{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T17:12:21Z","timestamp":1770743541651,"version":"3.49.0"},"reference-count":189,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"vor","delay-in-days":212,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61773071"],"award-info":[{"award-number":["61773071"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005090","name":"Beijing Nova Program","doi-asserted-by":"publisher","award":["Z171100001117049"],"award-info":[{"award-number":["Z171100001117049"]}],"id":[{"id":"10.13039\/501100005090","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005089","name":"Beijing Municipal Natural Science Foundation","doi-asserted-by":"publisher","award":["4162044"],"award-info":[{"award-number":["4162044"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002766","name":"Beijing University of Posts and Telecommunications","doi-asserted-by":"publisher","award":["XTCX201804"],"award-info":[{"award-number":["XTCX201804"]}],"id":[{"id":"10.13039\/501100002766","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>This paper attempts to identify the requirement and the development of machine learning\u2010based mobile big data (MBD) analysis through discussing the insights of challenges in the mobile big data. Furthermore, it reviews the state\u2010of\u2010the\u2010art applications of data analysis in the area of MBD. Firstly, we introduce the development of MBD. Secondly, the frequently applied data analysis methods are reviewed. Three typical applications of MBD analysis, namely, wireless channel modeling, human online and offline behavior analysis, and speech recognition in the Internet of Vehicles, are introduced, respectively. Finally, we summarize the main challenges and future development directions of mobile big data analysis.<\/jats:p>","DOI":"10.1155\/2018\/8738613","type":"journal-article","created":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T23:38:32Z","timestamp":1533166712000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["A Survey on Machine Learning\u2010Based Mobile Big Data Analysis: Challenges and Applications"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3659-9476","authenticated-orcid":false,"given":"Jiyang","family":"Xie","sequence":"first","affiliation":[]},{"given":"Zeyu","family":"Song","sequence":"additional","affiliation":[]},{"given":"Yupeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanting","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jinnan","family":"Zhan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2950-2488","authenticated-orcid":false,"given":"Zhanyu","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Qiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6492-3846","authenticated-orcid":false,"given":"Jianhua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Guo","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,8]]},"reference":[{"key":"e_1_2_7_1_2","unstructured":"International Telecommunication Union (ITU) ICT Facts and Figures 2017 https:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Pages\/facts\/default.aspx 2017."},{"key":"e_1_2_7_2_2","unstructured":"Meeker Internet Trend 2017 http:\/\/www.kpcb.com\/internet-trends 2017."},{"key":"e_1_2_7_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6736754"},{"key":"e_1_2_7_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7474340"},{"key":"e_1_2_7_5_2","unstructured":"Cisco Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2016-2021 White Paper https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/mobile-white-paper-c11-520862.html 2017."},{"key":"e_1_2_7_6_2","doi-asserted-by":"crossref","unstructured":"GuoY. ZhangJ. andZhangY. An algorithm for analyzing the city residents\u2032 activity information through mobile big data mining Proceedings of the Joint 15th IEEE International Conference on Trust Security and Privacy in Computing and Communications 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications IEEE TrustCom\/BigDataSE\/ISPA 2016 August 2016 China 2133\u20132138 2-s2.0-85015212297.","DOI":"10.1109\/TrustCom.2016.0328"},{"key":"e_1_2_7_7_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2015.066143"},{"key":"e_1_2_7_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"e_1_2_7_9_2","doi-asserted-by":"publisher","DOI":"10.1360\/N972014-00841"},{"key":"e_1_2_7_10_2","volume-title":"Big Data: A Revolution That Will Transform How We Live, Work, and Think","author":"Mayersch\u00f6nberger V.","year":"2013"},{"key":"e_1_2_7_11_2","doi-asserted-by":"crossref","unstructured":"YaztiD. Z.andKrishnaswamyS. Mobile big data analytics: research practice and opportunities Proceedings of the 15th IEEE International Conference on Mobile Data Management IEEE MDM 2014 July 2014 Australia 1\u20132 2-s2.0-84908011088.","DOI":"10.1109\/MDM.2014.73"},{"key":"e_1_2_7_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7565185"},{"key":"e_1_2_7_13_2","doi-asserted-by":"crossref","unstructured":"LiuZ. QiY. MaZ.et