{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:22:29Z","timestamp":1740140549176,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T00:00:00Z","timestamp":1566864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T00:00:00Z","timestamp":1566864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872219"],"award-info":[{"award-number":["61872219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1538-6","type":"journal-article","created":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T14:23:48Z","timestamp":1566915828000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-aware friend finding in social network based on thumbs-up data"],"prefix":"10.1186","volume":"2019","author":[{"given":"Zewei","family":"Sun","sequence":"first","affiliation":[]},{"given":"Huaizhen","family":"Kou","sequence":"additional","affiliation":[]},{"given":"Wanli","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,27]]},"reference":[{"key":"1538_CR1","doi-asserted-by":"publisher","unstructured":"Y. Chen, N. Zhang, Y. Zhang, X. Chen, W. Wu, X. Shen, TOFFEE: task offloading and frequency scaling for energy efficiency of mobile devices in mobile edge computing. IEEE Transactions on Cloud Computing, accepted (2019). \n                    https:\/\/doi.org\/10.1109\/TCC.2019.2923692","DOI":"10.1109\/TCC.2019.2923692"},{"key":"1538_CR2","doi-asserted-by":"publisher","unstructured":"S. Wang, A. Zhou, R. Bao, C. Wu, S.S. Yau, Towards green service composition approach in the cloud. IEEE Transactions on Services Computing (2018). \n                    https:\/\/doi.org\/10.1109\/TSC.2018.2868356","DOI":"10.1109\/TSC.2018.2868356"},{"key":"1538_CR3","doi-asserted-by":"publisher","unstructured":"Y. Guo, S. Wang, A. Zhou, J. Xu, J. Yuan, C. Hus, User allocation-aware edge cloud placement in mobile edge computing. Software: Practice and Experience (2019) \n                    https:\/\/doi.org\/10.1002\/spe.2685","DOI":"10.1002\/spe.2685"},{"key":"1538_CR4","doi-asserted-by":"publisher","unstructured":"Y. Chen, N. Zhang, Y. Zhang, X. Chen, W. Wu, X. Shen, Energy efficient dynamic offloading in mobile edge computing for internet of things. IEEE Transactions on Cloud Computing (2019). \n                    https:\/\/doi.org\/10.1109\/TCC.2019.2898657","DOI":"10.1109\/TCC.2019.2898657"},{"key":"1538_CR5","doi-asserted-by":"publisher","unstructured":"S. Wang, A. Zhou, M. Yang, L. Sun, C. Hsu, F. Yang, Service composition in cyber-physical-social systems. IEEE Transactions on Emerging Topics in Computing (2017). \n                    https:\/\/doi.org\/10.1109\/TETC.2017.2675479","DOI":"10.1109\/TETC.2017.2675479"},{"key":"1538_CR6","doi-asserted-by":"publisher","unstructured":"X. Zhou, W. Liang, K. Wang, R. Huang, Q. Jin, Academic influence aware and multidimensional network analysis for research collaboration navigation based on scholarly big data. IEEE Transactions on Emerging Topics in Computing (2018). \n                    https:\/\/doi.org\/10.1109\/TETC.2018.2860051.","DOI":"10.1109\/TETC.2018.2860051."},{"key":"1538_CR7","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1016\/j.future.2018.02.050","volume":"88","author":"L Qi","year":"2018","unstructured":"L. Qi, X. Zhang, W. Dou, C. Hu, C. Yang, J. Chen, A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Future Generation Computer Systems 88, 636\u2013643 (2018)","journal-title":"Future Generation Computer Systems"},{"key":"1538_CR8","unstructured":"W. Gong, L. Qi, Y. Xu. Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wireless Communications and Mobile Computing, vol. 2018, ID 3075849, 8 pages, 2018."