{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:31:15Z","timestamp":1761611475703,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,3,30]],"date-time":"2019-03-30T00:00:00Z","timestamp":1553904000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571179"],"award-info":[{"award-number":["61571179"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s12083-019-00741-3","type":"journal-article","created":{"date-parts":[[2019,3,30]],"date-time":"2019-03-30T08:02:30Z","timestamp":1553932950000},"page":"1638-1650","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A deep learning based data forwarding algorithm in mobile social networks"],"prefix":"10.1007","volume":"12","author":[{"given":"Qingshan","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5800-5574","authenticated-orcid":false,"given":"Haoen","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,30]]},"reference":[{"issue":"8","key":"741_CR1","doi-asserted-by":"crossref","first-page":"7195","DOI":"10.1109\/TVT.2017.2653843","volume":"66","author":"F Li","year":"2017","unstructured":"Li F, Jiang H, Li H, Cheng Y, Wang Y (2017) SEBAR: social-energy-based routing for mobile social delay-tolerant networks. IEEE Trans Veh Technol 66(8):7195\u20137206","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"741_CR2","doi-asserted-by":"crossref","first-page":"65250","DOI":"10.1109\/ACCESS.2018.2878552","volume":"6","author":"H Zhou","year":"2018","unstructured":"Zhou H, Wang H, Chen X, Li X, Xu S (2018) Data offloading techniques through vehicular ad hoc networks: a survey. IEEE Access 6(1):65250\u201365259","journal-title":"IEEE Access"},{"issue":"1","key":"741_CR3","doi-asserted-by":"crossref","first-page":"58254","DOI":"10.1109\/ACCESS.2018.2873905","volume":"6","author":"C Huang","year":"2018","unstructured":"Huang C, Chen Y, Xu S, Zhou H (2018) The vehicular social network (VSN)-based sharin g of downloaded geo data using the credit-based clustering scheme. IEEE Access 6(1):58254\u201358271","journal-title":"IEEE Access"},{"issue":"5","key":"741_CR4","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MNET.2018.1800029","volume":"32","author":"C Zhu","year":"2018","unstructured":"Zhu C, Leung VCM, Rodrigues JJPC, Shu L, Wang L, Zhou H (2018) Social sensor cloud: framework, greenness, issues, and outlook. IEEE Netw 32(5):100\u2013105","journal-title":"IEEE Netw"},{"issue":"3","key":"741_CR5","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MCOM.2017.1600690CM","volume":"55","author":"G Yang","year":"2017","unstructured":"Yang G, He SB, Shi ZG, Chen JM (2017) Promoting cooperation by social incentive mechanism in mobile crowdsensing. IEEE Commun Mag 55(3):86\u201392","journal-title":"IEEE Commun Mag"},{"issue":"6","key":"741_CR6","doi-asserted-by":"crossref","first-page":"2309","DOI":"10.1109\/JIOT.2017.2764475","volume":"4","author":"J Chen","year":"2017","unstructured":"Chen J, Hu K, Wang Q, Sun Y, Shi Z, He S (2017) Narrowband internet of things: implementations and applications. IEEE Internet Things J 4(6):2309\u20132314","journal-title":"IEEE Internet Things J"},{"issue":"9","key":"741_CR7","doi-asserted-by":"crossref","first-page":"3032","DOI":"10.1109\/TAC.2018.2789479","volume":"63","author":"H Zhang","year":"2018","unstructured":"Zhang H, Zheng WX (2018) Denial-of-service power dispatch against linear quadratic control via a fading channel. IEEE Trans Automat Control 63(9):3032\u20133039","journal-title":"IEEE Trans Automat Control"},{"issue":"12","key":"741_CR8","doi-asserted-by":"crossref","first-page":"2035","DOI":"10.1109\/TSMC.2017.2723038","volume":"48","author":"Y Zhu","year":"2018","unstructured":"Zhu Y, Zhong Z, Zheng WX, Zhou D (2018) HMM-based H-infinity filtering for discrete-time Markov jump LPV systems over unreliable communication channels. IEEE Trans on Syst Man Cybern, Syst 48(12):2035\u20132046","journal-title":"IEEE Trans on Syst Man