{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:23:16Z","timestamp":1763202196687,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T00:00:00Z","timestamp":1554422400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100010909","name":"Young Scientists Fund","doi-asserted-by":"publisher","award":["61100048"],"award-info":[{"award-number":["61100048"]}],"id":[{"id":"10.13039\/501100010909","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61370222"],"award-info":[{"award-number":["61370222"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005046","name":"the Natural Science Foundation of Heilongjiang Province","doi-asserted-by":"crossref","award":["F2016034"],"award-info":[{"award-number":["F2016034"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1388-2","type":"journal-article","created":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T13:03:08Z","timestamp":1554469388000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Friend and POI recommendation based on social trust cluster in location-based social networks"],"prefix":"10.1186","volume":"2019","author":[{"given":"Jinghua","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Ming","sequence":"additional","affiliation":[]},{"given":"Jinbao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,5]]},"reference":[{"key":"1388_CR1","volume-title":"Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI 2015)","author":"S. Zhao","year":"2016","unstructured":"S. Zhao, I. King, M.R. Lyu, in Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI 2015). A Surveyv of Point-of-interest Recommendation in Location-based Social Networks (SpringerNew York, 2016)."},{"issue":"1","key":"1388_CR2","doi-asserted-by":"publisher","first-page":"25588","DOI":"10.1109\/ACCESS.2018.2831247","volume":"6","author":"H. Zhou","year":"2018","unstructured":"H. Zhou, M. Ruan, C. Zhu, V.C.M. Leung, S. Xu, C. Huang, A time-ordered aggregation model-based centrality metric for mobile social networks. IEEE Access. 6(1), 25588\u201325599 (2018).","journal-title":"IEEE Access"},{"key":"1388_CR3","doi-asserted-by":"crossref","unstructured":"C. Huang, Y. Chen, S. Xu, H. Zhou, The vehicular social network (VSN)-based sharing of downloaded geo data using the credit-based clustering scheme. IEEE Access. 6(1), 2018.","DOI":"10.1109\/ACCESS.2018.2873905"},{"key":"1388_CR4","doi-asserted-by":"crossref","unstructured":"H. Zhou, H. Wang, X. Chen, X. Li, S. Xu, Data offloading techniques through vehicular ad hoc networks: a survey IEEE Access. 6(1), 65250\u201365259 (2018).","DOI":"10.1109\/ACCESS.2018.2878552"},{"issue":"5","key":"1388_CR5","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MNET.2018.1800029","volume":"32","author":"C. Zhu","year":"2018","unstructured":"C. Zhu, V.C.M. Leung, J.J.P.C. Rodrigues, L. Shu, L. Wang, H. Zhou, Social sensor cloud: framework, greenness, issues, and outlook. IEEE Network. 32(5), 100\u2013105 (2018).","journal-title":"IEEE Network"},{"key":"1388_CR6","doi-asserted-by":"publisher","first-page":"23405","DOI":"10.1109\/ACCESS.2017.2758353","volume":"5","author":"J. Zhu","year":"2017","unstructured":"J. Zhu, Y. Liu, X. Yin, et al, A New Structure Hole-based Algorithm For Influence Maximization in Large Online Social Networks. IEEE Access. 5:, 23405\u201323412 (2017).","journal-title":"IEEE Access"},{"key":"1388_CR7","unstructured":"Z. He, Z. Cai, Wang X, in Proceedings of International Conference on Distributed Computing IEEE Systems. Modeling Propagation Dynamics and Developing Optimized Countermeasures for Rumor Spreading in Online Social Networks, (2015), pp. 205\u2013214."},{"issue":"1","key":"1388_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJSNET.2017.10007412","volume":"1","author":"M. Han","year":"2017","unstructured":"M. Han, Y. Li, J. Li, et al, Maximizing influence in sensed heterogenous social network with privacy preservation. Int. J. Sensor Netw.1(1), 1 (2017).","journal-title":"Int. J. Sensor Netw."},{"key":"1388_CR9","unstructured":"J. Li, Z. Cai, M. Yan, Y. Li, in Proceedings of the 35th Annual IEEEInternational Conference on Computer Communications (INFOCOM 2016). Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization (San Francisco, 2016)."