh D (2020) Selfishness in vehicular delay-tolerant networks: a review. Sensors 20(10):3000","journal-title":"Sensors"},{"issue":"4","key":"4423_CR7","doi-asserted-by":"publisher","first-page":"e4235","DOI":"10.1002\/dac.4235","volume":"33","author":"A Roy","year":"2020","unstructured":"Roy A, Acharya T, Bit DS (2020) Social-based reputation-aware data forwarding for improved multicast delivery in the presence of selfish nodes in DTNs. Int J Commun Syst 33(4):e4235","journal-title":"Int J Commun Syst"},{"key":"4423_CR8","doi-asserted-by":"crossref","unstructured":"Jagtap P, Kulkarni L (2019) Social energy-based techniques in delay-tolerant network. In\u00a0Emerging technologies in data mining and information security (pp 531\u2013538). Springer, Singapore","DOI":"10.1007\/978-981-13-1501-5_46"},{"issue":"3","key":"4423_CR9","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1080\/19361610.2019.1621593","volume":"14","author":"PK Gantayat","year":"2019","unstructured":"Gantayat PK, Das S (2019) Award-reward protocol based on clustering and trust level for routing in delay tolerant network. J Appl Secur Res 14(3):270\u2013287","journal-title":"J Appl Secur Res"},{"key":"4423_CR10","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1016\/j.future.2017.10.049","volume":"92","author":"B Jedari","year":"2019","unstructured":"Jedari B, Xia F, Chen H, Das SK, Tolba A, Zafer AM (2019) A social-based watchdog system to detect selfish nodes in opportunistic mobile networks. Futur Gener Comput Syst 92:777\u2013788","journal-title":"Futur Gener Comput Syst"},{"key":"4423_CR11","doi-asserted-by":"publisher","first-page":"29419","DOI":"10.1109\/ACCESS.2018.2834912","volume":"6","author":"H Wang","year":"2018","unstructured":"Wang H, Wang H, Guo F, Feng G, Lv H (2018) ARAG: A routing algorithm based on incentive mechanisms for DTN with nodes\u2019 selfishness. IEEE Access 6:29419\u201329425","journal-title":"IEEE Access"},{"issue":"10","key":"4423_CR12","doi-asserted-by":"publisher","first-page":"299","DOI":"10.3390\/info10100299","volume":"10","author":"M Guo","year":"2019","unstructured":"Guo M, Xiao M (2019) MSSN: An attribute-aware transmission algorithm exploiting node similarity for opportunistic social networks. Information 10(10):299","journal-title":"Information"},{"issue":"6","key":"4423_CR13","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TWC.2010.06.081216","volume":"9","author":"H Dang","year":"2010","unstructured":"Dang H, Wu H (2010) Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Trans Wireless Commun 9(6):1874\u20131881","journal-title":"IEEE Trans Wireless Commun"},{"issue":"9","key":"4423_CR14","doi-asserted-by":"publisher","first-page":"2764","DOI":"10.3390\/s18092764","volume":"18","author":"H Yang","year":"2018","unstructured":"Yang H, Jia Z, Xie G (2018) Delay-bounded and cost-limited RSU deployment in urban vehicular ad hoc networks. Sensors 18(9):2764","journal-title":"Sensors"},{"key":"4423_CR15","doi-asserted-by":"crossref","unstructured":"Zhang Z, Ma M, Jin Z (2013) CCS-DTN: Efficient routing in social DTNs based on clustering and network coding. In\u00a02013 IEEE Global Communications Conference (GLOBECOM)\u00a0(pp. 60\u201364). IEEE","DOI":"10.1109\/GLOCOM.2013.6831048"},{"issue":"12","key":"4423_CR16","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1073\/pnas.122653799","volume":"99","author":"M Girvan","year":"2002","unstructured":"Girvan M, Newman ME (2002) Community structure in social and biological networks. Proc Natl Acad Sci 99(12):7821\u20137826","journal-title":"Proc Natl Acad Sci"},{"issue":"7043","key":"4423_CR17","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1038\/nature03607","volume":"435","author":"G Palla","year":"2005","unstructured":"Palla G, Der\u00e9nyi I, Farkas I, Vicsek T (2005) Uncovering the overlapping community structure of complex networks in nature and society. Nature 435(7043):814\u2013818","journal-title":"Nature"},{"issue":"3","key":"4423_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.15837\/ijccc.2008.3.2390","volume":"3","author":"I Buciu","year":"2008","unstructured":"Buciu I (2008) Nonnegative matrix factorization, a new tool for feature extraction: theory and applications. Int J Comput, Commun Control 3(3):67\u201374","journal-title":"Int J Comput, Commun Control"},{"key":"4423_CR19","unstructured":"Lee DD, Seung HS (2000) Algorithms for nonnegative matrix factorization, in Proc. Int. Conf. Neural Inf. Process. Syst., 2000, (pp. 535\u2013541)"},{"issue":"3\u20135","key":"4423_CR20","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato S (2010) Community detection in graphs. Phys Rep 486(3\u20135):75\u2013174","journal-title":"Phys Rep"},{"issue":"4","key":"4423_CR21","doi-asserted-by":"publisher","first-page":"042812","DOI":"10.1103\/PhysRevE.88.042812","volume":"88","author":"S Mankad","year":"2013","unstructured":"Mankad S, Michailidis G (2013) Structural and functional discovery in dynamic networks with nonnegative matrix factorization. Phys Rev E 88(4):042812","journal-title":"Phys Rev E"},{"key":"4423_CR22","unstructured":"Trigeorgis G, Bousmalis K, Zafeiriou S, Schuller B (2014) A deep semi-nmf model for learning hidden representations. In\u00a0International Conference on Machine Learning\u00a0(pp. 1692\u20131700). PMLR"},{"issue":"11","key":"4423_CR23","doi-asserted-by":"publisher","first-page":"2132","DOI":"10.1109\/TMC.2012.188","volume":"12","author":"L Gao","year":"2012","unstructured":"Gao L, Li M, Bonti A, Zhou W, Yu S (2012) Multidimensional routing protocol in human-associated delay-tolerant networks. IEEE