al. Sentiment analysis by exploring large scale web-based Chinese short text Proceedings of the International Conference on Computer Science and Application Engineering (CSAE) 2017 21\u201323.","DOI":"10.12783\/dtcse\/csae2017\/17572"},{"key":"e_1_2_7_14_2","doi-asserted-by":"crossref","unstructured":"WangZ. QiY. LiuJ. andMaZ. User intention understanding from scratch Proceedings of the 1st International Workshop on Sensing Processing and Learning for Intelligent Machines SPLINE 2016 July 2016 Denmark 2-s2.0-84992187020.","DOI":"10.1109\/SPLIM.2016.7528398"},{"key":"e_1_2_7_15_2","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/1340973"},{"key":"e_1_2_7_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.06.012"},{"key":"e_1_2_7_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.03.017"},{"key":"e_1_2_7_18_2","first-page":"1","article-title":"Message from the president: the era of big data","volume":"18","author":"Jordan M.","year":"2011","journal-title":"ISBA Bull"},{"key":"e_1_2_7_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2605067"},{"key":"e_1_2_7_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2245661"},{"key":"e_1_2_7_21_2","article-title":"Robust online matrix factorization for dynamic background subtraction","author":"Yong H.","year":"2017","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_2_7_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2017.2767290"},{"key":"e_1_2_7_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2018.2806844"},{"key":"e_1_2_7_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2017.2672403"},{"key":"e_1_2_7_25_2","doi-asserted-by":"crossref","unstructured":"ZhangG.andHeusdensR. Linear coordinate-descent message passing for quadratic optimization Proceedings of the International Conference on Acoustics Speech and Signal Processing 2012 20055\u20132008 https:\/\/doi.org\/10.1162\/NECO_a_00368 MR3026531.","DOI":"10.1109\/ICASSP.2012.6288301"},{"key":"e_1_2_7_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.101413.130826"},{"key":"e_1_2_7_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2014.2353639"},{"key":"e_1_2_7_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/mci.2014.2350953"},{"key":"e_1_2_7_29_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_2_7_30_2","unstructured":"BengioY.andBengioS. Modeling high-dimensional discrete data with multi-layer neural networks Proceedings of the 13th Annual Neural Information Processing Systems Conference NIPS 1999 December 1999 USA 400\u2013406 2-s2.0-0142223338."},{"key":"e_1_2_7_31_2","first-page":"1185","volume-title":"Advances in Neural Information Processing Systems","author":"Ranzato M.","year":"2008"},{"key":"e_1_2_7_32_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"e_1_2_7_33_2","doi-asserted-by":"crossref","unstructured":"BengioY. LamblinP. PopoviciD. andLarochelleH. Greedy layer-wise training of deep networks Proceedings of the 20th Annual Conference on Neural Information Processing Systems (NIPS \u203206) December 2006 Cambridge Mass USA 153\u2013160 2-s2.0-84864073449.","DOI":"10.7551\/mitpress\/7503.003.0024"},{"key":"e_1_2_7_34_2","first-page":"1","article-title":"Exploring strategies for training deep neural networks","volume":"10","author":"Larochelle H.","year":"2009","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_7_35_2","doi-asserted-by":"crossref","unstructured":"SalakhutdinovR.andHintonG. Deep boltzmann machines 24 Proceedings of the International Conference on Artificial Intelligence and Statistics 2009 448\u2013455 https:\/\/doi.org\/10.1162\/NECO_a_00311 Zbl1247.68223.","DOI":"10.1162\/NECO_a_00311"},{"key":"e_1_2_7_36_2","first-page":"646","article-title":"Measuring invariances in deep networks","author":"Goodfellow I.","year":"2009","journal-title":"Neural Information Processing Systems"},{"key":"e_1_2_7_37_2","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7496.003.0016"},{"key":"e_1_2_7_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2013.50"},{"key":"e_1_2_7_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2010.938364"},{"key":"e_1_2_7_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2134090"},{"key":"e_1_2_7_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_2_7_42_2","doi-asserted-by":"crossref","unstructured":"SalakhutdinovR. MnihA. andHintonG. Restricted Boltzmann machines for collaborative filtering 227 Proceedings of the 24th International Conference on Machine learning (ICML \u203207) June 2007 Corvallis Oregon 791\u2013798 https:\/\/doi.org\/10.1145\/1273496.1273596 2-s2.0-34547983260.","DOI":"10.1145\/1273496.1273596"},{"key":"e_1_2_7_43_2","doi-asserted-by":"publisher","DOI":"10.1162\/NECO_a_00052"},{"key":"e_1_2_7_44_2","doi-asserted-by":"crossref","unstructured":"ZeilerM. D. TaylorG. W. andFergusR. Adaptive deconvolutional networks for mid and high level feature learning Proceedings of the 2011 IEEE International Conference on Computer Vision ICCV 2011 November 2011 Spain 2018\u20132025 2-s2.0-84856686379.","DOI":"10.1109\/ICCV.2011.6126474"},{"key":"e_1_2_7_45_2","unstructured":"EfratiA. How deep learning works at Apple beyond https:\/\/www.theinformation.com\/How-Deep-Learning-Works-at-Apple-Beyond 2013."