{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:22:51Z","timestamp":1740140571891,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,9,6]],"date-time":"2016-09-06T00:00:00Z","timestamp":1473120000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"National 863 Project of China","award":["2014AA01A701"],"award-info":[{"award-number":["2014AA01A701"]}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61372113,61421061"],"award-info":[{"award-number":["61372113,61421061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0702-5","type":"journal-article","created":{"date-parts":[[2016,9,6]],"date-time":"2016-09-06T06:15:16Z","timestamp":1473142516000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Distributed coalitional game for friendly jammer selection in ultra-dense networks"],"prefix":"10.1186","volume":"2016","author":[{"given":"Ying","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhongyu","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Ruijin","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Jiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,6]]},"reference":[{"key":"702_CR1","unstructured":"Qualcomm Incorporated, The 1000x data challenge (2013). Qualcomm Incorporated. \n                    https:\/\/www.qualcomm.com\/invention\/1000x\n                    \n                  ."},{"issue":"3","key":"702_CR2","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MWC.2012.6231163","volume":"19","author":"N Saquib","year":"2012","unstructured":"N Saquib, E Hossain, BL Long, IK Dong, Interference management in OFDMA femtocell networks: issues and approaches. IEEE Wirel. Commun.19(3), 86\u201395 (2012).","journal-title":"IEEE Wirel. Commun."},{"issue":"5","key":"702_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MCOM.2014.6815894","volume":"52","author":"J Xu","year":"2014","unstructured":"J Xu, J Wang, Y Zhu, Y Yang, X Zheng, S Wang, L Liu, K Horneman, Y Teng, Cooperative distributed optimization for the hyper-dense small cell deployment. IEEE Commun. Mag.52(5), 61\u201367 (2014).","journal-title":"IEEE Commun. Mag."},{"key":"702_CR4","first-page":"4267","volume-title":"IEEE Global Communications Conference (GLOBECOM)","author":"K Hosseini","year":"2012","unstructured":"K Hosseini, H Dahrouj, R Adve, in IEEE Global Communications Conference (GLOBECOM). Distributed Clustering and Interference Management in Two-Tier Networks (IEEECalifornia, USA, 2012), pp. 4267\u20134272."},{"issue":"7","key":"702_CR5","doi-asserted-by":"publisher","first-page":"3202","DOI":"10.1109\/TWC.2013.060513.120959","volume":"12","author":"M Bennis","year":"2013","unstructured":"M Bennis, SM Perlaza, P Blasco, H Zhu, HV Poor, Self-organization in small cell networks: a reinforcement learning approach. IEEE Trans. Wirel. Commun.12(7), 3202\u20133212 (2013).","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"8","key":"702_CR6","doi-asserted-by":"publisher","first-page":"4120","DOI":"10.1109\/TVT.2013.2262955","volume":"62","author":"S Shen","year":"2013","unstructured":"S Shen, TM Lok, Dynamic power allocation for downlink interference management in a two-tier OFDMA network. IEEE Trans. Veh. Technol.62(8), 4120\u20134125 (2013).","journal-title":"IEEE Trans. Veh. Technol."},{"key":"702_CR7","first-page":"5116","volume-title":"IEEE Global Communications Conference (GLOBECOM)","author":"A Hatoum","year":"2012","unstructured":"A Hatoum, R Langar, N Aitsaadi, R Boutaba, G Pujolle, in IEEE Global Communications Conference (GLOBECOM). QoS-Based Power Control and Resource Allocation in OFDMA Femtocell Networks (IEEECalifornia, USA, 2012), pp. 5116\u20135122."},{"issue":"9","key":"702_CR8","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/LCOMM.2014.2341566","volume":"18","author":"Z Luo","year":"2014","unstructured":"Z Luo, M Ding, H Luo, Dynamic small cell on\/off scheduling using stackelberg game. IEEE Commun. Lett.18(9), 1615\u20131618 (2014).","journal-title":"IEEE Commun. Lett."},{"key":"702_CR9","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.comnet.2014.09.018","volume":"78","author":"K Son","year":"2015","unstructured":"K Son, E Oh, B Krishnamachari, Energy-efficient design of heterogeneous cellular networks from deployment to operation. Comput. Netw.78:, 95\u2013106 (2015).","journal-title":"Comput. Netw."},{"issue":"1","key":"702_CR10","first-page":"1","volume":"2015","author":"Y Wang","year":"2015","unstructured":"Y Wang, Y Zhang, Y Chen, R Wei, Energy-efficient design of two-tier femtocell networks. EURASIP J. Wirel. Commun. Netw.2015(1), 1\u201315 (2015).","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"7","key":"702_CR11","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1049\/iet-com.2013.0845","volume":"8","author":"S Hamouda","year":"2014","unstructured":"S Hamouda, M Zitoun, S Tabbane, Win\u2013win relationship between macrocell and femtocells for spectrum sharing in LTE-A. IET Commun.8(7), 1109\u20131116 (2014).","journal-title":"IET Commun."