Trans Mob Comput 12(11):2132\u20132144","journal-title":"IEEE Trans Mob Comput"},{"key":"4423_CR24","unstructured":"Behrisch M, Bieker L, Erdmann J, Krajzewicz D (2011) SUMO\u2013simulation of urban mobility: an overview. In\u00a0Proceedings of SIMUL 2011, The Third International Conference on Advances in System Simulation. ThinkMind"},{"key":"4423_CR25","doi-asserted-by":"crossref","unstructured":"Wegener A, Pi\u00f3rkowski M, Raya M, Hellbr\u00fcck H, Fischer S, Hubaux JP (2008) TraCI: an interface for coupling road traffic and network simulators. In\u00a0Proceedings of the 11th communications and networking simulation symposium\u00a0(pp. 155\u2013163)","DOI":"10.1145\/1400713.1400740"},{"issue":"2","key":"4423_CR26","doi-asserted-by":"publisher","first-page":"22","DOI":"10.3390\/jsan9020022","volume":"9","author":"F Arena","year":"2020","unstructured":"Arena F, Pau G, Severino A (2020) A review on IEEE 802.11 p for intelligent transportation systems. J Sens Actuat Netw 9(2):22","journal-title":"J Sens Actuat Netw"},{"key":"4423_CR27","doi-asserted-by":"crossref","unstructured":"Spyropoulos T, Psounis K, Raghavendra CS (2005) Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In\u00a0Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking\u00a0(pp. 252\u2013259)","DOI":"10.1145\/1080139.1080143"},{"issue":"4","key":"4423_CR28","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N Eagle","year":"2006","unstructured":"Eagle N, Pentland AS (2006) Reality mining: sensing complex social systems. Pers Ubiquit Comput 10(4):255\u2013268","journal-title":"Pers Ubiquit Comput"},{"issue":"1","key":"4423_CR29","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1080\/01969727408546059","volume":"4","author":"JC Dunn","year":"1974","unstructured":"Dunn JC (1974) Well-separated clusters and optimal fuzzy partitions. J Cybern 4(1):95\u2013104","journal-title":"J Cybern"},{"issue":"1","key":"4423_CR30","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s00607-019-00735-2","volume":"102","author":"L Kulkarni","year":"2020","unstructured":"Kulkarni L, Bakal J, Shrawankar U (2020) Energy based incentive scheme for secure opportunistic routing in vehicular delay tolerant networks. Computing 102(1):201\u2013219","journal-title":"Computing"},{"issue":"8","key":"4423_CR31","doi-asserted-by":"publisher","first-page":"6377","DOI":"10.1109\/TVT.2015.2477164","volume":"65","author":"H Chen","year":"2015","unstructured":"Chen H, Lou W, Wang Z, Wang Q (2015) A secure credit-based incentive mechanism for message forwarding in noncooperative DTNs. IEEE Trans Veh Technol 65(8):6377\u20136388","journal-title":"IEEE Trans Veh Technol"},{"key":"4423_CR32","doi-asserted-by":"crossref","unstructured":"Guo Y, Schildt S, Wolf L (2013) Detecting blackhole and greyhole attacks in vehicular delay tolerant networks. In\u00a02013 Fifth International Conference on Communication Systems and Networks (COMSNETS)\u00a0(pp. 1\u20137). IEEE","DOI":"10.1109\/COMSNETS.2013.6465569"},{"key":"4423_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04202-8","author":"N Razzaghi","year":"2022","unstructured":"Razzaghi N, Babaie S (2022) A new selfish thing detection method based on Voronoi diagram for Internet of Things. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-021-04202-8","journal-title":"J Supercomput"},{"issue":"1","key":"4423_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1564-4","volume":"2019","author":"S Nobahary","year":"2019","unstructured":"Nobahary S, Garakani HG, Khademzadeh A, Rahmani AM (2019) Selfish node detection based on hierarchical game theory in IoT. EURASIP J Wirel Commun Netw 2019(1):1\u201319","journal-title":"EURASIP J Wirel Commun Netw"},{"issue":"2","key":"4423_CR35","doi-asserted-by":"publisher","first-page":"185","DOI":"10.3390\/electronics11020185","volume":"11","author":"M Fayaz","year":"2022","unstructured":"Fayaz M, Mehmood G, Khan A, Abbas S, Gwak J (2022) Counteracting selfish nodes using reputation based system in mobile Ad Hoc networks. Electronics 11(2):185","journal-title":"Electronics"},{"key":"4423_CR36","doi-asserted-by":"crossref","unstructured":"Akhbari A, Ghaffari A (2021) Selfish node detection based on fuzzy logic and harris hawks optimization algorithm in IoT networks.\u00a0Security and Communication Networks,\u00a02021","DOI":"10.1155\/2021\/2658272"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04423-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04423-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04423-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T22:51:40Z","timestamp":1726959100000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04423-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,11]]},"references-count":36,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["4423"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04423-5","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2022,4,11]]},"assertion":[{"value":"1 March 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no affiliation with any organization with a direct or indirect financial interest in the subject matter discussed in the manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Data is available in the public domain already.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Availability of data and Material"}},{"value":"The manuscript is ethically approved by the University's ethical committee.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Yes.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Yes.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}]}}