},{"key":"e_1_2_7_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2573314"},{"key":"e_1_2_7_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2017.52"},{"key":"e_1_2_7_48_2","doi-asserted-by":"crossref","unstructured":"JiangS. WeiB. WangT. ZhaoZ. andZhangX. Big data enabled user behavior characteristics in mobile internet Proceedings of the 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP) October 2017 Nanjing 1\u20135 https:\/\/doi.org\/10.1109\/WCSP.2017.8170988.","DOI":"10.1109\/WCSP.2017.8170988"},{"key":"e_1_2_7_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2381512"},{"key":"e_1_2_7_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7474339"},{"key":"e_1_2_7_51_2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2909"},{"key":"e_1_2_7_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.10.015"},{"key":"e_1_2_7_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2707439"},{"key":"e_1_2_7_54_2","unstructured":"Texas Instruments Wireless Handset Solutions: Mobile Internet Device http:\/\/www.ti.com\/solution\/handset_smartphone 2008."},{"key":"e_1_2_7_55_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41650-017-0009-7"},{"key":"e_1_2_7_56_2","doi-asserted-by":"crossref","unstructured":"MaX. ZhangJ. ZhangY. MaZ. andZhangY. A PCA-based modeling method for wireless MIMO channel Proceedings of the 2017 IEEE Conference on Computer Communications: Workshops (INFOCOM WKSHPS) May 2017 Atlanta GA 874\u2013879 https:\/\/doi.org\/10.1109\/INFCOMW.2017.8116491.","DOI":"10.1109\/INFCOMW.2017.8116491"},{"key":"e_1_2_7_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.267"},{"key":"e_1_2_7_58_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.01.012"},{"key":"e_1_2_7_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2274044"},{"key":"e_1_2_7_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700186"},{"key":"e_1_2_7_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2771947"},{"key":"e_1_2_7_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2687041"},{"key":"e_1_2_7_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2646458"},{"key":"e_1_2_7_64_2","doi-asserted-by":"crossref","unstructured":"YuH. TanZ.-H. MaZ. andGuoJ. Adversarial network bottleneck features for noise robust speaker verification Proceedings of the 18th Annual Conference of the International Speech Communication Association INTERSPEECH 2017 August 2017 Sweden 1492\u20131496 2-s2.0-85039170548.","DOI":"10.21437\/Interspeech.2017-883"},{"key":"e_1_2_7_65_2","doi-asserted-by":"crossref","unstructured":"YuH. SarkarA. ThomsenD. A. L. TanZ.-H. MaZ. andGuoJ. Effect of multi-condition training and speech enhancement methods on spoofing detection Proceedings of the 1st International Workshop on Sensing Processing and Learning for Intelligent Machines SPLINE 2016 July 2016 Denmark 2-s2.0-84992199667.","DOI":"10.1109\/SPLIM.2016.7528399"},{"key":"e_1_2_7_66_2","doi-asserted-by":"crossref","unstructured":"YuH. MaZ. andLiM. Histogram transform model Using MFCC features for text-independent speaker identification Proceedings of the IEEE Asilomar Conference on Signals Systems 2014 500\u2013504.","DOI":"10.1109\/ACSSC.2014.7094494"},{"key":"e_1_2_7_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600319"},{"key":"e_1_2_7_68_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2014.09.048"},{"key":"e_1_2_7_69_2","first-page":"1","article-title":"How mobile devices are transforming healthcare","volume":"18","author":"West D.","year":"2012","journal-title":"Issues in Technology Innovation"},{"key":"e_1_2_7_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2613278"},{"key":"e_1_2_7_71_2","doi-asserted-by":"crossref","unstructured":"SagirogluS.andSinancD. Big data: a review Proceedings of the International Conference on Collaboration Technologies and Systems (CTS \u203213) May 2013 San Diego Calif USA IEEE 42\u201347 https:\/\/doi.org\/10.1109\/CTS.2013.6567202 2-s2.0-84883264517.","DOI":"10.1109\/CTS.2013.6567202"},{"key":"e_1_2_7_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7513867"},{"key":"e_1_2_7_73_2","doi-asserted-by":"crossref","unstructured":"HsiehH. KlyuevV. ZhaoQ. andWuS. SVR-based outlier detection and its application to hotel ranking Proceedings of the 2014 IEEE 6th International Conference on Awareness Science and Technology (iCAST) October 2014 Paris France 1\u20136 