},{"issue":"4","key":"702_CR12","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1109\/JSTSP.2014.2320227","volume":"8","author":"Y Yang","year":"2014","unstructured":"Y Yang, TQ Quek, Optimal subsidies for shared small cell networks\u2014a social network perspective. IEEE J. Sel. Top. Sig. Process.8(4), 690\u2013702 (2014).","journal-title":"IEEE J. Sel. Top. Sig. Process."},{"issue":"12","key":"702_CR13","doi-asserted-by":"publisher","first-page":"2304","DOI":"10.1109\/LCOMM.2013.102113.131876","volume":"17","author":"LC Tseng","year":"2013","unstructured":"LC Tseng, FT Chien, D Zhang, RY Chang, WH Chung, C Huang, Network selection in cognitive heterogeneous networks using stochastic learning. IEEE Commun. Lett.17(12), 2304\u20132307 (2013).","journal-title":"IEEE Commun. Lett."},{"issue":"10","key":"702_CR14","doi-asserted-by":"publisher","first-page":"3484","DOI":"10.1109\/TWC.2012.081612.111361","volume":"11","author":"H-S Jo","year":"2012","unstructured":"H-S Jo, YJ Sang, P Xia, JG Andrews, Heterogeneous cellular networks with flexible cell association: A comprehensive downlink SINR analysis. IEEE Trans. Wirel. Commun.11(10), 3484\u20133495 (2012).","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"4","key":"702_CR15","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCOM.2015.7081072","volume":"53","author":"X Duan","year":"2015","unstructured":"X Duan, X Wang, Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Commun. Mag.53(4), 28\u201335 (2015).","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"702_CR16","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MWC.2012.6155875","volume":"19","author":"HV Poor","year":"2012","unstructured":"HV Poor, Information and inference in the wireless physical layer. IEEE Wirel. Commun.19(1), 40\u201347 (2012).","journal-title":"IEEE Wirel. Commun."},{"issue":"8","key":"702_CR17","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"AD Wyner, The wire-tap channel. Bell Syst. Tech. J.54(8), 1355\u20131387 (1975).","journal-title":"Bell Syst. Tech. J."},{"issue":"6","key":"702_CR18","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1109\/TIT.2008.921680","volume":"54","author":"E Tekin","year":"2008","unstructured":"E Tekin, A Yener, The general Gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming. IEEE Trans. Inf. Theory. 54(6), 2735\u20132751 (2008).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"702_CR19","doi-asserted-by":"publisher","first-page":"3693","DOI":"10.1109\/TVT.2012.2209692","volume":"61","author":"R Zhang","year":"2012","unstructured":"R Zhang, L Song, Z Han, B Jiao, Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Trans. Veh. Technol.61(8), 3693\u20133704 (2012).","journal-title":"IEEE Trans. Veh. Technol."},{"key":"702_CR20","first-page":"1","volume-title":"IEEE International Conference on Communications (ICC)","author":"R Zhang","year":"2011","unstructured":"R Zhang, L Song, Z Han, B Jiao, in IEEE International Conference on Communications (ICC). Distributed Coalition Formation of Relay and Friendly Jammers for Secure Cooperative Networks (IEEEKyoto, Japan, 2011), pp. 1\u20136."},{"issue":"3","key":"702_CR21","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TSP.2010.2092774","volume":"59","author":"G Zheng","year":"2011","unstructured":"G Zheng, L-C Choo, K-K Wong, Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans. Sig. Process.59(3), 1317\u20131322 (2011).","journal-title":"IEEE Trans. Sig. Process."},{"issue":"1","key":"702_CR22","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/TWC.2012.120412.112001","volume":"12","author":"I Stanojev","year":"2013","unstructured":"I Stanojev, A Yener, Improving secrecy rate via spectrum leasing for friendly jamming. IEEE Trans. Wirel. Commun.12(1), 134\u2013145 (2013).","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"2","key":"702_CR23","doi-asserted-by":"publisher","first-page":"1058","DOI":"10.1109\/TWC.2013.010214.130929","volume":"13","author":"N Mokari","year":"2014","unstructured":"N Mokari, S Parsaeefard, H Saeedi, P Azmi, Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users. IEEE Trans. Wirel. Commun.13(2), 1058\u20131073 (2014).","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"3","key":"702_CR24","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/TIFS.2011.2144585","volume":"6","author":"Y Wu","year":"2011","unstructured":"Y Wu, K Liu, An information secrecy game in cognitive radio networks. IEEE Trans. Inf. Forensic Secur.6(3), 831\u2013842 (2011).","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"702_CR25","first-page":"442","volume-title":"IEEE International Conference on Mobile Ad-hoc and Sensor Networks","author":"Z Han","year":"2009","unstructured":"Z Han, N Marina, M Debbah, A Hj\u00f8rungnes, in IEEE International Conference on Mobile Ad-hoc and Sensor Networks. Improved Wireless Secrecy Rate Using Distributed Auction Theory (IEEEChina, 2009), pp. 442\u2013447."