{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:34:06Z","timestamp":1730284446896,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/nana.2018.8648749","type":"proceedings-article","created":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T21:36:15Z","timestamp":1551130575000},"page":"74-79","source":"Crossref","is-referenced-by-count":4,"title":["Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network"],"prefix":"10.1109","author":[{"given":"Yan","family":"Gao","sequence":"first","affiliation":[]},{"given":"Yong","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yeqiu","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2014.6814138"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2530070"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6829957"},{"key":"ref13","first-page":"1","article-title":"Friendship-based cooperative jamming for secure communication in poisson networks","author":"zhang","year":"2016","journal-title":"Wireless Networks"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"8439","DOI":"10.1038\/srep08439","article-title":"Enhancing robustness of coupled networks under targeted recoveries","volume":"5","author":"gong","year":"2015","journal-title":"Scientific Reports"},{"journal-title":"Rethinking the secrecy outage formulation A secure transmission design perspective","year":"2013","author":"zhou","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"10168","DOI":"10.1038\/ncomms10168","article-title":"The h-index of a network node and its relation to degree and coreness","volume":"7","author":"l\u00fc","year":"2016","journal-title":"Nature Communications"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2260875"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2329956"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.05.012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055346"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2672660"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2462826"}],"event":{"name":"2018 International Conference on Networking and Network Applications (NaNA)","start":{"date-parts":[[2018,10,12]]},"location":"Xi'an, China","end":{"date-parts":[[2018,10,15]]}},"container-title":["2018 International Conference on Networking and Network Applications (NaNA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8638646\/8648703\/08648749.pdf?arnumber=8648749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T01:42:13Z","timestamp":1643247733000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8648749\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/nana.2018.8648749","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}