https:\/\/doi.org\/10.1109\/ICAwST.2014.6981842.","DOI":"10.1109\/ICAwST.2014.6981842"},{"key":"e_1_2_7_74_2","doi-asserted-by":"publisher","DOI":"10.7815\/ijorcs.22.2012.018"},{"key":"e_1_2_7_75_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13563-2_27"},{"key":"e_1_2_7_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2616445"},{"key":"e_1_2_7_77_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.04.023"},{"key":"e_1_2_7_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.63"},{"key":"e_1_2_7_79_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14142-8_9"},{"key":"e_1_2_7_80_2","doi-asserted-by":"crossref","unstructured":"DemchenkoY. GrossoP. de LaatC. andMembreyP. Addressing big data issues in scientific data infrastructure Proceedings of the IEEE International Conference on Collaboration Technologies and Systems (CTS \u203213) May 2013 48\u201355 https:\/\/doi.org\/10.1109\/CTS.2013.6567203 2-s2.0-84883290116.","DOI":"10.1109\/CTS.2013.6567203"},{"key":"e_1_2_7_81_2","doi-asserted-by":"crossref","unstructured":"ZhouC. JiangH. ChenY. WuL. andYiS. User interest acquisition by adding home and work related contexts on mobile big data analysis Proceedings of the IEEE INFOCOM 2016 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) April 2016 San Francisco CA USA 201\u2013206 https:\/\/doi.org\/10.1109\/INFCOMW.2016.7562072.","DOI":"10.1109\/INFCOMW.2016.7562072"},{"key":"e_1_2_7_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2014.6963798"},{"key":"e_1_2_7_83_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0032-1"},{"key":"e_1_2_7_84_2","unstructured":"SoubraD. The 3Vs that define Big Data http:\/\/www.datasciencecentral.com\/forum\/topics\/the-3vs-that-define-big-data 2012."},{"key":"e_1_2_7_85_2","doi-asserted-by":"crossref","unstructured":"MaL. NieF. andLuQ. An analysis of supply chain restructuring based on big data and mobile internet\u2014a case study of warehouse-type supermarkets Proceedings of the IEEE International Conference on Grey Systems and Intelligent Services GSIS 2015 August 2015 UK 446\u2013451 2-s2.0-84957071693.","DOI":"10.1109\/GSIS.2015.7301898"},{"key":"e_1_2_7_86_2","first-page":"60","article-title":"Big data: the management revolution","volume":"90","author":"McAfee A.","year":"2012","journal-title":"Harvard Business Review"},{"key":"e_1_2_7_87_2","doi-asserted-by":"crossref","unstructured":"LiY. ZhangJ. andMaZ. Clustering in wireless propagation channel with a statistics-based framework Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC) April 2018 Barcelona 1\u20136 https:\/\/doi.org\/10.1109\/WCNC.2018.8377218.","DOI":"10.1109\/WCNC.2018.8377218"},{"key":"e_1_2_7_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2011.2132707"},{"key":"e_1_2_7_89_2","doi-asserted-by":"crossref","unstructured":"AbeA. YamamotoK. andNakagawaS. Robust speech recognition using DNN-HMM acoustic model combining noise-aware training with spectral subtraction Proceedings of the 16th Annual Conference of the International Speech Communication Association INTERSPEECH 2015 September 2015 Germany 2849\u20132853 2-s2.0-84959084364.","DOI":"10.21437\/Interspeech.2015-599"},{"key":"e_1_2_7_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2291240"},{"key":"e_1_2_7_91_2","doi-asserted-by":"crossref","unstructured":"NarayananA.andWangD. Ideal ratio mask estimation using deep neural networks for robust speech recognition Proceedings of the 2013 38th IEEE International Conference on Acoustics Speech and Signal Processing ICASSP 2013 May 2013 Canada 7092\u20137096 2-s2.0-84890493989.","DOI":"10.1109\/ICASSP.2013.6639038"},{"key":"e_1_2_7_92_2","article-title":"Invariant representations for noisy speech recognition","author":"Serdyuk D.","year":"2016","journal-title":"Computation and Language"},{"key":"e_1_2_7_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054155"},{"key":"e_1_2_7_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1972.1054809"},{"key":"e_1_2_7_95_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014043630878"},{"key":"e_1_2_7_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.188"},{"key":"e_1_2_7_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190645"},{"key":"e_1_2_7_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190665"},{"key":"e_1_2_7_99_2","doi-asserted-by":"crossref","unstructured":"JordanM. I. Divide-and-conquer and statistical inference for big data Proceedings of the the 18th ACM SIGKDD international conference August 2012 Beijing China https:\/\/doi.org\/10.1145\/2339530.2339534.","DOI":"10.1145\/2339530.2339534"},{"key":"e_1_2_7_100_2","doi-asserted-by":"crossref","unstructured":"KoldaT. G.andSunJ. Scalable tensor decompositions for multi-aspect data mining Proceedings of the 8th IEEE International Conference on Data Mining ICDM 2008 December 2008 Italy 363\u2013372 2-s2.0-67049173946.","DOI":"10.1109\/ICDM.2008.89"},{"key":"e_1_2_7_101_2","doi-asserted-by":"crossref","unstructured":"WahbaG. Dissimilarity data in statistical model building and machine learning Proceedings of the 5th International Congress of Chinese Mathematicians 2012 785\u2013809 MR2918029.","DOI":"10.1090\/amsip\/051.2\/19"},{"key":"e_1_2_7_102_2","doi-asserted-by":"crossref","unstructured":"HoiS. C. WangJ. ZhaoP. andJinR. Online feature selection for mining big data Proceedings of the 1st International Workshop on Big Data Streams and Heterogeneous Source Mining: Algorithms Systems Programming Models and Applications August 2012 Beijing China 93\u2013100 https:\/\/doi.org\/10.1145\/2351316.2351329.","DOI":"10.1145\/2351316.2351329"},{"key":"e_1_2_7_103_2","doi-asserted-by":"crossref","unstructured":"SagheerA. TsurutaN. TaniguchiR.