{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:18:32Z","timestamp":1769739512768,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["52171337"],"award-info":[{"award-number":["52171337"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004761","name":"Natural Science Foundation of Hainan Province","doi-asserted-by":"crossref","award":["RZ2100000416"],"award-info":[{"award-number":["RZ2100000416"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"crossref"}]},{"name":"key project of Hainan Province","award":["ZDYF2020199"],"award-info":[{"award-number":["ZDYF2020199"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11277-024-11458-9","type":"journal-article","created":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T17:08:46Z","timestamp":1720544926000},"page":"1189-1216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Localization of Underwater Wireless Sensor Networks for Ranging Interference based on the AdaDelta Gradient Descent Algorithm"],"prefix":"10.1007","volume":"137","author":[{"given":"Ziyu","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Xingyu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Guozhen","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Zhigang","family":"Jin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8026-0624","authenticated-orcid":false,"given":"Ye","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qiuling","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,9]]},"reference":[{"key":"11458_CR1","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TIFS.2012.2184094","volume":"7","author":"R Garg","year":"2012","unstructured":"Garg, R., & Varna, L. A. (2012). An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7, 717\u2013730.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"11458_CR2","doi-asserted-by":"publisher","first-page":"1880","DOI":"10.1109\/TIFS.2020.3045320","volume":"16","author":"J Yan","year":"2020","unstructured":"Yan, J., Meng, Y., Yang, X., Luo, X., & Guan, X. (2020). Privacy-preserving localization for underwater sensor networks via deep reinforcement learning. IEEE Transactions on information forensics and security, 16, 1880\u20131895.","journal-title":"IEEE Transactions on information forensics and security"},{"key":"11458_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100241","volume":"37","author":"A Toky","year":"2020","unstructured":"Toky, A., Singh, R. P., & Das, S. (2020). Localization schemes for underwater acoustic sensor networks - a review. Computer Science Review, 37, 100241.","journal-title":"Computer Science Review"},{"issue":"1","key":"11458_CR4","first-page":"6403161","volume":"2020","author":"X Su","year":"2020","unstructured":"Su, X., Ullah, I., Liu, X., & Choi, D. (2020). A review of underwater localization techniques, algorithms, and challenges. Journal of Sensors, 2020(1), 6403161.","journal-title":"Journal of Sensors"},{"key":"11458_CR5","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.apacoust.2018.03.032","volume":"138","author":"Y Han","year":"2018","unstructured":"Han, Y., Sun, D., Zheng, C., & Zhang, J. (2018). Centralized underwater node localization using range based multilateral accumulation method (RBMAM). Applied Acoustics, 138, 115\u2013120.","journal-title":"Applied Acoustics"},{"key":"11458_CR6","first-page":"1","volume":"15","author":"S Misra","year":"2021","unstructured":"Misra, S., & Ojha, T. (2021). SecRET: Secure range-based localization with evidence theory for underwater sensor networks. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 15, 1\u201326.","journal-title":"ACM Transactions on Autonomous and Adaptive Systems (TAAS)"},{"key":"11458_CR7","doi-asserted-by":"crossref","unstructured":"Xu, X., Wang, G., Ren, Y., & Liu, X. (2017). a secure localization algorithm based on confidence constraint for underwater wireless sensor networks. In International conference on information science and applications (pp. 46\u201349).","DOI":"10.1007\/978-981-10-4154-9_6"},{"key":"11458_CR8","doi-asserted-by":"crossref","unstructured":"Das, A. P., & Thampi, S. M. (2015). Secure communication in mobile underwater wireless sensor networks. In 2015 international conference on advances in computing, communications and informatics (ICACCI) (pp. 2164\u20132173).","DOI":"10.1109\/ICACCI.2015.7275937"},{"key":"11458_CR9","doi-asserted-by":"publisher","first-page":"4552","DOI":"10.3390\/s19204552","volume":"19","author":"S Wang","year":"2019","unstructured":"Wang, S., Lin, Y., Tao, H., Sharma, P. K., & Wang, J. (2019). Underwater acoustic sensor networks node localization based on compressive sensing in water hydrology. Sensors, 19, 4552\u20134565.","journal-title":"Sensors"},{"issue":"19","key":"11458_CR10","doi-asserted-by":"publisher","first-page":"5496","DOI":"10.3390\/s20195496","volume":"20","author":"A Sabra","year":"2020","unstructured":"Sabra, A., & Fung, W. K. (2020). A fuzzy cooperative localisation framework for underwater robotic swarms. Sensors, 20(19), 5496.","journal-title":"Sensors"},{"key":"11458_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, R., & Zhang, Y. (2010). Wormhole-resilient secure neighbor discovery in underwater acoustic networks. In 2010 proceedings IEEE INFOCOM (pp. 1\u20139).","DOI":"10.1109\/INFCOM.2010.5462093"},{"key":"11458_CR12","doi-asserted-by":"publisher","first-page":"229","DOI":"10.3390\/s16020229","volume":"16","author":"G