{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:43:36Z","timestamp":1761324216561,"version":"3.37.3"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T00:00:00Z","timestamp":1557187200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872219"],"award-info":[{"award-number":["61872219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1439-8","type":"journal-article","created":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T17:00:25Z","timestamp":1557248425000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A privacy-preserving exception handling approach for dynamic mobile crowdsourcing applications"],"prefix":"10.1186","volume":"2019","author":[{"given":"Yanwei","family":"Xu","sequence":"first","affiliation":[]},{"given":"Hanwen","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6391-8797","authenticated-orcid":false,"given":"Chao","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,7]]},"reference":[{"issue":"2","key":"1439_CR1","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TC.2013.208","volume":"64","author":"J Li","year":"2015","unstructured":"J. Li, J. Li, X. Chen, C. Jia, W. Lou, Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64(2), 425\u2013437 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"1439_CR2","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1016\/j.future.2018.02.050","volume":"88","author":"L Qi","year":"2018","unstructured":"L. Qi, X. Zhang, W. Dou, C. Hu, C. Yang, J. Chen, A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross- platform edge environment. Futur. Gener. Comput. Syst. 88, 636\u2013643 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1439_CR3","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2018.10.054","volume":"93","author":"S Ding","year":"2019","unstructured":"S. Ding, S. Qu, Y. Xi, S. Wan, A long video caption generation algorithm for big video data retrieval. Futur. Gener. Comput. Syst. 93, 583\u2013595 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1439_CR4","first-page":"8","volume":"2018","author":"W Gong","year":"2018","unstructured":"W. Gong, L. Qi, Y. Xu, Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wirel. Commun. Mob. Comput. 2018, 8 (2018) ID 3075849","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"1439_CR5","doi-asserted-by":"publisher","first-page":"46926","DOI":"10.1109\/ACCESS.2018.2866641","volume":"6","author":"L Qi","year":"2018","unstructured":"L. Qi, W. Dou, W. Wang, G. Li, H. Yu, S. Wan, Dynamic mobile crowdsourcing selection for electricity load forecasting. IEEE Access 6, 46926\u201346937 (2018)","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Y. Cheng, X. Zhou, S. Wan, K.K.R. Choo, Deep belief network for meteorological time series prediction in the internet of things. IEEE Internet Things J. (2018). https:\/\/doi.org\/10.1109\/JIOT.2018.2878477","key":"1439_CR6","DOI":"10.1109\/JIOT.2018.2878477"},{"doi-asserted-by":"crossref","unstructured":"Y. Xia, S. Qu, S. Wan, Scene guided colorization using neural networks. Neural Comput. & Applic., 1\u201314 (2018)","key":"1439_CR7","DOI":"10.1007\/s00521-018-3828-z"},{"issue":"20","key":"1439_CR8","doi-asserted-by":"publisher","first-page":"7433","DOI":"10.1109\/JSEN.2016.2581491","volume":"16","author":"S Wan","year":"2016","unstructured":"S. Wan, Y. Zhang, J. Chen, On the construction of data aggregation tree with maximizing lifetime in large-scale wireless sensor networks. IEEE Sensors J. 16(20), 7433\u20137440 (2016)","journal-title":"IEEE Sensors J."