-I. AritaD. andMaedaS. Fast feature extraction approach for multi-dimension feature space problems Proceedings of the 18th International Conference on Pattern Recognition ICPR 2006 August 2006 China 417\u2013420 2-s2.0-34147166580.","DOI":"10.1109\/ICPR.2006.545"},{"key":"e_1_2_7_104_2","unstructured":"AnarakiJ. R.andEftekhariM. Improving fuzzy-rough quick reduct for feature selection Proceedings of the 2011 19th Iranian Conference on Electrical Engineering ICEE 2011 May 2011 Iran 2-s2.0-80051933200."},{"key":"e_1_2_7_105_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.06.009"},{"key":"e_1_2_7_106_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00038-4"},{"key":"e_1_2_7_107_2","first-page":"1909","article-title":"Incremental support vector learning: analysis, implementation and applications","volume":"7","author":"Laskov P.","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_7_108_2","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_2_7_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2007.905855"},{"key":"e_1_2_7_110_2","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2012-0542"},{"key":"e_1_2_7_111_2","doi-asserted-by":"crossref","unstructured":"YangH.andFongS. Incrementally optimized decision tree for noisy big data Proceedings of the 1st International Workshop on Big Data Streams and Heterogeneous Source Mining: Algorithms Systems Programming Models and Applications (BigMine \u203212) August 2012 Beijing China 36\u201344 https:\/\/doi.org\/10.1145\/2351316.2351322.","DOI":"10.1145\/2351316.2351322"},{"key":"e_1_2_7_112_2","first-page":"849","article-title":"A streaming parallel decision tree algorithm","volume":"11","author":"Ben-Haim Y.","year":"2010","journal-title":"Journal of Machine Learning Research (JMLR)"},{"key":"e_1_2_7_113_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2005.12.126"},{"key":"e_1_2_7_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2010.2053356"},{"key":"e_1_2_7_115_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.01.040"},{"key":"e_1_2_7_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2011.2178124"},{"key":"e_1_2_7_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2010506"},{"key":"e_1_2_7_118_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2012.2202289"},{"key":"e_1_2_7_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2014.2325029"},{"key":"e_1_2_7_120_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"e_1_2_7_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_2_7_122_2","unstructured":"CiresanD. C. MeierU. andMasciJ. Flexible high performance convolutional neural networks for image classification Proceedings of the International Joint Conference on Artificial Intelligence 2011 1237\u20131242."},{"key":"e_1_2_7_123_2","doi-asserted-by":"crossref","unstructured":"SchererD. M\u00fcllerA. andBehnkeS. Evaluation of pooling operations in convolutional architectures for object recognition Proceedings of the International Conference on Artificial Neural Networks 2010 92\u2013101.","DOI":"10.1007\/978-3-642-15825-4_10"},{"key":"e_1_2_7_124_2","unstructured":"KrizhevskyA. SutskeverI. andHintonG. E. Imagenet classification with deep convolutional neural networks Proceedings of the 26th Annual Conference on Neural Information Processing Systems (NIPS \u203212) December 2012 Lake Tahoe Nev USA 1097\u20131105 2-s2.0-84876231242."},{"key":"e_1_2_7_125_2","first-page":"1223","volume-title":"Neural Information Processing Systems","author":"Dean J.","year":"2012"},{"key":"e_1_2_7_126_2","doi-asserted-by":"crossref","unstructured":"PapandreouG. ChenL.-C. MurphyK. P. andYuilleA. L. Weakly-and semi-supervised learning of a deep convolutional network for semantic image segmentation Proceedings of the 15th IEEE International Conference on Computer Vision ICCV 2015 December 2015 Chile 1742\u20131750 2-s2.0-84973863204.","DOI":"10.1109\/ICCV.2015.203"},{"key":"e_1_2_7_127_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-8765.2010.01109.x"},{"key":"e_1_2_7_128_2","unstructured":"SocherR. LinC. C.-Y. ManningC. D. andNgA. Y. Parsing natural scenes and natural language with recursive neural networks Proceedings of the 28th International Conference on Machine Learning (ICML \u203211) June 2011 Bellevue Wash USA 129\u2013136 2-s2.0-80053438267."