{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:06Z","timestamp":1740149046255,"version":"3.37.3"},"reference-count":33,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702066","11747125","KJZD-M201900601","cstc2017jcyjAX0256","cstc2018jcyjAX0154","cqupt-mct-201901"],"award-info":[{"award-number":["61702066","11747125","KJZD-M201900601","cstc2017jcyjAX0256","cstc2018jcyjAX0154","cqupt-mct-201901"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702066","11747125","KJZD-M201900601","cstc2017jcyjAX0256","cstc2018jcyjAX0154","cqupt-mct-201901"],"award-info":[{"award-number":["61702066","11747125","KJZD-M201900601","cstc2017jcyjAX0256","cstc2018jcyjAX0154","cqupt-mct-201901"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007957","name":"Chongqing Municipal Education Commission","doi-asserted-by":"publisher","award":["61702066","11747125","KJZD-M201900601","cstc2017jcyjAX0256","cstc2018jcyjAX0154","cqupt-mct-201901"],"award-info":[{"award-number":["61702066","11747125","KJZD-M201900601","cstc2017jcyjAX0256","cstc2018jcyjAX0154","cqupt-mct-201901"]}],"id":[{"id":"10.13039\/501100007957","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013223","name":"Chongqing Research Program of Basic Research and Frontier Technology","doi-asserted-by":"publisher","award":["61702066","11747125","KJZD-M201900601","cstc2017jcyjAX0256","cstc2018jcyjAX0154","cqupt-mct-201901"],"award-info":[{"award-number":["61702066","11747125","KJZD-M201900601","cstc2017jcyjAX0256","cstc2018jcyjAX0154","cqupt-mct-201901"]}],"id":[{"id":"10.13039\/501100013223","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013223","name":"Chongqing Research Program of Basic Research and Frontier Technology","doi-asserted-by":"publisher","award":["61702066","11747125","KJZD-M201900601","cstc2017jcyjAX0256","cstc2018jcyjAX0154","cqupt-mct-201901"],"award-info":[{"award-number":["61702066","11747125","KJZD-M201900601","cstc2017jcyjAX0256","cstc2018jcyjAX0154","cqupt-mct-201901"]}],"id":[{"id":"10.13039\/501100013223","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chongqing Municipal Key Laboratory of Institutions of Higher Education","award":["61702066","11747125","KJZD-M201900601","cstc2017jcyjAX0256","cstc2018jcyjAX0154","cqupt-mct-201901"],"award-info":[{"award-number":["61702066","11747125","KJZD-M201900601","cstc2017jcyjAX0256","cstc2018jcyjAX0154","cqupt-mct-201901"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,9,22]]},"abstract":"<jats:p>This paper is dedicated to exploring the dynamical behavior of information diffusion in the Device-to-Device (D2D) communication environment for information security, so as to study how to accelerate the dissemination of beneficial information and curb the spread of malicious information. A mathematical model of information diffusion considering the combined impact of user awareness and social tie between users is proposed. The equilibrium of the model and its stability are fully analyzed. Very importantly, there is a unique (viral) equilibrium that is globally asymptotically stable without any preconditions. This means that the spread of malicious information in the D2D communication environment cannot be completely eliminated whatever measures are taken, but its diffusion scale can be controlled by adjusting the value of the equilibrium, and then the goal of pursuing the best control effect at the minimum cost can be achieved. In the same way, the dissemination scale of beneficial information can be expanded. Finally, the obtained main theoretical results are illustrated by some examples, and some suggestions are also given.<\/jats:p>","DOI":"10.1155\/2020\/8848576","type":"journal-article","created":{"date-parts":[[2020,9,23]],"date-time":"2020-09-23T00:19:10Z","timestamp":1600820350000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Exploring the Dynamical Behavior of Information Diffusion in D2D Communication Environment"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5315-2065","authenticated-orcid":true,"given":"Zufan","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"},{"name":"Chongqing Key Laboratory of Mobile Communications Technology, Chongqing 400065, China"},{"name":"Engineering Research Center of Mobile Communications, Ministry of Education, Chongqing 400065, China"}]},{"given":"Anqi","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"given":"Yinxue","family":"Yi","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"given":"Maobin","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2017.2773633"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.3390\/s19020396"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2018.1700274"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2017.2682091"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2975112"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2990365"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2017.08.008"},{"key":"8","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1155\/2018\/3745769","volume":"2018","year":"2018","journal-title":"Discrete Dynamics in Nature and Society"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2017.1600081nm"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.045"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2019.2909269"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.resconrec.2018.04.026"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.10.007"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.01.028"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-020-05562-1"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/mma.5479"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2968916"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.07.055"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.01.013"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1038\/srep29259"},{"issue":"3","key":"21","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1109\/TNSM.2019.2917512","volume":"16","year":"2019","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2964242"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-017-3986-z"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.121128"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2018.06.017"},{"key":"27","first-page":"1","volume":"67","year":"2019","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2918812"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.06.063"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1216\/rmjm\/1181072470"},{"year":"2004","key":"31"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/tsipn.2019.2900201"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.06.035"},{"volume":"188","journal-title":"Multimedia Tools and Applications","year":"2020","key":"34"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8848576.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8848576.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8848576.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,20]],"date-time":"2022-11-20T00:15:39Z","timestamp":1668903339000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8848576\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,22]]},"references-count":33,"alternative-id":["8848576","8848576"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8848576","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,9,22]]}}}