},{"unstructured":"S. Caitlin and G. Levin. Simhash: Hash-based similarity detection. Available: https:\/\/www.webrankinfo.com\/dossiers\/wp-content\/uploads\/simhash.pdf , 2007","key":"1439_CR9"},{"key":"1439_CR10","series-title":"IEEE International Conference on Computer Communications, San Francisco, CA, USA","first-page":"1","volume-title":"Crowdlet: Optimal worker recruitment for self-organized mobile crowdsourcing","author":"L Pu","year":"2016","unstructured":"L. Pu, X. Chen, J. Xu, Crowdlet: Optimal worker recruitment for self-organized mobile crowdsourcing, IEEE International Conference on Computer Communications, San Francisco, CA, USA (2016), pp. 1\u20139"},{"key":"1439_CR11","series-title":"IEEE Conference Computer Communications","first-page":"2254","volume-title":"User recruitment for mobile crowdsensing over opportunistic networks","author":"M Karaliopoulos","year":"2015","unstructured":"M. Karaliopoulos, O. Telelis, I. Koutsopoulos, User recruitment for mobile crowdsensing over opportunistic networks, IEEE Conference Computer Communications (2015), pp. 2254\u20132262"},{"issue":"9","key":"1439_CR12","doi-asserted-by":"publisher","first-page":"23361","DOI":"10.3390\/s150923361","volume":"15","author":"Y Zeng","year":"2015","unstructured":"Y. Zeng, D. Li, A self-adaptive behavior-aware recruitment scheme for participatory sensing. Sensors 15(9), 23361\u201323375 (2015)","journal-title":"Sensors"},{"key":"1439_CR13","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.adhoc.2016.02.007","volume":"43","author":"W Wang","year":"2016","unstructured":"W. Wang, H. Gao, C.H. Liu, Credible and energy-aware participant selection with limited task budget for mobile crowd sensing. Ad Hoc Netw. 43, 56\u201370 (2016)","journal-title":"Ad Hoc Netw."},{"key":"1439_CR14","series-title":"IEEE 34th International Conference on Distributed Computing Systems, Madrid, Spain","first-page":"11","volume-title":"Towards truthful mechanisms for mobile crowdsourcing with dynamic smartphones","author":"Z Feng","year":"2014","unstructured":"Z. Feng, Y. Zhu, Q. Zhang, Towards truthful mechanisms for mobile crowdsourcing with dynamic smartphones, IEEE 34th International Conference on Distributed Computing Systems, Madrid, Spain (2014), pp. 11\u201320"},{"key":"1439_CR15","series-title":"IEEE 27th International Conference on Tools with Artificial Intelligence, Vietri Sul Mare, Italy","first-page":"881","volume-title":"Truthful incentive mechanisms for dynamic and heterogeneous tasks in mobile crowdsourcing","author":"Y Fan","year":"2015","unstructured":"Y. Fan, H. Sun, X. Liu, Truthful incentive mechanisms for dynamic and heterogeneous tasks in mobile crowdsourcing, IEEE 27th International Conference on Tools with Artificial Intelligence, Vietri Sul Mare, Italy (2015), pp. 881\u2013888"},{"key":"1439_CR16","series-title":"IEEE Conference on Computer Communications, Kowloon, Hong Kong","first-page":"2074","volume-title":"Truthful online double auctions for dynamic mobile crowdsourcing","author":"Y Wei","year":"2015","unstructured":"Y. Wei, Y. Zhu, H. Zhu, Truthful online double auctions for dynamic mobile crowdsourcing, IEEE Conference on Computer Communications, Kowloon, Hong Kong (2015), pp. 2074\u20132082"},{"key":"1439_CR17","first-page":"1167","volume-title":"Truthful incentives in crowdsourcing tasks using regret minimization mechanisms. 22nd International Conference on World Wide Web, Toronto, ON","author":"A Singla","year":"2013","unstructured":"A. Singla, A. Krause, Truthful incentives in crowdsourcing tasks using regret minimization mechanisms. 22nd International Conference on World Wide Web, Toronto, ON (ACM, Canada, 2013), pp. 1167\u20131178"},{"key":"1439_CR18","series-title":"IEEE Conference on Computer Communications","first-page":"1213","volume-title":"How to crowdsource tasks truthfully without sacrificing utility: online incentive mechanisms with budget constraint","author":"D Zhao","year":"2014","unstructured":"D. Zhao, X.Y. Li, H. Ma, How to crowdsource tasks truthfully without sacrificing utility: online incentive mechanisms with budget constraint, IEEE Conference on Computer Communications (2014), pp. 1213\u20131221"},{"key":"1439_CR19","volume-title":"Frugal online incentive mechanisms for crowdsourcing tasks truthfully. arXiv preprint arXiv:1404.2399","author":"D Zhao","year":"2014","unstructured":"D. Zhao, H. Ma, L. Liu, Frugal online incentive mechanisms for crowdsourcing tasks truthfully. arXiv preprint arXiv:1404.2399 (2014)"},{"doi-asserted-by":"crossref","unstructured":"wsdream.github.io \/ .Accessed on 2018-04-11","key":"1439_CR20","DOI":"10.12987\/9780300161762-008"},{"key":"1439_CR21","series-title":"IEEE International Conference on Web Services","first-page":"241","volume-title":"A privacy-preserving QoS prediction framework for web service recommendation","author":"J Zhu","year":"2015","unstructured":"J. Zhu, P. He, Z. Zheng, M.R. Lyu, A privacy-preserving QoS prediction framework for web service recommendation, IEEE International Conference on Web Services (2015), pp. 241\u2013248"},{"key":"1439_CR22","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.compeleceng.2018.07.042","volume":"72","author":"S Wan","year":"2018","unstructured":"S. Wan, Y. Liang, Y. Zhang, Deep convolutional neural networks for diabetic retinopathy detection by image classification. Comput. Electr. Eng. 72, 274\u2013282 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"1439_CR23","first-page":"9","volume":"2017","author":"L Qi","year":"2017","unstructured":"L. Qi, J. Yu, Z. Zhou, An invocation cost optimization method for web services in cloud environment. Sci Program 2017, 9 (2017) Article ID 4358536","journal-title":"Sci Program"},{"key":"1439_CR24","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.future.2018.08.007","volume":"91","author":"S Wan","year":"2018","unstructured":"S. Wan, Y. Zhao, T. Wang, Z. Gu, Q.H. Abbasi, K.K.R. Choo, Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things. Futur. Gener. Comput. Syst. 91, 382\u2013391 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"1439_CR25","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1080\/10485252.2015.1112009","volume":"28","author":"M Wang","year":"2016","unstructured":"M. Wang, G. Tian, Robust group non-convex estimations for high-dimensional partially linear models. J. Nonparametr. Statist. 28(1), 49\u201367 (2016)","journal-title":"J. Nonparametr. Statist."},{"issue":"5","key":"1439_CR26","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1080\/02664763.2015.1078300","volume":"43","author":"X Wang","year":"2016","unstructured":"X. Wang, M. Wang, Variable selection for high-dimensional generalized linear models with the weighted elastic-net procedure. J. Appl. Stat. 43(5), 796\u2013809 (2016)","journal-title":"J. Appl. Stat."},{"key":"1439_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.na.2015.09.021","volume":"130","author":"P Wang","year":"2016","unstructured":"P. Wang, L. Zhao, Some geometrical properties of convex level sets of minimal graph on 2-dimensional riemannian manifolds. Nonlinear Anal. 130, 1\u201317 (2016)","journal-title":"Nonlinear Anal."},{"issue":"158","key":"1439_CR28","first-page":"1","volume":"2017","author":"X Wang","year":"2017","unstructured":"X. Wang, M. Wang, Adaptive group bridge estimation for high-dimensional partially linear models. J. Inequal.Appl. 2017(158), 1\u201318 (2017)","journal-title":"J. Inequal.Appl."},{"key":"1439_CR29","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.spl.2017.04.013","volume":"128","author":"X Wang","year":"2017","unstructured":"X. Wang, S. Zhao, M. Wang, Restricted profile estimation for partially linear models with large-dimensional covariates. Statist. Probab. Lett. 128, 71\u201376 (2017)","journal-title":"Statist. Probab. Lett."},{"key":"1439_CR30","doi-asserted-by":"publisher","first-page":"7448","DOI":"10.1016\/j.jde.2017.08.011","volume":"263","author":"H Tian","year":"2017","unstructured":"H. Tian, M. Han, Bifurcation of periodic orbits by perturbing high-dimensional piecewise smooth integrable systems. J. Differ. Equ. 263, 7448\u20137474 (2017)","journal-title":"J. Differ. Equ."},{"key":"1439_CR31","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.na.2014.03.002","volume":"103","author":"P Wang","year":"2014","unstructured":"P. Wang, X. Wang, The geometric properties of harmonic function on 2-dimensional Riemannian manifolds. Nonlinear Anal. 103, 2\u20138 (2014)","journal-title":"Nonlinear Anal."