},{"key":"e_1_2_7_129_2","unstructured":"KumarR. TaltonJ. O. andAhmadS. Data-driven web design Proceedings of the International Conference on Machine Learning 2012 3\u20134."},{"key":"e_1_2_7_130_2","doi-asserted-by":"crossref","unstructured":"RainaR. MadhavanA. andNgA. Y. Large-scale deep unsupervised learning using graphics processors Proceedings of the 26th International Conference On Machine Learning ICML 2009 June 2009 Canada 873\u2013880 2-s2.0-71149105669.","DOI":"10.1145\/1553374.1553486"},{"key":"e_1_2_7_131_2","unstructured":"MartensJ. Deep learning via Hessian-free optimization Proceedings of the 27th International Conference on Machine Learning (ICML \u203210) June 2010 735\u2013742 2-s2.0-77956541496."},{"key":"e_1_2_7_132_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2319813"},{"key":"e_1_2_7_133_2","doi-asserted-by":"crossref","unstructured":"DengL. YuD. andPlattJ. Scalable stacking and learning for building deep architectures Proceedings of the 2012 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP \u203212) March 2012 Kyoto Japan 2133\u20132136 https:\/\/doi.org\/10.1109\/icassp.2012.6288333 2-s2.0-84867614591.","DOI":"10.1109\/ICASSP.2012.6288333"},{"key":"e_1_2_7_134_2","doi-asserted-by":"crossref","unstructured":"KavukcuogluK. RanzatoM. FergusR. andLeCunY. Learning invariant features through topographic filter maps Proceedings of the 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops CVPR Workshops 2009 June 2009 USA 1605\u20131612 2-s2.0-70450177775.","DOI":"10.1109\/CVPR.2009.5206545"},{"key":"e_1_2_7_135_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.268"},{"key":"e_1_2_7_136_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11434-012-5203-2"},{"key":"e_1_2_7_137_2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2015.7275262"},{"key":"e_1_2_7_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7833457"},{"key":"e_1_2_7_139_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2018.2840696"},{"key":"e_1_2_7_140_2","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2794610"},{"key":"e_1_2_7_141_2","doi-asserted-by":"crossref","unstructured":"IbragimovI. Z.andAfanasyevI. M. Comparison of ROS-based visual SLAM methods in homogeneous indoor environment Proceedings of the 2017 14th Workshop on Positioning Navigation and Communications (WPNC) October 2017 Bremen 1\u20136 https:\/\/doi.org\/10.1109\/WPNC.2017.8250081.","DOI":"10.1109\/WPNC.2017.8250081"},{"key":"e_1_2_7_142_2","volume-title":"On the Induction of Decision Trees for Multiple Concept Learning","author":"Fayyad U. M.","year":"1992"},{"key":"e_1_2_7_143_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF02551274"},{"key":"e_1_2_7_144_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.04.002"},{"key":"e_1_2_7_145_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2491361"},{"key":"e_1_2_7_146_2","doi-asserted-by":"crossref","unstructured":"HalepovicE.andWilliamsonC. Characterizing and modeling user mobility in a cellular data network Proceedings of the PE-WASUN\u203205 - Second ACM International Workshop on Performance Evaluation of Wireless Ad Hoc Sensor and Ubiquitous Networks October 2005 Canada 71\u201378 2-s2.0-31844444764.","DOI":"10.1145\/1089803.1089969"},{"key":"e_1_2_7_147_2","first-page":"1","article-title":"Revealing the pulse of human dynamics in a country from mobile phone data","author":"Scepanovic S.","year":"2013","journal-title":"NetMob D4D Challenge"},{"key":"e_1_2_7_148_2","doi-asserted-by":"crossref","unstructured":"IsaacmanS. BeckerR. A. andCaceresR. Identifying important places in people\u2032s lives from cellular network data Proceedings of the International Conference on Pervasive Computing 2011 133\u2013151.","DOI":"10.1007\/978-3-642-21726-5_9"},{"key":"e_1_2_7_149_2","doi-asserted-by":"crossref","unstructured":"TrestianI. RanjanS. KuzmanovicA. andNucciA. Measuring serendipity: connecting people locations and interests in a mobile 3G network Proceedings of the 2009 9th ACM SIGCOMM Internet Measurement Conference IMC 2009 November 2009 USA 267\u2013279 2-s2.0-84877733931.","DOI":"10.1145\/1644893.1644926"},{"key":"e_1_2_7_150_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1177170"},{"key":"e_1_2_7_151_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2611654"},{"key":"e_1_2_7_152_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2553182"},{"key":"e_1_2_7_153_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40649-014-0006-z"},{"key":"e_1_2_7_154_2","doi-asserted-by":"crossref","unstructured":"B\u00f6hmerM. HechtB. Sch\u00f6ningJ. Kr\u00fcgerA. andBauerG. Falling asleep with angry birds facebook and kindle: a large scale study on mobile application usage Proceedings of the 13th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI \u203211) September 2011 47\u201356 https:\/\/doi.org\/10.1145\/2037373.2037383 2-s2.0-80054837552.","DOI":"10.1145\/2037373.2037383"},{"key":"e_1_2_7_155_2","doi-asserted-by":"crossref","unstructured":"HristovaD. MusolesiM. andMascoloC. Keep