{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:13Z","timestamp":1740122653076,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,6,30]],"date-time":"2015-06-30T00:00:00Z","timestamp":1435622400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National High Technology Research and Development Program of China","award":["2013AA122602"],"award-info":[{"award-number":["2013AA122602"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61273092"],"award-info":[{"award-number":["61273092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s11277-015-2837-9","type":"journal-article","created":{"date-parts":[[2015,6,29]],"date-time":"2015-06-29T07:03:20Z","timestamp":1435561400000},"page":"1237-1250","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Bayesian Coalitional Game in Physical Layer Security"],"prefix":"10.1007","volume":"85","author":[{"given":"Xiaomei","family":"Fu","sequence":"first","affiliation":[]},{"given":"Ling","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qun","family":"Zong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,30]]},"reference":[{"key":"2837_CR1","unstructured":"Abbasvand, S., & Jamali, S. (2013). A survey over application of game theory in communication networks. Global Journal on Technology, 1."},{"issue":"5","key":"2837_CR2","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/MSP.2009.000000","volume":"26","author":"W Saad","year":"2009","unstructured":"Saad, W., Han, Z., Debbah, M., Hjorungnes, A., & Basar, T. (2009). Coalitional game theory for communication networks. Signal Processing Magazine, IEEE, 26(5), 77\u201397.","journal-title":"Signal Processing Magazine, IEEE"},{"issue":"3","key":"2837_CR3","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei, M. H., Zhu, Q., Alpcan, T., Bac\u015far, T., & Hubaux, J.-P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"2837_CR4","doi-asserted-by":"crossref","unstructured":"Saad, W., Han, Z., Basar, T., Debbah, M., & Hjorungnes, A. (2009). Physical layer security: Coalitional games for distributed cooperation. In 7th International symposium on, modeling and optimization in mobile, ad hoc, and wireless networks, 2009. WiOPT 2009. (pp. 1\u20138). IEEE.","DOI":"10.1109\/WIOPT.2009.5291619"},{"key":"2837_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-38215-4","volume-title":"Non-transferable utility games and coalition formation mechanisms. In belief-based stability in coalition formation with uncertainty (pp. 13\u201327)","author":"C Chan","year":"2013","unstructured":"Chan, C., & Leung, H. (2013). Non-transferable utility games and coalition formation mechanisms. In belief-based stability in coalition formation with uncertainty (pp. 13\u201327). Berlin: Springer."},{"key":"2837_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, R., Song, L., Han, Z., & Jiao, B. (2011). Distributed coalition formation of relay and friendly jammers for secure cooperative networks. In IEEE international conference on, communications (ICC), 2011 (pp. 1\u20136). IEEE.","DOI":"10.1109\/icc.2011.5962513"},{"key":"2837_CR7","doi-asserted-by":"crossref","unstructured":"Chalkiadakis, G., & Boutilier, C. (2003). Coordination in multiagent reinforcement learning: A bayesian approach. In: Proceedings of the second international joint conference on Autonomous agents and multiagent systems, (pp. 709\u2013716). ACM.","DOI":"10.1145\/860575.860689"},{"key":"2837_CR8","unstructured":"Chalkiadakis, G., & Boutilier, C. (2004). Bayesian reinforcement learning for coalition formation under uncertainty. In: Proceedings of the third international joint conference on autonomous agents and multiagent systems Vol. 3, (pp. 1090\u20131097). IEEE Computer Society."},{"key":"2837_CR9","doi-asserted-by":"crossref","unstructured":"Chalkiadakis, G., Markakis, E., & Boutilier, C. (2007). Coalition formation under uncertainty: Bargaining equilibria and the bayesian core stability concept. In: Proceedings of the 6th international joint conference on autonomous agents and multiagent systems, p. 64. ACM.","DOI":"10.1145\/1329125.1329203"},{"issue":"6","key":"2837_CR10","doi-asserted-by":"crossref","first-page":"2470","DOI":"10.1109\/TIT.2008.921678","volume":"54","author":"Y Liang","year":"2008","unstructured":"Liang, Y., Poor, H. V., & Shamai, S. (2008). Secure communication over fading channels. IEEE Transactions on Information Theory, 54(6), 2470\u20132492.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2837_CR11","doi-asserted-by":"crossref","unstructured":"Dehnie, S., & Memon, N. (2008). Cooperative diversity as a dynamic game with incomplete information. In Military communications conference. MILCOM 2008. IEEE, (pp. 1\u20136). IEEE.","DOI":"10.1109\/MILCOM.2008.4753035"},{"key":"2837_CR12","unstructured":"Leong, S., & Shoham, Y. (2008). Bayesian coalitional games. In AAAI, (pp. 95\u2013100)."},{"key":"2837_CR13","doi-asserted-by":"crossref","unstructured":"Vasudevan, S., Towsley, D., Goeckel, D., & Khalili, R. (2009). Neighbor discovery in wireless networks and the coupon collector\u2019s problem. In: Proceedings of the 15th annual international conference on Mobile computing and networking, (pp. 181\u2013192). ACM.","DOI":"10.1145\/1614320.1614341"},{"issue":"7","key":"2837_CR14","doi-asserted-by":"crossref","first-page":"2328","DOI":"10.1109\/TWC.2010.07.091454","volume":"9","author":"S Dehnie","year":"2010","unstructured":"Dehnie, S., & Tomasin, S. (2010). Detection of selfish nodes in networks using coopmac protocol with arq. IEEE Transactions on Wireless Communications, 9(7), 2328\u20132337.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"2837_CR15","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TMC.2011.251","volume":"12","author":"K Akkarajitsakul","year":"2013","unstructured":"Akkarajitsakul, K., Hossain, E., & Niyato, D. (2013). Coalition-based cooperative packet delivery under uncertainty: a dynamic bayesian coalitional game. IEEE Transactions on Mobile Computing, 12(2), 371\u2013385.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2837_CR16","doi-asserted-by":"crossref","unstructured":"Niyato, D., Wang, P., Saad, W., Han, Z., & Hjorungnes, A. (2011). Coalition formation games for relay transmission: Stability analysis under uncertainty. In Wireless communications and networking conference (WCNC), 2011 IEEE, (pp. 920\u2013925). IEEE.","DOI":"10.1109\/WCNC.2011.5779259"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2837-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2837-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2837-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:18:24Z","timestamp":1559380704000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2837-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,30]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["2837"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2837-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2015,6,30]]}}}