{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:41:09Z","timestamp":1765039269436,"version":"3.37.3"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61422201","61370159","U1201253","U1301255"],"award-info":[{"award-number":["61422201","61370159","U1201253","U1301255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Province Natural Science Foundation","award":["S2011030002886"],"award-info":[{"award-number":["S2011030002886"]}]},{"name":"Special-Support Project of Guangdong Province","award":["2014TQ01X100"],"award-info":[{"award-number":["2014TQ01X100"]}]},{"name":"High Education Excellent Young Teacher Program of Guangdong Province","award":["YQ2013057"],"award-info":[{"award-number":["YQ2013057"]}]},{"name":"Science and Technology Program of Guangzhou","award":["2014J2200097"],"award-info":[{"award-number":["2014J2200097"]}]},{"name":"Zhujiang New Star Program","award":["240079\/F20"],"award-info":[{"award-number":["240079\/F20"]}]},{"name":"European Commission Seventh Framework Programme for Research and Technological Development (FP7)"},{"name":"Cognitive Radio Oriented Wireless Networks (CROWN)","award":["PIRSES-GA-2013-627490"],"award-info":[{"award-number":["PIRSES-GA-2013-627490"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Electron."],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/tie.2015.2481792","type":"journal-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T14:36:14Z","timestamp":1443105374000},"page":"7938-7951","source":"Crossref","is-referenced-by-count":102,"title":["Cooperative Resource Management in Cloud-Enabled Vehicular Networks"],"prefix":"10.1109","volume":"62","author":[{"given":"Rong","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xumin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jiawen","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Jiefei","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Sabita","family":"Maharjan","sequence":"additional","affiliation":[]},{"given":"Stein","family":"Gjessing","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2007477.1952699"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214343"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(02)00915-3"},{"year":"0","key":"ref30"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1748-5"},{"journal-title":"Packet Forwarding in VANETs the Complete Set of Results","year":"2006","author":"torrent-moreno","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2425357"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2013.11.003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2014.6912651"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1985.1096357"},{"key":"ref14","first-page":"1202","article-title":"Cooperation as a service in VANETs","volume":"17","author":"mousannif","year":"2011","journal-title":"J Universal Comput Sci"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/853853"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOM.2011.5741144","article-title":"M2m: From mobile to embedded Internet","volume":"49","author":"wu","year":"2011","journal-title":"IEEE Commun Mag"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7064905"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2014.157"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/Nets4CarsFall.2014.7000907"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"2307","DOI":"10.1109\/TPDS.2013.178","article-title":"GT-CFS: A game theoretic coalition formulation strategy for reducing power loss in micro grids","volume":"25","author":"kato","year":"2014","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2425364"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2363834"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/17427371111123577"},{"key":"ref6","first-page":"902","article-title":"Social network and tag sources based augmenting collaborative recommender system","volume":"98","author":"tinghuai","year":"2015","journal-title":"IEICE Trans Inf Syst"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1038\/sj.jors.2600523"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2447505"},{"key":"ref8","first-page":"317","article-title":"Mutual verifiable provable data auditing in public cloud storage","volume":"16","author":"ren","year":"2015","journal-title":"J Internet Technol"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2409651"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2291321"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2683"},{"key":"ref1","first-page":"2233","article-title":"Internet of things in industries: A survey","volume":"10","author":"da xu","year":"2014","journal-title":"IEEE Trans Ind Electron"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131209"},{"key":"ref22","first-page":"929","article-title":"A variable threshold-value authentication architecture for wireless mesh networks","volume":"15","author":"guo","year":"2014","journal-title":"J Internet Technol"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","article-title":"Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing","volume":"98","author":"fu","year":"2015","journal-title":"IEICE Trans Commun"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000026"},{"key":"ref25","first-page":"171","article-title":"A peer-to-peer spatial cloaking algorithm for anonymous location-based service","author":"chow","year":"0","journal-title":"14th Annu ACM Int Symp Adv Geographic Inf Syst"}],"container-title":["IEEE Transactions on Industrial Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/41\/7322317\/07275140.pdf?arnumber=7275140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:46:58Z","timestamp":1641988018000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275140\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":35,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tie.2015.2481792","relation":{},"ISSN":["0278-0046","1557-9948"],"issn-type":[{"type":"print","value":"0278-0046"},{"type":"electronic","value":"1557-9948"}],"subject":[],"published":{"date-parts":[[2015,12]]}}}