your friends close and your facebook friends closer: a multiplex network approach to the analysis of offline and online social Ties Proceedings of the 8th International Conference on Weblogs and Social Media ICWSM 2014 June 2014 USA 206\u2013215 2-s2.0-84909960955.","DOI":"10.1609\/icwsm.v8i1.14544"},{"key":"e_1_2_7_156_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2015.04.005"},{"key":"e_1_2_7_157_2","doi-asserted-by":"crossref","unstructured":"HristovaD. WilliamsM. J. MusolesiM. PanzarasaP. andMascoloC. Measuring urban social diversity using interconnected geo-social networks Proceedings of the the 25th International Conference April 2016 Canada 21\u201330 https:\/\/doi.org\/10.1145\/2872427.2883065.","DOI":"10.1145\/2872427.2883065"},{"key":"e_1_2_7_158_2","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-016-0087-z"},{"key":"e_1_2_7_159_2","unstructured":"Apache Apache software foundation http:\/\/apache.org 2017."},{"key":"e_1_2_7_160_2","doi-asserted-by":"crossref","unstructured":"GerlaM. LeeE.-K. PauG. andLeeU. Internet of vehicles: from intelligent grid to autonomous cars and vehicular clouds Proceedings of the IEEE World Forum on Internet of Things (WF-IoT \u203214) March 2014 241\u2013246 https:\/\/doi.org\/10.1109\/WF-IoT.2014.6803166 2-s2.0-84900414238.","DOI":"10.1109\/WF-IoT.2014.6803166"},{"key":"e_1_2_7_161_2","doi-asserted-by":"publisher","DOI":"10.1109\/cc.2014.6969789"},{"key":"e_1_2_7_162_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2416657"},{"key":"e_1_2_7_163_2","doi-asserted-by":"publisher","DOI":"10.1518\/001872001775870340"},{"key":"e_1_2_7_164_2","doi-asserted-by":"crossref","unstructured":"LohC. Y. BoeyK. L. andHongK. S. Speech recognition interactive system for vehicle Proceedings of the 13th IEEE International Colloquium on Signal Processing and its Applications CSPA 2017 March 2017 Malaysia 85\u201388 2-s2.0-85034819243.","DOI":"10.1109\/CSPA.2017.8064929"},{"key":"e_1_2_7_165_2","unstructured":"AmodeiD. AnanthanarayananS. andAnubhaiR. Deep speech 2: end-to-end speech recognition in English and mandarin Proceedings of the International Conference on Machine Learning 2016 173\u2013182."},{"key":"e_1_2_7_166_2","doi-asserted-by":"crossref","unstructured":"VarianiE. LeiX. McDermottE. MorenoI. L. andGonzalez-DominguezJ. Deep neural networks for small footprint text-dependent speaker verification Proceedings of the 2014 IEEE International Conference on Acoustics Speech and Signal Processing ICASSP 2014 May 2014 Italy 4052\u20134056 2-s2.0-84905252894.","DOI":"10.1109\/ICASSP.2014.6854363"},{"key":"e_1_2_7_167_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2011.2167240"},{"key":"e_1_2_7_168_2","doi-asserted-by":"crossref","unstructured":"DengL. HintonG. E. andKingsburyB. New types of deep neural network learning for speech recognition and related applications: an overview Proceedings of the 38th IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP \u203213) May 2013 Vancouver Canada IEEE 8599\u20138603 https:\/\/doi.org\/10.1109\/icassp.2013.6639344 2-s2.0-84890526837.","DOI":"10.1109\/ICASSP.2013.6639344"},{"key":"e_1_2_7_169_2","doi-asserted-by":"crossref","unstructured":"GravesA. MohamedA.-R. andHintonG. Speech recognition with deep recurrent neural networks Proceedings of the 38th IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP \u203213) May 2013 6645\u20136649 https:\/\/doi.org\/10.1109\/icassp.2013.6638947 2-s2.0-84890543083.","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_2_7_170_2","doi-asserted-by":"crossref","unstructured":"MeyerJ.andSimmerK. U. Multi-channel speech enhancement in a car environment using Wiener filtering and spectral subtraction Proceedings of the 1997 IEEE International Conference on Acoustics Speech and Signal Processing ICASSP. Part 1 (of 5) April 1997 1167\u20131170 2-s2.0-0030677479.","DOI":"10.1109\/ICASSP.1997.596150"},{"key":"e_1_2_7_171_2","doi-asserted-by":"crossref","unstructured":"HendriksR. C. HeusdensR. andJensenJ. MMSE based noise PSD tracking with low complexity Proceedings of the 2010 IEEE International Conference on Acoustics Speech and Signal Processing ICASSP 2010 March 2010 USA 4266\u20134269 2-s2.0-78049364397.","DOI":"10.1109\/ICASSP.2010.5495680"},{"key":"e_1_2_7_172_2","unstructured":"SeideF. LiG. andYuD. Conversational speech transcription using context-dependent deep neural networks 33 Proceedings of the 12th Annual Conference of the International Speech Communication Association (INTERSPEECH \u203211) August 2011 437\u2013440 2-s2.0-84865801985."