{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:03Z","timestamp":1750221123996,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:00:00Z","timestamp":1544227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,8]]},"DOI":"10.1145\/3297156.3297226","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T13:07:04Z","timestamp":1551359224000},"page":"468-473","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs"],"prefix":"10.1145","author":[{"given":"Shiqiang","family":"Zhang","sequence":"first","affiliation":[{"name":"Beijing University of Technology, Beijing, China"}]},{"given":"Zhenhu","family":"Ning","sequence":"additional","affiliation":[{"name":"Beijing University of Technology, Beijing, China"}]},{"given":"Yang","family":"Cao","sequence":"additional","affiliation":[{"name":"Beijing University of Technology, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.55"},{"key":"e_1_3_2_1_3_1","first-page":"935","article-title":"A New Node Clone Attacks Detection Based on Mobile Sequential Tests in Wireless Sensor Networks","volume":"30","author":"Zhou Y.","year":"2017","journal-title":"Chinese Journal of Sensors & Actuators"},{"key":"e_1_3_2_1_4_1","unstructured":"Xu Jun. 2012. Research on Several Problems of Malicious Node Attacks in Wireless Sensor Networks. Ph.D. Dissertation. China University of Science and Technology.  Xu Jun. 2012. Research on Several Problems of Malicious Node Attacks in Wireless Sensor Networks. Ph.D. Dissertation. China University of Science and Technology."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197497"},{"key":"e_1_3_2_1_6_1","first-page":"129","article-title":"Clustering-based intrusion detection method for node replication attacks","volume":"33","author":"Hui Zhou","year":"2014","journal-title":"Sensors and Microsystems"},{"key":"e_1_3_2_1_7_1","first-page":"220","article-title":"A detection scheme of clone attack based on clustering in wireless sensor networks","volume":"27","author":"Luo Y.","year":"2014","journal-title":"Chinese Journal of Sensors & Actuators"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2012.38"},{"volume-title":"Region 10 Symposium. 347--350","year":"2014","author":"Tan Poh Ling","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Fan Jiang and Lin Zheng. 2016. TPSN-RBS joint time synchronization algorithm for wireless sensor networks. Transducer & Microsystem Technologies (2016).  Fan Jiang and Lin Zheng. 2016. TPSN-RBS joint time synchronization algorithm for wireless sensor networks. Transducer & Microsystem Technologies (2016)."},{"key":"e_1_3_2_1_11_1","first-page":"1976","article-title":"Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks","volume":"3","author":"Hu Yih Chun","year":"2003","journal-title":"Proceedings of Infocom IEEE"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"e_1_3_2_1_13_1","unstructured":"Dong Sheng Shi. 2014. Clustering data gathering scheme based on hybrid CS in WSN. Application Research of Computers (2014).  Dong Sheng Shi. 2014. Clustering data gathering scheme based on hybrid CS in WSN. Application Research of Computers (2014)."}],"event":{"name":"CSAI '18: 2018 2nd International Conference on Computer Science and Artificial Intelligence","sponsor":["Shenzhen University Shenzhen University"],"location":"Shenzhen China","acronym":"CSAI '18"},"container-title":["Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297226","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297156.3297226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:14Z","timestamp":1750208534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,8]]},"references-count":13,"alternative-id":["10.1145\/3297156.3297226","10.1145\/3297156"],"URL":"https:\/\/doi.org\/10.1145\/3297156.3297226","relation":{},"subject":[],"published":{"date-parts":[[2018,12,8]]},"assertion":[{"value":"2018-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}