},{"key":"1439_CR32","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.spl.2014.02.015","volume":"89","author":"M Wang","year":"2014","unstructured":"M. Wang, X. Wang, Adaptive lasso estimators for ultrahigh dimensional generalized linear models. Statist. Probab. Lett. 89, 41\u201350 (2014)","journal-title":"Statist. Probab. Lett."},{"key":"1439_CR33","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.cam.2013.09.037","volume":"260","author":"M Wang","year":"2014","unstructured":"M. Wang, X. Wang, X. Wang, A note on the one-step estimator for ultrahigh dimensionality. J. Comput. Appl. Math. 260, 91\u201398 (2014)","journal-title":"J. Comput. Appl. Math."},{"key":"1439_CR34","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1080\/02664763.2013.840271","volume":"41","author":"G Tian","year":"2014","unstructured":"G. Tian, M. Wang, L. Song, Variable selection in the high-dimensional continuous generalized linear model with current status data. J. Appl. Stat. 41, 467\u2013483 (2014)","journal-title":"J. Appl. Stat."},{"key":"1439_CR35","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ffa.2016.11.004","volume":"44","author":"S Yang","year":"2017","unstructured":"S. Yang, Z. Yao, C. Zhao, The weight distributions of two classes of p-ary cyclic codes with few weights. Finite Fields Appl. 44, 76\u201391 (2017)","journal-title":"Finite Fields Appl."},{"issue":"4","key":"1439_CR36","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1007\/s10255-014-0446-0","volume":"30","author":"Y Wang","year":"2014","unstructured":"Y. Wang, C. Yin, X. Zhang, Uniform estimate for the tail probabilities of randomly weighted sums. Acta Math.Appl.Sin. Engl.Ser. 30(4), 1063\u20131072 (2014)","journal-title":"Acta Math.Appl.Sin. Engl.Ser."},{"key":"1439_CR37","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s12095-016-0187-4","volume":"9","author":"S Yang","year":"2017","unstructured":"S. Yang, Z. Yao, C. Zhao, A class of three-weight linear codes and their complete weight enumerators. Cryptogr. Commun. 9, 133\u2013149 (2017)","journal-title":"Cryptogr. Commun."},{"key":"1439_CR38","first-page":"211","volume":"115","author":"J Cai","year":"2014","unstructured":"J. Cai, An implicit sigma (3) type condition for heavy cycles in weighted graphs. Ars Combin. 115, 211\u2013218 (2014)","journal-title":"Ars Combin."},{"key":"1439_CR39","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s10623-016-0191-x","volume":"82","author":"S Yang","year":"2017","unstructured":"S. Yang, Z. Yao, Complete weight enumerators of a family of three-weight linear codes. Des. Codes Crypt. 82, 663\u2013674 (2017)","journal-title":"Des. Codes Crypt."},{"key":"1439_CR40","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1016\/j.disc.2016.11.029","volume":"340","author":"S Yang","year":"2017","unstructured":"S. Yang, Z. Yao, Complete weight enumerators of a class of linear codes. Discret. Math. 340, 729\u2013739 (2017)","journal-title":"Discret. Math."},{"key":"1439_CR41","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.ffa.2017.08.001","volume":"48","author":"S Yang","year":"2017","unstructured":"S. Yang, X. Kong, C. Tang, A construction of linear codes and their complete weight enumerators. Finite Fields Appl. 48, 196\u2013226 (2017)","journal-title":"Finite Fields Appl."},{"issue":"1","key":"1439_CR42","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1080\/17476933.2015.1057712","volume":"61","author":"P Li","year":"2016","unstructured":"P. Li, Two classes of linear equations of discrete convolution type with harmonic singular operators. Complex Variables Elliptic Equ. 61(1), 67\u201375 (2016)","journal-title":"Complex Variables Elliptic Equ."},{"issue":"8","key":"1439_CR43","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1080\/10236198.2012.734302","volume":"19","author":"Z Zheng","year":"2013","unstructured":"Z. Zheng, Invariance of deficiency indices under perturbation for discrete Hamiltonian systems. J.Differ. Equ. Appl. 19(8), 1243\u20131250 (2013)","journal-title":"J.Differ. Equ. Appl."