},{"key":"e_1_2_7_173_2","doi-asserted-by":"crossref","unstructured":"ZeH. SeniorA. andSchusterM. Statistical parametric speech synthesis using deep neural networks Proceedings of the 38th IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP \u203213) May 2013 Vancouver Canada IEEE 7962\u20137966 https:\/\/doi.org\/10.1109\/icassp.2013.6639215 2-s2.0-84890490547.","DOI":"10.1109\/ICASSP.2013.6639215"},{"key":"e_1_2_7_174_2","doi-asserted-by":"crossref","unstructured":"DahlG. E. SainathT. N. andHintonG. E. Improving deep neural networks for LVCSR using rectified linear units and dropout Proceedings of the 38th IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP \u203213) May 2013 8609\u20138613 https:\/\/doi.org\/10.1109\/icassp.2013.6639346 2-s2.0-84890527827.","DOI":"10.1109\/ICASSP.2013.6639346"},{"key":"e_1_2_7_175_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2016.2602884"},{"key":"e_1_2_7_176_2","first-page":"2484","article-title":"Deep neural network based spectral feature mapping for robust speech recognition","author":"Han K.","year":"2015","journal-title":"INTERSPEECH"},{"key":"e_1_2_7_177_2","doi-asserted-by":"crossref","unstructured":"LiB.andSimK. C. Improving robustness of deep neural networks via spectral masking for automatic speech recognition Proceedings of the 2013 IEEE Workshop on Automatic Speech Recognition and Understanding ASRU 2013 December 2013 Czech Republic 279\u2013284 2-s2.0-84893655589.","DOI":"10.1109\/ASRU.2013.6707743"},{"key":"e_1_2_7_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2014.2364452"},{"key":"e_1_2_7_179_2","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"e_1_2_7_180_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"e_1_2_7_181_2","doi-asserted-by":"crossref","unstructured":"Abdel-HamidO. MohamedA.-R. JiangH. andPennG. Applying convolutional neural networks concepts to hybrid NN-HMM model for speech recognition Proceedings of the IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP \u203212) March 2012 IEEE 4277\u20134280 https:\/\/doi.org\/10.1109\/icassp.2012.6288864 2-s2.0-84867605836.","DOI":"10.1109\/ICASSP.2012.6288864"},{"key":"e_1_2_7_182_2","unstructured":"McLarenM. LeiY. andFerrerL. Advances in deep neural network approaches to speaker recognition Proceedings of the 40th IEEE International Conference on Acoustics Speech and Signal Processing ICASSP 2015 April 2014 Australia 4814\u20134818 2-s2.0-84946053838."},{"key":"e_1_2_7_183_2","doi-asserted-by":"crossref","unstructured":"YuC. OgawaA. DelcroixM. YoshiokaT. NakataniT. andHansenJ. H. L. Robust i-vector extraction for neural network adaptation in noisy environment Proceedings of the 16th Annual Conference of the International Speech Communication Association INTERSPEECH 2015 September 2015 Germany 2854\u20132857 2-s2.0-84959113765.","DOI":"10.21437\/Interspeech.2015-600"},{"key":"e_1_2_7_184_2","doi-asserted-by":"crossref","unstructured":"LiN. MakM.-W. andChienJ.-T. Deep neural network driven mixture of PLDA for robust i-vector speaker verification Proceedings of the 2016 IEEE Workshop on Spoken Language Technology SLT 2016 December 2016 USA 186\u2013191 2-s2.0-85016063901.","DOI":"10.1109\/SLT.2016.7846263"},{"key":"e_1_2_7_185_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13636-015-0056-7"},{"key":"e_1_2_7_186_2","doi-asserted-by":"crossref","unstructured":"McLarenM. LeiY. andSchefferN. Application of convolutional neural networks to speaker recognition in noisy conditions Proceedings of the Fifteenth Annual Conference of the International Speech Communication Association 2014.","DOI":"10.21437\/Interspeech.2014-172"},{"key":"e_1_2_7_187_2","doi-asserted-by":"crossref","unstructured":"SainathT. N. KingsburyB. andRamabhadranB. Auto-encoder bottleneck features using deep belief networks Proceedings of the 2012 IEEE International Conference on Acoustics Speech and Signal Processing ICASSP 2012 March 2012 Japan 4153\u20134156 2-s2.0-84867593213.","DOI":"10.1109\/ICASSP.2012.6288833"},{"key":"e_1_2_7_188_2","doi-asserted-by":"crossref","first-page":"2369","DOI":"10.21437\/Interspeech.2016-879","article-title":"Adversarial multi-task learning of deep neural networks for robust speech recognition","author":"Shinohara Y.","year":"2016","journal-title":"INTERSPEECH"},{"key":"e_1_2_7_189_2","doi-asserted-by":"crossref","unstructured":"LaneN. D.andGeorgievP. Can deep learning revolutionize mobile sensing? Proceedings of the the 16th International Workshop Feburary 2015 Santa Fe NM USA 117\u2013122 https:\/\/doi.org\/10.1145\/2699343.2699349.","DOI":"10.1145\/2699343.2699349"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/8738613.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/8738613.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/8738613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T04:55:00Z","timestamp":1751777700000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/8738613"}},"subtitle":[],"editor":[{"given":"Liu","family":"Liu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":189,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/8738613"],"URL":"https:\/\/doi.org\/10.1155\/2018\/8738613","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-04-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8738613"}}