},{"key":"1388_CR10","doi-asserted-by":"crossref","unstructured":"J. Li, Z. Cai, J. Wang, et al, Truthful Incentive Mechanisms for Geographical Position Conflicting Mobile Crowdsensing Systems. IEEE Trans. Comput. Soc. Syst., 1\u201311 (2018).","DOI":"10.1109\/TCSS.2018.2797225"},{"issue":"4","key":"1388_CR11","first-page":"577","volume":"15","author":"Z. Cai","year":"2018","unstructured":"Z. Cai, Z. He, X. Guan, Y. Li, Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. IEEE Trans. Dependable Secure Comput.15(4), 577\u2013590 (2018).","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1388_CR12","first-page":"51","volume-title":"IEEE Communications Magazine","author":"X. Zheng","year":"2017","unstructured":"X. Zheng, Z. Cai, Y. Li, in IEEE Communications Magazine. Data Linkage in Smart IoTSystems: AConsideration from Privacy Perspective (ACMPiscataway, 2017), pp. 51\u201358."},{"key":"1388_CR13","doi-asserted-by":"crossref","unstructured":"X. Zheng, Z. Cai, J. Li, H. Gao, in The 36th Annual IEEEInternational Conference on Computer Communications (INFOCOM 2017) Location-Privacy-Aware. Review Publication Mechanism for Local Business Service Systems (Atlanta, 2017), pp. 1\u20139.","DOI":"10.1109\/INFOCOM.2017.8056976"},{"issue":"99","key":"1388_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TNSE.2018.2830307","volume":"PP","author":"Z. Cai","year":"2018","unstructured":"Z. Cai, X. Zheng, APrivate and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng.PP(99), 1\u20131 (2018).","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"1388_CR15","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-28635-3_17","volume-title":"Web-Age Information Management","author":"D. Zhang","year":"2012","unstructured":"D. Zhang, C. Xu, in Web-Age Information Management. A Collaborative Filtering Recommendation System by Unifying User Similarity and Item Similarity (SpringerHeidelberg, 2012), pp. 175\u2013184."},{"key":"1388_CR16","first-page":"393","volume-title":"International Conference on World Wide Web","author":"SK. Lam","year":"2004","unstructured":"SK. Lam, J. Riedl, in International Conference on World Wide Web. Shilling recommender systems for fun and profit (ACMNew York, 2004), pp. 393\u2013402."},{"issue":"2","key":"1388_CR17","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.knosys.2013.12.007","volume":"57","author":"G. Guo","year":"2014","unstructured":"G. Guo, J. Zhang, D. Thalmann, Merging trust in collaborative filtering to alleviate data sparsity and cold start. Knowl-Based Syst. 57(2), 57\u201368 (2014).","journal-title":"Knowl-Based Syst"},{"key":"1388_CR18","unstructured":"G. Guo, in ACMConference on Recommender Systems. Integrating trust and similarity to ameliorate the data sparsity and cold start for recommender systems, (2013), pp. 451\u2013454."},{"key":"1388_CR19","volume-title":"Location-Based Social Networks: Users","author":"Y. Zheng","year":"2011","unstructured":"Y. Zheng, Location-Based Social Networks: Users (Springer, New York, 2011)."},{"key":"1388_CR20","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1145\/1557019.1557067","volume-title":"Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining","author":"M. Jamali","year":"2009","unstructured":"M. Jamali, M. Ester, in Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. TrustWalker: a random walk model for combining trust-based and item-based recommendation (ACMParis, 2009), pp. 397\u2013406."},{"key":"1388_CR21","first-page":"17","volume-title":"Proceedings of the Twenty-Sixth AAAIConference on Artificial Intelligence","author":"C. Cheng","year":"2012","unstructured":"C. Cheng, H. Yang, I. King, M. RLyu, in Proceedings of the Twenty-Sixth AAAIConference on Artificial Intelligence. Fused matrix factorization with geographical and social inuence in location-based social networks (AAAI PressToronto, 2012), pp. 17\u201323."},{"key":"1388_CR22","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1007\/978-3-642-42042-9_66","volume-title":"International Conference on Neural Information Processing","author":"S. Zhao","year":"2013","unstructured":"S. Zhao, I. King, M. RLyu, in International Conference on Neural Information Processing. Capturing geographical influence in poi recommendations (SpringerBerlin, 2013), pp. 530\u2013537."