{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:34:49Z","timestamp":1767339289935,"version":"3.37.3"},"reference-count":175,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2879760","type":"journal-article","created":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T19:28:00Z","timestamp":1541446080000},"page":"70397-70425","source":"Crossref","is-referenced-by-count":50,"title":["Survey of Public Safety Communications: User-Side and Network-Side Solutions and Future Directions"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4522-7340","authenticated-orcid":false,"given":"Wei","family":"Yu","sequence":"first","affiliation":[]},{"given":"Hansong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"James","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Blasch","sequence":"additional","affiliation":[]},{"given":"Amirshahram","family":"Hematian","sequence":"additional","affiliation":[]},{"given":"Weichao","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2727078"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2014.0337"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2033564"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6829951"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.08.023"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2010.5645039"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470933"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655060"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2012.6362746"},{"key":"ref33","first-page":"37","article-title":"A GNU radio-based IEEE 802.15. 4 testbed","author":"bloessl","year":"2013","journal-title":"Proc 6th GI\/ITG KuVS Fachgespr&#x00E4;ch Drahtlose Sensornetze"},{"key":"ref32","first-page":"epfl-poster-149153","article-title":"Security issues in next generation mobile networks: LTE and femtocells","author":"bilogrevic","year":"2010","journal-title":"2nd International Femtocell Workshop"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069409"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069323"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/EW.2010.5483535"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2980159.2980164"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510820"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.20"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162471"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2014.6911737"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.082713.00034"},{"journal-title":"The ns-3 LTE module by the LENA project","year":"2011","author":"baldo","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2014-169"},{"key":"ref24","first-page":"387","article-title":"Design and validation of a software defined radio testbed for DVB-T transmission","volume":"23","author":"baruffa","year":"2014","journal-title":"Radioengineering"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2068897.2068948"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.29"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2732462"},{"key":"ref25","first-page":"1","article-title":"A \n$4\\times4$\n FPGA-based wireless testbed for LTE applications","author":"bates","year":"2008","journal-title":"Proc IEEE 19th Int Symp Pers Indoor Mobile Radio Commun (PIMRC)"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2014.7022860"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350367"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2541862"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2568172"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2407871"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2016.0083"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2640563"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2311580"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/2872332"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2692648"},{"journal-title":"Hurricane Harvey Death Toll Hits 70","year":"2017","author":"weber","key":"ref146"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2015.7311417"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2013.6692186"},{"journal-title":"Damage to Businesses From Baltimore Rioting Estimated at About $9 Million","year":"2015","author":"wenger","key":"ref149"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2987386.2987400"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33903-0_2"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.jnca.2016.11.002","article-title":"A survey on device-to-device (D2D) communication: Architecture and security issues","volume":"78","author":"gandotra","year":"2017","journal-title":"J Netw Comput Appl"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1224"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2379938"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6163598"},{"journal-title":"Communications Status Report for Areas Impacted by Hurricane Harvey","year":"2017","key":"ref53"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2363849"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2016.7516125"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2014.6881202"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.161"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390397"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568592"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1002\/sec.957"},{"key":"ref162","first-page":"300","article-title":"A threat monitoring system in enterprise networks with mobile devices","author":"yu","year":"2013","journal-title":"Proc ACM Int Conf Rel Convergent Syst (RACS)"},{"key":"ref161","doi-asserted-by":"crossref","first-page":"2752","DOI":"10.1109\/TWC.2011.060811.102120","article-title":"Resource sharing optimization for device-to-device communication underlaying cellular networks","volume":"10","author":"yu","year":"2011","journal-title":"IEEE Trans Wireless Commun"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2338302"},{"journal-title":"Feasibility study for proximity services (ProSe) TR 22 803","year":"2012","key":"ref4"},{"journal-title":"Proximity-Based Services (ProSe) Stage 2","year":"2016","key":"ref3"},{"journal-title":"Study on enhanced LTE support for aerial vehicles TR 36 777","year":"2017","key":"ref6"},{"journal-title":"Study on architecture enhancements to support proximity-based services (ProSe) TR 23 703","year":"2013","key":"ref5"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.177"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20199"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"996","DOI":"10.3390\/s17050996","article-title":"Canoe: An autonomous infrastructure-free indoor navigation system","volume":"17","author":"dong","year":"2017","journal-title":"SENSORS"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2700432"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.92"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680218"},{"journal-title":"LTE-A Proximity-Based","year":"0","author":"diouf","key":"ref46"},{"journal-title":"Ns-3 Tutorial Release Ns-3 21","year":"2017","author":"dan morse","key":"ref45"},{"key":"ref48","article-title":"A survey on geographically distributed big-data processing using MapReduce","author":"dolev","year":"0","journal-title":"IEEE Trans Big Data"},{"key":"ref47","first-page":"30","article-title":"Game theory for cyber security and privacy","volume":"50","author":"do","year":"2017","journal-title":"ACM Comput Surv"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2017.7918122"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2017.8073815"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of Things in industries: A survey","volume":"10","author":"da xu","year":"2014","journal-title":"IEEE Trans Ind Informat"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2013.6686501"},{"key":"ref127","article-title":"A long term evolution (LTE) device-to-device module for ns-3","author":"rouil","year":"2016","journal-title":"The Workshop on ns-3 (WNS3)"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2012.6240328"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2042446"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983079"},{"article-title":"A service-constrained positioning strategy for an autonomous fleet of airborne base stations","year":"2017","author":"torra","key":"ref73"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2472995"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2471395"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500486"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2651578"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/VITAE.2014.6934508"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2641798.2641805"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1038\/nature24270","article-title":"Mastering the game of go without human knowledge","volume":"550","author":"silver","year":"2017","journal-title":"Nature"},{"journal-title":"Maryland Governor Lifts State of Emergency in Baltimore","year":"2015","author":"krishnadev","key":"ref77"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6807950"},{"key":"ref75","first-page":"1","article-title":"Simulating drone-be-gone: Agile low-cost cyber-physical UAV testbed","author":"khan","year":"2016","journal-title":"Proc Int Joint Conf Auton Agents Multiagent Syst"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-011-9616-y"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2348950"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"journal-title":"Exploiting LTE-advanced HetNets and FeICIC for UAV-assisted public safety communications","year":"2017","author":"kumbhar","key":"ref78"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2312291"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2612223"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524340"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2437903"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024621"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996482"},{"key":"ref60","first-page":"173","article-title":"A survey on deep learning in big data","author":"gheisari","year":"2017","journal-title":"Proc IEEE Int Conf Comput Sci Eng (CSE) IEEE Int Conf Embedded Ubiquitous Comput (EUC)"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2379653"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2980159.2980163"},{"key":"ref61","article-title":"A distributed algorithm for the multi-robot task allocation problem","author":"giordani","year":"2010","journal-title":"Proc Int Conf Ind Eng Appl Appl Intell Syst"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.042711.00083"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057077"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019721"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357450"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2495297"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.28"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2355594"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2734807"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3129676.3129690"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700876"},{"journal-title":"Lessons Learned From the 2015 Civil Unrest in Baltimore","year":"2015","key":"ref2"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2987386.2987391"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7553023"},{"journal-title":"Guyana Emergency Situation at Jawalla Village Region 7","year":"2017","key":"ref1"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477825"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195736"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.12.046"},{"journal-title":"The sky is not the limit LTE for unmanned aerial vehicles","year":"2017","author":"lin","key":"ref94"},{"journal-title":"Mobile networks connected drones Field trials simulations and design insights","year":"2018","author":"lin","key":"ref93"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2016.2589970"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2320522"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2015.7122576"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2360202"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6807945"},{"journal-title":"A prototyping methodology for SDN-controlled LTE using SDR","year":"2014","author":"mancuso","key":"ref104"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2633248"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2016.2604306"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986282"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600587CM"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5681011"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2017.8102137"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2317671"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2375934"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2439636"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.036"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2186980"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2752161"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2328098"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120401"},{"article-title":"The public safety nationwide interoperable broadband network: A new model for capacity, performance and cost","year":"2010","author":"peha","key":"ref118"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref82","first-page":"5451","article-title":"Fair resource allocation for device-to-device communications in wireless cellular networks","author":"le","year":"2012","journal-title":"Proc IEEE Global Commun Conf (GLOBECOM)"},{"key":"ref117","first-page":"189","article-title":"Software defined radio architecture survey for cognitive testbeds","author":"park","year":"2016","journal-title":"Proc 8th Int Wireless Commun Mobile Comput Conf (IWCMC)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2319555"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249190"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842208"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6231164"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6952651"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2369612"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925548"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"ref116","first-page":"517","article-title":"SDR-based frequency interference analysis test-bed considering time domain characteristics of interferer","author":"park","year":"2016","journal-title":"Proc 18th Int Conf Adv Commun Technol (ICACT)"},{"key":"ref80","first-page":"1","article-title":"A survey of deep learning-based network anomaly detection","author":"kwon","year":"2017","journal-title":"Cluster Computing"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6807947"},{"journal-title":"Baltimore Violence Updates 10 Arrested After Curfew Police Say","year":"2015","author":"phelps","key":"ref120"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6590055"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2014.2360652"},{"key":"ref123","first-page":"1","article-title":"A survey of unmanned aerial vehicles (UAV) for traffic surveillance","author":"puri","year":"2005"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.340"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2810162"},{"key":"ref87","doi-asserted-by":"crossref","DOI":"10.1002\/9781118829851","author":"liebhart","year":"2015","journal-title":"Public Safety LTE"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2572123"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08523665.pdf?arnumber=8523665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T03:06:37Z","timestamp":1643252797000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8523665\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":175,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2879760","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}