Cybern, Syst"},{"issue":"4","key":"741_CR9","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1109\/TDSC.2016.2604383","volume":"15","author":"HX Li","year":"2018","unstructured":"Li HX, Zhu HJ, Du SG, Liang XH, Shen XM (2018) Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans Dependable Secure Computing 15(4):646\u2013660","journal-title":"IEEE Trans Dependable Secure Computing"},{"issue":"2","key":"741_CR10","doi-asserted-by":"crossref","first-page":"1543","DOI":"10.1109\/TIE.2018.2793241","volume":"66","author":"H Zhang","year":"2019","unstructured":"Zhang H, Meng WC, Qi JJ, Wang XY, Zheng WX (2019) Distributed load sharing under false data injection attack in inverter-based microgrid. IEEE Trans Ind Electron 66(2):1543\u20131551","journal-title":"IEEE Trans Ind Electron"},{"issue":"2","key":"741_CR11","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1109\/JIOT.2016.2560518","volume":"4","author":"G Yang","year":"2017","unstructured":"Yang G, He SB, Shi ZG (2017) Leveraging crowdsourcing for efficient malicious users detection in large-scale social networks. IEEE Internet Things J 4(2):330\u2013339","journal-title":"IEEE Internet Things J"},{"unstructured":"Vahdat A, Becker D (2000) Epidemic routing for partially-connected ad hoc networks. Duke University Tech. Rep. CS-200006","key":"741_CR12"},{"issue":"3","key":"741_CR13","first-page":"19","volume":"7","author":"A Lindgren","year":"2003","unstructured":"Lindgren A, Doria A, Scheln O (2003) Probability routing in intermittently connected networks. ACM SIGMOBILE Mobile Comput. Commun Rev 7(3):19\u201320","journal-title":"Commun Rev"},{"issue":"1","key":"741_CR14","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/TNET.2007.897964","volume":"16","author":"T Spyropoulos","year":"2008","unstructured":"Spyropoulos T, Psounis K, Raghavendra CS (2008) Efficient routing in intermittently connected mobile networks: the multiple-copy case. IEEE\/ACM Trans Networking 16(1):77\u201390","journal-title":"IEEE\/ACM Trans Networking"},{"key":"741_CR15","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/1374618.1374653","volume-title":"ACM MobiHoc","author":"V Erramilli","year":"2008","unstructured":"Erramilli V, Crovella M, Chaintreau A, Diot C (2008) Delegation forwarding. In: ACM MobiHoc, pp 251\u2013260"},{"key":"741_CR16","first-page":"1","volume-title":"IEEE ICCCN","author":"X Chen","year":"2009","unstructured":"Chen X, Shen J, Groves T, Wu J (2009) Probability delegation forwarding in delay tolerant networks. In: IEEE ICCCN, pp 1\u20136"},{"issue":"8","key":"741_CR17","doi-asserted-by":"crossref","first-page":"1686","DOI":"10.1109\/TMC.2014.2364846","volume":"14","author":"QS Wang","year":"2015","unstructured":"Wang QS, Wang Q (2015) Restricted epidemic routing in multi-community delay tolerant networks. IEEE Trans Mob Comput 14(8):1686\u20131697","journal-title":"IEEE Trans Mob Comput"},{"key":"741_CR18","first-page":"1","volume-title":"IEEE GLOBECOM","author":"F Hou","year":"2009","unstructured":"Hou F, Shen X (2009) An adaptive forwarding scheme for message delivery over delay tolerant networks. In: IEEE GLOBECOM, pp 1\u20135"},{"key":"741_CR19","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.jnca.2016.01.002","volume":"67","author":"CC Sobin","year":"2016","unstructured":"Sobin CC, Raychoudhury V, Marfia G, Singla A (2016) A survey of routing and data dissemination in delay tolerant networks. J Netw Comput Appl 67:128\u2013146","journal-title":"J Netw Comput Appl"},{"issue":"11","key":"741_CR20","doi-asserted-by":"crossref","first-page":"1576","DOI":"10.1109\/TMC.2010.246","volume":"10","author":"P Hui","year":"2011","unstructured":"Hui P, Crowcroft J, Yoneki E (2011) Bubble rap: social-based forwarding in delay tolerant networks. IEEE Trans Mob Comput 10(11):1576\u20131589","journal-title":"IEEE Trans Mob