},{"key":"1388_CR23","doi-asserted-by":"crossref","unstructured":"B. Liu, Y. Fu, Z. Yao, H. Xiong, in ACMSIGKDDInternational Conference on Knowledge Discovery and Data Mining. Learning geographical preferences for point-of-interest recommendation (Chicago, 2013), pp. 1043\u20131051.","DOI":"10.1145\/2487575.2487673"},{"key":"1388_CR24","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.jnca.2015.04.007","volume":"55","author":"Y. Wang","year":"2015","unstructured":"Y. Wang, G. Yin, Z. Cai, et al, A trust-based probabilistic recommendation model for social networks. J. Netw. Comput. Appl.55:, 59\u201367 (2015).","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"1388_CR25","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/2641564","volume":"32","author":"R. Forsati","year":"2014","unstructured":"R. Forsati, M. Mahdavi, M. Shamsfard, et al., Matrix factorization with explicit trust and distrust side information for improved social recommendation. ACM Trans. Inf. Syst.32(4), 17 (2014).","journal-title":"ACM Trans. Inf. Syst."},{"key":"1388_CR26","doi-asserted-by":"crossref","unstructured":"M. Ye, P. Yin, W-C. Lee, D-L. Lee, in Proceedings of the 34th international ACMSIGIR conference on Research and development in Information Retrieval. Exploiting geographical influence for collaborative point-of-interest recommendation (Beijing, 2011), pp. 325\u2013334.","DOI":"10.1145\/2009916.2009962"},{"key":"1388_CR27","doi-asserted-by":"crossref","unstructured":"D. Lian, C. Zhao, X. Xie, G. Sun, E. Chen, Y. Rui, in ACMSIGKDDInternational Conference on Knowledge Discovery and Data Mining. Geomf: joint geographical modeling and matrix factorization for point-of-interest recommendation (New York, 2014), pp. 831\u2013840.","DOI":"10.1145\/2623330.2623638"},{"issue":"4","key":"1388_CR28","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.2018.1700349","volume":"32","author":"Y. Liang","year":"2018","unstructured":"Y. Liang, Z. Cai, J. Yu, Q. Han, Y. Li, Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw.32(4), 8\u201314 (2018).","journal-title":"IEEE Netw."},{"key":"1388_CR29","first-page":"1721","volume-title":"Proceedings of the Twenty-Ninth AAAIConference on Artificial Intelligence","author":"H. Gao","year":"2015","unstructured":"H. Gao, J. Tang, X. Hu, H. Liu, in Proceedings of the Twenty-Ninth AAAIConference on Artificial Intelligence. Content-aware point of interest recommendation on location-based social networks (AAAI PressTexas, 2015), pp. 1721\u20131727."},{"key":"1388_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.05.037","volume-title":"Enhancing collaborative recommendation performance by combining user preference and trust-distrust propagation in social networks","author":"W. P. Lee","year":"2016","unstructured":"W. P. Lee, C. Y. Ma, Enhancing collaborative recommendation performance by combining user preference and trust-distrust propagation in social networks (Elsevier Science Publishers B. V., North-Holland, 2016)."},{"key":"1388_CR31","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/1518701.1518735","volume-title":"Sigchi Conference on Human Factors in Computing Systems","author":"J. Chen","year":"2009","unstructured":"J. Chen, W. Geyer, C. Dugan, et al, in Sigchi Conference on Human Factors in Computing Systems. Make new friends, but keep the old:recommending people on social networking sites (ACMBoston, 2009), pp. 201\u2013210."},{"key":"1388_CR32","first-page":"199","volume-title":"International Conference on Advances in Geographic Information Systems","author":"C. J. Bao","year":"2012","unstructured":"C. J. Bao, Y. Zheng, M. F. Mokbel, in International Conference on Advances in Geographic Information Systems. Location-based and preference-aware recommendation using sparse geo-social networking data (ACMNew York, 2012), pp. 199\u2013208."},{"key":"1388_CR33","volume-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","author":"F. Yu","year":"2017","unstructured":"F. Yu, N. Che, Z. Li, et al, in Pacific-Asia Conference on Knowledge Discovery and Data Mining. Friend Recommendation Considering Preference Coverage in Location-Based Social Networks (SpringerCham, 2017)."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1388-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1388-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1388-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T09:48:18Z","timestamp":1663235298000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1388-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,5]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1388"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1388-2","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,4,5]]},"assertion":[{"value":"11 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"89"}}