{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:49:15Z","timestamp":1761896955432,"version":"3.37.3"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772554"],"award-info":[{"award-number":["61772554"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2895899","type":"journal-article","created":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T20:33:37Z","timestamp":1548966817000},"page":"16675-16694","source":"Crossref","is-referenced-by-count":35,"title":["A Cost-Efficient Greedy Code Dissemination Scheme Through Vehicle to Sensing Devices (V2SD) Communication in Smart City"],"prefix":"10.1109","volume":"7","author":[{"given":"Haojun","family":"Teng","sequence":"first","affiliation":[]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-4761","authenticated-orcid":false,"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3132-0616","authenticated-orcid":false,"given":"Xuxun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shaobo","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1631\/FITEE.1800519"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1016\/j.comnet.2017.10.001"},{"key":"ref33","article-title":"Design and analysis of probing route to defense sink-hole attacks for Internet of Things security","author":"liu","year":"0","journal-title":"IEEE Transactions on Network Science and Engineering"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1016\/j.pmcj.2018.06.012"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.3390\/s18114055"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TASE.2018.2838340"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/TSMC.2018.2833204"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/j.adhoc.2016.02.002"},{"key":"ref35","first-page":"419","article-title":"Feature selection method based on class discriminative degree for intelligent medical diagnosis","volume":"55","author":"fang","year":"2018","journal-title":"Comput Mater Continua"},{"key":"ref34","article-title":"Range-based localization for sparse 3D sensor networks","author":"liu","year":"0","journal-title":"IEEE Internet of Things Journal"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ACCESS.2017.2782881"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TASE.2018.2832454"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.3390\/s18092885"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ACCESS.2018.2825250"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TCOMM.2017.2739728"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1504\/IJAHUC.2018.096081"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/JIOT.2017.2786343"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ACCESS.2018.2882918"},{"key":"ref24","article-title":"Optimizing the coverage via the UAVs with lower costs for information-centric Internet of Things","author":"li","year":"0","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ACCESS.2018.2853134"},{"key":"ref26","article-title":"A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing","author":"wang","year":"0","journal-title":"IEEE Internet of Things Journal"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TVT.2018.2853120"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/TMC.2010.109"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/TPDS.2013.176"},{"year":"2014","author":"bracciale","journal-title":"CRAWDAD dataset roma\/taxi","key":"ref53"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/SNPA.2003.1203354"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.comnet.2018.02.024"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.measurement.2018.07.067"},{"key":"ref40","first-page":"1","article-title":"Data driven cyber-physical system for landslide detection","author":"liu","year":"2018","journal-title":"Mobile Netw Appl"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.future.2018.11.039"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.3390\/s18103516"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.ins.2018.12.028"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/MNET.2018.1700281"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ACCESS.2018.2868250"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ACCESS.2019.2890862"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ACCESS.2018.2858274"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.3390\/s18072349"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1186\/s13638-018-1313-0"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/JSAC.2017.2699059"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/JIOT.2018.2847243"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1155\/2018\/4172049"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TII.2018.2816590"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ACCESS.2018.2872787"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1016\/j.adhoc.2015.08.021"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.adhoc.2018.03.004"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/JIOT.2016.2611605"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/MCOM.2015.7355568"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1016\/j.adhoc.2017.05.002"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/JIOT.2017.2697949"},{"key":"ref42","article-title":"An energy-aware offloading framework for edge-augmented mobile RFID systems","author":"liu","year":"0","journal-title":"IEEE Internet of Things Journal"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/JSYST.2016.2615761"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/ICC.2014.6883734"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1016\/j.future.2017.06.022"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08631006.pdf?arnumber=8631006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T08:09:05Z","timestamp":1643270945000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8631006\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2895899","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}