{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:06:18Z","timestamp":1768313178457,"version":"3.49.0"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772554"],"award-info":[{"award-number":["61772554"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572528"],"award-info":[{"award-number":["61572528"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["6157256"],"award-info":[{"award-number":["6157256"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2897615","type":"journal-article","created":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T19:50:33Z","timestamp":1549396233000},"page":"20644-20663","source":"Crossref","is-referenced-by-count":33,"title":["Deployment Optimization of Data Centers in Vehicular Networks"],"prefix":"10.1109","volume":"7","author":[{"given":"Baixiang","family":"Huang","sequence":"first","affiliation":[]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6619-554X","authenticated-orcid":false,"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2631-9223","authenticated-orcid":false,"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-4761","authenticated-orcid":false,"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.028"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.12.007"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2890862"},{"key":"ref32","first-page":"419","article-title":"Feature selection method based on class discriminative degree for intelligent medical diagnosis","volume":"55","author":"fang","year":"2018","journal-title":"CMC Comput Mater Continua"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.02.002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.11.006"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2018.096081"},{"key":"ref36","article-title":"Design and analysis of probing route to defense sink-hole attacks for internet of things security","author":"liu","year":"0","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/s18103516"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700281"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2873779"},{"key":"ref27","article-title":"Non-orthogonal multiple access for mobile edge computing enabled vehicular networks","author":"ning","year":"0","journal-title":"IEEE Veh Technol Mag"},{"key":"ref29","first-page":"1","article-title":"Data driven cyber-physical system for landslide detection","volume":"192","author":"liu","year":"2018","journal-title":"Mobile Netw Appl"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847243"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.01.008"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2897062"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s18072349"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.01.022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2815039"},{"key":"ref23","article-title":"Energy-efficient resource sharing scheme with out-band D2D relay-aided communications in C-RAN-based underlay cellular networks","author":"li","year":"0","journal-title":"IEEE Access"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s17040888"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2611863"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2704610"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.10.001"},{"key":"ref59","year":"0"},{"key":"ref58","first-page":"316","article-title":"Driving with knowledge from the physical world","author":"jing","year":"2011","journal-title":"Proc 17th ACM SIGKDD Int Conf Knowl Discovery Data Mining"},{"key":"ref57","first-page":"99","article-title":"T-drive: driving directions based on taxi trajectories","author":"jing","year":"2010","journal-title":"Proc 18th SIGSPATIAL Int Conf Adv Geograph Inf Syst"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.012"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-016-0916-x"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0619-8"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2317701"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.07.013"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895899"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2882918"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/s18092885"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.039"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2018.2865494"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1313-0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s18061750"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812803"},{"key":"ref17","article-title":"A novel trust mechanism based on fog computing in sensor-cloud system","author":"wang","year":"0","journal-title":"Future Gener Comput Syst to be published"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2517618"},{"key":"ref19","article-title":"Joint computation offloading, power allocation, and channel assignment for 5G-enabled traffic management systems","author":"ning","year":"0","journal-title":"IEEE Trans Ind Informat"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2825250"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700030"},{"key":"ref6","year":"2018","journal-title":"Internet of things market forecast Cisco"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2485206"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701065"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2785383"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2853120"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700242"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870928"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2411231"},{"key":"ref48","article-title":"A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing","author":"wang","year":"0","journal-title":"IEEE Internet of Things Journal"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.pmcj.2018.07.002","article-title":"Privacy-respecting reward generation and accumulation for participatory sensing applications","volume":"49","author":"tassos","year":"2018","journal-title":"Pervasive Mobile Comput"},{"key":"ref42","first-page":"1","article-title":"Multi working sets alternate covering scheme for continuous partial coverage in WSNs","volume":"99","author":"huang","year":"2018","journal-title":"Peer-to-Peer Netw Appl"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2833204"},{"key":"ref44","article-title":"Minimizing convergecast time and energy consumption in green internet of things","author":"li","year":"0","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"ref43","article-title":"Optimizing the coverage via the UAVs with lower costs for information-centric Internet of Things","author":"li","year":"0","journal-title":"IEEE Access"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08635469.pdf?arnumber=8635469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T07:30:15Z","timestamp":1643268615000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8635469\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2897615","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}