},{"issue":"4","key":"1439_CR44","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.3934\/dcds.2018089","volume":"38","author":"M Han","year":"2018","unstructured":"M. Han, X. Hou, L. Sheng, C. Wang, Theory of rotated equations and applications to a population model. Discrete Continuous Dyn. Syst. A 38(4), 2171\u20132185 (2018)","journal-title":"Discrete Continuous Dyn. Syst. A"},{"key":"1439_CR45","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.dam.2013.08.026","volume":"162","author":"J Cai","year":"2014","unstructured":"J. Cai, H. Li, A new sufficient condition for pancyclability of graphs. Discret. Appl. Math. 162, 142\u2013148 (2014)","journal-title":"Discret. Appl. Math."},{"issue":"12","key":"1439_CR46","doi-asserted-by":"publisher","first-page":"2332","DOI":"10.1016\/j.disc.2015.05.031","volume":"338","author":"LL Liu","year":"2015","unstructured":"L.L. Liu, B. Zhu, Strong q-log-convexity of the Eulerian polynomials of Coxeter groups. Discret. Math. 338(12), 2332\u20132340 (2015)","journal-title":"Discret. Math."},{"key":"1439_CR47","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1186\/s13660-016-1152-7","volume":"2016","author":"H Liu","year":"2016","unstructured":"H. Liu, F. Meng, Some new generalized Volterra-Fredholm type discrete fractional sum inequalities and their applications. Journal of Inequal. Appl. 2016, 213 (2016) https:\/\/doi.org\/10.1186\/s13660-016-1152-7","journal-title":"Journal of Inequal. Appl."},{"key":"1439_CR48","first-page":"185","volume":"284","author":"P Li","year":"2016","unstructured":"P. Li, G. Ren, Some classes of equations of discrete type with harmonic singular operator and convolution. Appl. Math. Comput. 284, 185\u2013194 (2016)","journal-title":"Appl. Math. Comput."},{"unstructured":"P. Li, Singular integral equations of convolution type with hilbert kernel and a discrete jump problem. Adv.Difference Equ. 360, 1\u201313 (2017)","key":"1439_CR49"},{"key":"1439_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2010\/796256","volume":"2010","author":"Y Bai","year":"2010","unstructured":"Y. Bai, L. Liu, New oscillation criteria for second order delay differential equations with mixed nonlinearities. Discret. Dyn. Nat. Soc. 2010, 1\u20139 (2010) ID 796256)","journal-title":"Discret. Dyn. Nat. Soc."},{"key":"1439_CR51","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1016\/j.spl.2010.04.014","volume":"80","author":"Y Wang","year":"2010","unstructured":"Y. Wang, C. Yin, Approximation for the ruin probabilities in a discrete time risk model with dependent risks. Stat. Probab.Lett. 80, 1335\u20131342 (2010)","journal-title":"Stat. Probab.Lett."},{"key":"1439_CR52","first-page":"2011","volume":"47","author":"Q Feng","year":"2011","unstructured":"Q. Feng, F. Meng, Y. Zhan, Generalized gronwall bellman type discrete inequalities and their application. J. Inequal.Appl. 47, 2011 (2011)","journal-title":"J. Inequal.Appl."},{"key":"1439_CR53","doi-asserted-by":"publisher","first-page":"107182","DOI":"10.1155\/2010\/107182","volume":"2010","author":"L Wang","year":"2010","unstructured":"L. Wang, Intuitionistic fuzzy stability of a quadratic functional equation. Fixed Point Theory Appl. 2010, 107182 (2010)","journal-title":"Fixed Point Theory Appl."},{"key":"1439_CR54","doi-asserted-by":"publisher","first-page":"563136","DOI":"10.1155\/2011\/563136","volume":"2011","author":"X Du","year":"2011","unstructured":"X. Du, Z. Zhao, On fixed point theorems of mixed monotone operators. Fixed Point Theory Appl. 2011, 563136 (2011)","journal-title":"Fixed Point Theory Appl."},{"key":"1439_CR55","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.aml.2016.05.010","volume":"61","author":"B Zhu","year":"2016","unstructured":"B. Zhu, L. Liu, Y. Wu, Local and global existence of mild solutions for a class of nonlinear fractional reaction-diffusion equations with delay. Appl. Math. Lett. 61, 73\u201379 (2016)","journal-title":"Appl. Math. Lett."