{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:42:37Z","timestamp":1774021357347,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF1810343"],"award-info":[{"award-number":["W911NF1810343"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61631017"],"award-info":[{"award-number":["61631017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/twc.2018.2854579","type":"journal-article","created":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T16:21:03Z","timestamp":1531930863000},"page":"6053-6066","source":"Crossref","is-referenced-by-count":41,"title":["Designing Security-Aware Incentives for Computation Offloading via Device-to-Device Communication"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0515-1647","authenticated-orcid":false,"given":"Jie","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1805-0183","authenticated-orcid":false,"given":"Lixing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3148-4453","authenticated-orcid":false,"given":"Cong","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2360674"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015961"},{"key":"ref33","first-page":"134","article-title":"Joint scheduling and resource allocation for device-to-device underlay communication","author":"wang","year":"2013","journal-title":"Proc IEEE Wireless Commun Netw Conf (WCNC)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2424395"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925623"},{"key":"ref30","author":"bailey","year":"1975","journal-title":"The Mathematical Theory of Infectious Diseases and Its Applications"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195300796.001.0001"},{"key":"ref36","year":"2017"},{"key":"ref35","year":"2017"},{"key":"ref34","year":"2017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1927.0118"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.041912.110912"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600170"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120041"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2683479"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.100611.101684"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2463280"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2320492"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130801"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248394"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2435356"},{"key":"ref3","article-title":"Hyrax: Cloud computing on mobile devices using MapReduce","author":"marinelli","year":"2009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2649687"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238052"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2016.7523497"},{"key":"ref8","first-page":"1501","article-title":"How can botnets cause storms? Understanding the evolution and impact of mobile botnets","author":"lu","year":"2014","journal-title":"Proc IEEE Int Conf Comput Commun (INFOCOM)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2015.40"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref9","volume":"393","author":"fudenberg","year":"1991","journal-title":"Game Theory"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513031"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6807945"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2264633"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7166194"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883656"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2465379"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.061013.120777"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/8458058\/08412253.pdf?arnumber=8412253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T11:09:55Z","timestamp":1643195395000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8412253\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":39,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/twc.2018.2854579","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"value":"1536-1276","type":"print"},{"value":"1558-2248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}