Comput"},{"issue":"7043","key":"741_CR21","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1038\/nature03607","volume":"435","author":"G Palla","year":"2005","unstructured":"Palla G, Derenyi I, Farkas I, Vicsek T (2005) Uncovering the overlapping community structure of complex networks in nature and society. Nature 435(7043):814\u2013818","journal-title":"Nature"},{"key":"741_CR22","first-page":"65","volume-title":"IEEE Percom Workshops","author":"P Hui","year":"2007","unstructured":"Hui P, Crowcroft J (2007) How small labels create big improvements. In: IEEE Percom Workshops, pp 65\u201370"},{"key":"741_CR23","first-page":"1","volume-title":"IEEE GLOBECOM","author":"E Bulut","year":"2010","unstructured":"Bulut E, Szymanski BK (2010) Friendship based routing in delay tolerant mobile social networks. In: IEEE GLOBECOM, pp 1\u20135"},{"key":"741_CR24","first-page":"1","volume-title":"IEEE ICNP","author":"K Chen","year":"2012","unstructured":"Chen K, Shen H (2012) SMART: lightweight distributed social map based routing in delay tolerant networks. In: IEEE ICNP, pp 1\u201310"},{"issue":"2","key":"741_CR25","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TC.2012.209","volume":"63","author":"J Wu","year":"2014","unstructured":"Wu J, Wang Y (2014) Hypercube-based multipath social feature routing in human contact networks. IEEE Trans Comput 63(2):383\u2013396","journal-title":"IEEE Trans Comput"},{"issue":"5","key":"741_CR26","first-page":"4300","volume":"66","author":"H Zheng","year":"2017","unstructured":"Zheng H, Wu J (2017) Up-and-down routing through nested cor-periphery hierarchy in mobile opportunistic social networks. IEEE Trans Veh Technol 66(5):4300\u20134314","journal-title":"IEEE Trans Veh Technol"},{"issue":"9","key":"741_CR27","doi-asserted-by":"crossref","first-page":"4720","DOI":"10.1109\/TWC.2015.2424965","volume":"14","author":"Z Li","year":"2015","unstructured":"Li Z, Wang C, Yang S, Jiang C, Stojmenovic I (2015) Space-crossing: community-based data forwarding in mobile social networks under the hybrid communication architecture. IEEE Trans Wirel Commun 14(9):4720\u20134727","journal-title":"IEEE Trans Wirel Commun"},{"key":"741_CR28","first-page":"2319","volume-title":"IEEE INFOCOM","author":"J Wu","year":"2013","unstructured":"Wu J, Xiao M, Huang L (2013) Homing spread: community home-based multi-copy routing in mobile social networks. In: IEEE INFOCOM, pp 2319\u20132327"},{"issue":"1","key":"741_CR29","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1109\/TMC.2011.249","volume":"12","author":"W Gao","year":"2013","unstructured":"Gao W, Cao G, Porta TL, Han J (2013) On exploiting transient social contact patterns for data forwarding in delay-tolerant networks. IEEE Trans on Mob comput 12(1):151\u2013165","journal-title":"IEEE Trans on Mob comput"},{"issue":"11","key":"741_CR30","doi-asserted-by":"crossref","first-page":"10372","DOI":"10.1109\/TVT.2017.2740218","volume":"66","author":"H Zhou","year":"2017","unstructured":"Zhou H, Leung VCM, Zhu C, Xu S, Fan J (2017) Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks. IEEE Trans Veh Technol 66(11):10372\u201310383","journal-title":"IEEE Trans Veh Technol"},{"key":"741_CR31","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1145\/2248371.2248396","volume-title":"ACM MobiHoc","author":"AK Pietil\u00e4inen","year":"2012","unstructured":"Pietil\u00e4inen AK, Diot C (2012) Dissemination in opportunistic social networks: the role of temporal communities. In: ACM MobiHoc, pp 165\u2013174"},{"issue":"5","key":"741_CR32","doi-asserted-by":"crossref","first-page":"2829","DOI":"10.1109\/TNET.2017.2708090","volume":"25","author":"X Zhang","year":"2017","unstructured":"Zhang X, Cao G (2017) Transient community detection and its application to data forwarding in delay tolerant networks. IEEE\/ACM Trans Networking 25(5):2829\u20132843","journal-title":"IEEE\/ACM Trans Networking"},{"issue":"99","key":"741_CR33","first-page":"1","volume":"PP","author":"M