},{"key":"702_CR26","first-page":"1","volume-title":"IEEE International Conference on Wireless Communications & Signal Processing (WCSP)","author":"J Yue","year":"2012","unstructured":"J Yue, B Yang, X Guan, in IEEE International Conference on Wireless Communications & Signal Processing (WCSP). Fairness-Guaranteed Pricing and Power Allocation with a Friendly Jammer Against Eavesdropping (IEEEHuangshan, China, 2012), pp. 1\u20136."},{"key":"702_CR27","first-page":"347","volume-title":"IET International Conference on Cyberspace Technology (CCT)","author":"J Qu","year":"2013","unstructured":"J Qu, Y Cai, J Lu, A Wang, J Zheng, W Yang, N Weng, in IET International Conference on Cyberspace Technology (CCT). Power Allocation Based on Stackelberg Game in a Jammer-Assisted Secure Network (IETBeijing, China, 2013), pp. 347\u2013352."},{"issue":"5","key":"702_CR28","doi-asserted-by":"publisher","first-page":"2659","DOI":"10.1109\/TWC.2014.032514.130942","volume":"13","author":"Z Zhang","year":"2014","unstructured":"Z Zhang, L Song, Z Han, W Saad, Coalitional games with overlapping coalitions for interference management in small cell networks. IEEE Trans. Wirel. Commun.13(5), 2659\u20132669 (2014).","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"1","key":"702_CR29","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/JSAC.2011.110106","volume":"29","author":"W Saad","year":"2011","unstructured":"W Saad, Z Han, A Hj\u00f8rungnes, D Niyato, E Hossain, Coalition formation games for distributed cooperation among roadside units in vehicular networks. IEEE J. Sel. Areas Commun.29(1), 48\u201360 (2011).","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"702_CR30","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1109\/JSAC.2012.120411","volume":"30","author":"F Pantisano","year":"2012","unstructured":"F Pantisano, M Bennis, W Saad, M Debbah, Spectrum leasing as an incentive towards uplink macrocell and femtocell cooperation. IEEE J. Sel. Areas Commun.30(3), 617\u2013630 (2012).","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"9","key":"702_CR31","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1109\/TMC.2010.242","volume":"10","author":"W Saad","year":"2010","unstructured":"W Saad, Z Han, Bas, T\u0327,ar, M Debbah, A Hj\u00f8rungnes, Hedonic coalition formation for distributed task allocation among wireless agents. IEEE Trans. Mob. Comput.10(9), 1327\u20131344 (2010).","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"2","key":"702_CR32","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1006\/game.2001.0877","volume":"38","author":"A Bogomolnaia","year":"2002","unstructured":"A Bogomolnaia, MO Jackson, The stability of hedonic coalition structures. Game Econ. Behav.38(2), 201\u2013230 (2002).","journal-title":"Game Econ. Behav."},{"issue":"1","key":"702_CR33","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1002\/nav.3800100126","volume":"10","author":"RM Thrall","year":"1963","unstructured":"RM Thrall, WF Lucas, N-person games in partition function form. Nav. Res. Logist. Q.10(1), 281\u2013298 (1963).","journal-title":"Nav. Res. Logist. Q."},{"key":"702_CR34","volume-title":"Game Theory: Analysis of Conflict","author":"BM Roger","year":"1991","unstructured":"BM Roger, Game Theory: Analysis of Conflict (Cambridge: Harvard University Press, USA, 1991)."},{"key":"702_CR35","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199207954.001.0001","volume-title":"A Game-theoretic Perspective on Coalition Formation","author":"D Ray","year":"2007","unstructured":"D Ray, A Game-theoretic Perspective on Coalition Formation (Oxford University Press, New York, USA, 2007)."},{"key":"702_CR36","volume-title":"Game Theory in Wireless and Communication Networks: Theory, Models, and Applications","author":"Z Han","year":"2012","unstructured":"Z Han, Game Theory in Wireless and Communication Networks: Theory, Models, and Applications (Cambridge University Press, Cambridge, UK, 2012)."},{"key":"702_CR37","unstructured":"ML Littman, in Eighteenth International Conference on Machine Learning. Friend-or-Foe Q-Learning in General-Sum Games, (2001), pp. 322\u2013328."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0702-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0702-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0702-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,30]],"date-time":"2017-04-30T20:41:59Z","timestamp":1493584919000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0702-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,6]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["702"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0702-5","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,9,6]]},"article-number":"211"}}