Han","year":"2016","unstructured":"Han, G., Liu, L., Jiang, J., Shu, L., & Rodrigues, J. J. (2016). A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors, 16, 229\u2013241.","journal-title":"Sensors"},{"key":"11458_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Z., Deng, X., & Li, J. (2017). A secure localization algorithm based on reputation against wormhole attack in UWSNS. In 2017 international symposium on intelligent signal processing and communication systems (ISPACS) (pp. 695\u2013700).","DOI":"10.1109\/ISPACS.2017.8266566"},{"issue":"21","key":"11458_CR14","doi-asserted-by":"publisher","first-page":"21287","DOI":"10.1109\/JSEN.2022.3202169","volume":"22","author":"Y Su","year":"2022","unstructured":"Su, Y., Li, L., Fan, R., Liu, Y., & Jin, Z. (2022). A secure transmission scheme with energy-efficient cooperative jamming for underwater acoustic sensor networks. IEEE Sensors Journal, 22(21), 21287\u201321298.","journal-title":"IEEE Sensors Journal"},{"key":"11458_CR15","unstructured":"Han, Y., Zheng, C., & Sun, D. (2015). Localization of large scale underwater sensor networks based on recursive position estimation. In OCEANS 2015-MTS\/IEEE Washington (pp. 1\u20134). IEEE."},{"key":"11458_CR16","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Cui, J. H., & Zhou, S. (2007). Localization for large-scale underwater sensor networks. In International conference on research in networking (pp. 108\u2013119).","DOI":"10.1007\/978-3-540-72606-7_10"},{"issue":"9","key":"11458_CR17","doi-asserted-by":"publisher","first-page":"7245","DOI":"10.1109\/TGRS.2020.3032982","volume":"59","author":"S Sun","year":"2020","unstructured":"Sun, S., Qin, S., Hao, Y., Zhang, G., & Zhao, C. (2020). Underwater acoustic localization of the black box based on generalized second-order time difference of arrival (gstdoa). IEEE Transactions on Geoscience and Remote Sensing, 59(9), 7245\u20137255.","journal-title":"IEEE Transactions on Geoscience and Remote Sensing"},{"key":"11458_CR18","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.adhoc.2009.08.005","volume":"8","author":"Z Zhou","year":"2010","unstructured":"Zhou, Z., Cui, J. H., & Zhou, S. (2010). Efficient localization for large-scale underwater sensor networks. Ad Hoc Networks, 8, 267\u2013279.","journal-title":"Ad Hoc Networks"},{"key":"11458_CR19","doi-asserted-by":"publisher","first-page":"1756","DOI":"10.1109\/TVT.2007.912142","volume":"57","author":"X Cheng","year":"2008","unstructured":"Cheng, X., Shu, H., Liang, Q., & Du, D. H. C. (2008). Silent positioning in underwater acoustic sensor networks. IEEE Transactions on Vehicular Technology, 57, 1756\u20131766.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"11458_CR20","doi-asserted-by":"crossref","unstructured":"Cheng, W., Thaeler, A., Cheng, X., Liu, F., Lu, X., & Lu, Z. (2009). Time-synchronization free localization in large scale underwater acoustic sensor networks. In 2009 29th IEEE international conference on distributed computing systems workshops (pp. 80\u201387).","DOI":"10.1109\/ICDCSW.2009.79"},{"key":"11458_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSEN.2020.3014328","volume":"20","author":"S Li","year":"2020","unstructured":"Li, S., Sun, H., & Esmaiel, H. (2020). Underwater TDOA acoustical location based on majorization-minimization optimization. Sensors, 20, 1\u201319.","journal-title":"Sensors"},{"key":"11458_CR22","doi-asserted-by":"crossref","unstructured":"Ma, Y. (2020, May). A simulation of the TDOA chan localization used in the train station and indoor location system. In 13th Asia Pacific transportation development conference (pp. 450\u2013459). Reston, VA: American Society of Civil Engineers.","DOI":"10.1061\/9780784482902.052"},{"key":"11458_CR23","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1016\/j.sigpro.2011.11.023","volume":"92","author":"B Dang","year":"2012","unstructured":"Dang, B., Li, J., & Liao, G. (2012). Taylor polynomial expansion based waveform correlation cancellation for bistatic MIMO radar localization. Signal Processing, 92, 1404\u20131410.","journal-title":"Signal Processing"},{"key":"11458_CR24","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.neucom.2016.11.092","volume":"270","author":"X Shi","year":"2017","unstructured":"Shi, X., Mao, G., Yang, Z., & Chen, J. (2017). MLE-based localization and performance analysis in probabilistic LOS\/NLOS environment. Neurocomputing, 270, 101\u2013109.","journal-title":"Neurocomputing"},{"key":"11458_CR25","doi-asserted-by":"publisher","first-page":"2218","DOI":"10.1109\/LCOMM.2015.2486769","volume":"19","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Guo, F., Yang, L., & Jiang, W. (2015). An improved algebraic solution for TDOA localization with sensor position errors. IEEE Communications Letters, 19, 2218\u20132221.","journal-title":"IEEE Communications Letters"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11458-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11458-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11458-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T08:10:54Z","timestamp":1721376654000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11458-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["11458"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11458-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"30 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no Conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}