Ruan","year":"2019","unstructured":"Ruan M, Chen X, Zhou H (2019) Centrality prediction based on k-order Markov chain in mobile social networks. Peer Peer Netw Appl PP(99):1\u20131","journal-title":"Peer Peer Netw Appl"},{"issue":"7","key":"741_CR34","doi-asserted-by":"crossref","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","volume":"18","author":"GE Hinton","year":"2006","unstructured":"Hinton GE, Osindero S, Teh YW (2006) A fast learning algorithm for deep belief nets. Neural Comput 18(7):1527\u20131554","journal-title":"Neural Comput"},{"issue":"11","key":"741_CR35","doi-asserted-by":"crossref","first-page":"1946","DOI":"10.1109\/TC.2017.2709742","volume":"66","author":"B Mao","year":"2017","unstructured":"Mao B, Fadlullah ZM, Tang F, Kato N, Akashi O, Inoue T, Mizutani K (2017) Routing or computing? The paradigm shift towards intelligent computer network packet transmission based on deep learning. IEEE Trans Comput 66(11):1946\u20131960","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"741_CR36","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/MWC.2016.1600317WC","volume":"24","author":"N Kato","year":"2016","unstructured":"Kato N, Fadlullah ZM, Mao B, Tang F, Akashi O, Inoue T, Mizutani K (2016) The deep learning vision for heterogeneous network traffic control: proposal, challenges, and future perspective. IEEE Wirel Commun 24(3):146\u2013153","journal-title":"IEEE Wirel Commun"},{"key":"741_CR37","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/2799371.2799381","volume-title":"Proc. of the 10th ACM MobiCom workshop on challenged networks (CHANTS)","author":"S Cabrero","year":"2015","unstructured":"Cabrero S, Garcia R, Paneda XG (2015) Understanding opportunistic networking for emergency services: analysis of one year of GPS traces. In: Proc. of the 10th ACM MobiCom workshop on challenged networks (CHANTS), pp 31\u201336"},{"issue":"12","key":"741_CR38","doi-asserted-by":"crossref","first-page":"6123","DOI":"10.1109\/TNNLS.2018.2826442","volume":"29","author":"EC Mengg\u00fc\u00e7","year":"2018","unstructured":"Mengg\u00fc\u00e7 EC, Aci N (2018) Kurtosis-based CRTRL algorithms for fully connected recurrent neural networks. IEEE Trans Neural Netw Learn Syst 29(12):6123\u20136131","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"3","key":"741_CR39","doi-asserted-by":"crossref","first-page":"57","DOI":"10.5539\/mas.v2n3p57","volume":"2","author":"S Sathasivam","year":"2008","unstructured":"Sathasivam S, Abdullah W (2008) Logic learning in Hopfield networks. Mod Appl Sci 2(3):57\u201363","journal-title":"Mod Appl Sci"},{"key":"741_CR40","first-page":"1310","volume-title":"ICML","author":"R Pascanu","year":"2013","unstructured":"Pascanu R, Mikolov T, Bengio Y (2013) On the difficulty of training recurrent neural networks. In: ICML, pp 1310\u20131318"},{"issue":"8","key":"741_CR41","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"741_CR42","first-page":"2152","volume-title":"IEEE IJCNN","author":"MD Singh","year":"2017","unstructured":"Singh MD, Lee M (2017) Temporal hierarchies in multilayer gated recurrent neural networks for language models. In: IEEE IJCNN, pp 2152\u20132157"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00741-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-019-00741-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00741-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,29]],"date-time":"2020-03-29T00:12:20Z","timestamp":1585440740000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-019-00741-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,30]]},"references-count":42,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["741"],"URL":"https:\/\/doi.org\/10.1007\/s12083-019-00741-3","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2019,3,30]]},"assertion":[{"value":"14 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}