},{"key":"1439_CR56","doi-asserted-by":"publisher","first-page":"43021","DOI":"10.1109\/ACCESS.2018.2863050","volume":"6","author":"C Yan","year":"2018","unstructured":"C. Yan, X. Cui, L. Qi, X. Xu, X. Zhang, Privacy-aware data publishing and integration for collaborative service recommendation. IEEE ACCESS 6, 43021\u201343028 (2018)","journal-title":"IEEE ACCESS"},{"issue":"11","key":"1439_CR57","doi-asserted-by":"publisher","first-page":"2616","DOI":"10.1109\/JSAC.2017.2760458","volume":"35","author":"L Qi","year":"2017","unstructured":"L. Qi, X. Zhang, W. Dou, Q. Ni, A distributed locality-sensitive hashing based approach for cloud service recommendation from multi-source data. IEEE J.Sel. Areas Commun. 35(11), 2616\u20132624 (2017)","journal-title":"IEEE J.Sel. Areas Commun."},{"key":"1439_CR58","first-page":"9","volume":"2017","author":"Y Xu","year":"2017","unstructured":"Y. Xu, L. Qi, W. Dou, J. Yu, Privacy-preserving and scalable service recommendation based on simhash in a distributed cloud environment. Complexity 2017, 9 (2017) Article ID 3437854","journal-title":"Complexity"},{"issue":"4","key":"1439_CR59","doi-asserted-by":"publisher","first-page":"823","DOI":"10.4134\/JKMS.2011.48.4.823","volume":"48","author":"C Hou","year":"2011","unstructured":"C. Hou, Q. Meng, Continuity of (\u03b1,\u03b2)-derivations of operator algebras. J.Korean Math.Soc. 48(4), 823\u2013835 (2011)","journal-title":"J.Korean Math.Soc."},{"issue":"1","key":"1439_CR60","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11424-012-0108-3","volume":"25","author":"CQ Ma","year":"2012","unstructured":"C.Q. Ma, J.F. Zhang, On formability of linear continuous multi-agent systems. J. Syst. Sci. Complex. 25(1), 13\u201329 (2012)","journal-title":"J. Syst. Sci. Complex."},{"key":"1439_CR61","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.aml.2015.01.002","volume":"45","author":"W Helin","year":"2015","unstructured":"W. Helin, R. Rong, H. Feng, Continuous dependence property of BSDE with constraints. Appl. Math. Lett. 45, 41\u201346 (2015)","journal-title":"Appl. Math. Lett."},{"key":"1439_CR62","first-page":"321","volume":"125","author":"LL Liu","year":"2016","unstructured":"L.L. Liu, Continued fractions and the derangement polynomials of types A and B. Ars Combin. 125, 321\u2013330 (2016)","journal-title":"Ars Combin."},{"issue":"7","key":"1439_CR63","doi-asserted-by":"publisher","first-page":"3586","DOI":"10.1080\/03610926.2015.1066816","volume":"46","author":"H Feng","year":"2017","unstructured":"H. Feng, The modulus of continuity theorem for G-Brownian motion. Commun.Stat.Theory Methods 46(7), 3586\u20133598 (2017)","journal-title":"Commun.Stat.Theory Methods"},{"key":"1439_CR64","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.ins.2018.11.030","volume":"480","author":"Lianyong Qi","year":"2019","unstructured":"L. Qi, R. Wang, S. Li, Q. He, X. Xu, C. Hu, Time-aware distributed service recommendation with privacy-preservation. Inf. Sci. (2018). https:\/\/doi.org\/10.1016\/j.ins.2018.11.030","journal-title":"Information Sciences"},{"issue":"1","key":"1439_CR65","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1550147716688696","volume":"13","author":"L Qi","year":"2017","unstructured":"L. Qi, P. Dai, J. Yu, Z. Zhou, Y. Xu, \u201cTime-location-frequency\u201d-aware internet of things service selection based on historical records. Int.J.Distrib.Sens. Netw. 13(1), 1\u20139 (2017)","journal-title":"Int.J.Distrib.Sens. Netw."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1439-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1439-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1439-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T13:28:27Z","timestamp":1663421307000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1439-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,7]]},"references-count":65,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1439"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1439-8","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,5,7]]},"assertion":[{"value":"5 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"113"}}