},{"key":"1538_CR9","doi-asserted-by":"publisher","unstructured":"S. Wang, A. Zhou, F. Yang, R. Chang, Towards network-aware service composition in the cloud. IEEE Transactions on Cloud Computing (2016). \n                    https:\/\/doi.org\/10.1109\/TCC.2016.2603504","DOI":"10.1109\/TCC.2016.2603504"},{"key":"1538_CR10","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.jpdc.2018.06.008","volume":"127","author":"S Wang","year":"2019","unstructured":"S. Wang, Y. Zhao, J. Xu, J. Yuan, C. Hsu, Edge server placement in mobile edge computing. Journal of Parallel and Distributed Computing 127, 160\u2013168 (2019)","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"6","key":"1538_CR11","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1109\/THMS.2017.2725341","volume":"48","author":"X Zhou","year":"2018","unstructured":"X. Zhou, B. Wu, Q. Jin, Analysis of user network and correlation for community discovery based on topic-aware similarity and behavioral influence. IEEE Transactions on Human-Machine Systems 48(6), 559\u2013571 (2018)","journal-title":"IEEE Transactions on Human-Machine Systems"},{"key":"1538_CR12","doi-asserted-by":"publisher","first-page":"46926","DOI":"10.1109\/ACCESS.2018.2866641","volume":"6","author":"L Qi","year":"2018","unstructured":"L. Qi, W. Dou, W. Wang, G. Li, H. Yu, S. Wan, Dynamic mobile crowdsourcing selection for electricity load forecasting. IEEE Access 6, 46926\u201346937 (2018)","journal-title":"IEEE Access"},{"key":"1538_CR13","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.future.2018.10.053","volume":"94","author":"S Zhang","year":"2019","unstructured":"S. Zhang, X. Li, Z. Tan, T. Peng, G. Wang, A caching and spatial k-anonymity driven privacy enhancement scheme in continuous location-based services. Future Generation Computer Systems. 94, 40\u201350 (2019)","journal-title":"Future Generation Computer Systems."},{"issue":"7","key":"1538_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s18072037","volume":"18","author":"L Qi","year":"2018","unstructured":"L. Qi, S. Meng, X. Zhang, R. Wang, X. Xu, Z. Zhou, W. Dou, An exception handling approach for privacy-preserving service recommendation failure in a cloud environment. Sensors 18(7), 1\u201311 (2018)","journal-title":"Sensors"},{"key":"1538_CR15","doi-asserted-by":"publisher","unstructured":"S. Zhang, X. Mao, K.K.R. Choo, T. Peng, G. Wang, A trajectory privacy-preserving scheme based on a dual-k mechanism for continuous location-based services. Information Sciences. (2019). \n                    https:\/\/doi.org\/10.1016\/j.ins.2019.05.054","DOI":"10.1016\/j.ins.2019.05.054"},{"key":"1538_CR16","doi-asserted-by":"crossref","unstructured":"Y. Xu, L. Qi, W. Dou, J. Yu, Privacy-preserving and scalable service recommendation based on simhash in a distributed cloud environment. Complexity (2017) Article ID 3437854, 9 pages, 2017","DOI":"10.1155\/2017\/3437854"},{"key":"1538_CR17","unstructured":"S. Caitlin and G. Levin. Simhash: Hash-based similarity detection. Available: www.googlecode.com \/ sun \/ trunk \/ paper\/Sim Hash with Bib. pdf, 2007."},{"key":"1538_CR18","unstructured":"http:\/\/www.grouplens.org\/\n                    \n                   (accessed on 24 Mar 2019)."},{"key":"1538_CR19","doi-asserted-by":"crossref","unstructured":"G. Cao, L. Kuang, Identifying core users based on trust relationships and interest similarity in recommender system (IEEE International Conference on Web Services, New York, 2016), pp. 284\u2013291","DOI":"10.1109\/ICWS.2016.44"},{"issue":"11","key":"1538_CR20","doi-asserted-by":"publisher","first-page":"2616","DOI":"10.1109\/JSAC.2017.2760458","volume":"35","author":"L Qi","year":"2017","unstructured":"L. Qi, X. Zhang, W. Dou, Q. Ni, A distributed locality-sensitive hashing based approach for cloud service recommendation from multi-source data. IEEE Journal on Selected Areas in Communications 35(11), 2616\u20132624 (2017)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"1538_CR21","doi-asserted-by":"publisher","first-page":"4191","DOI":"10.1109\/JIOT.2018.2842470","volume":"5","author":"S Zhang","year":"2018","unstructured":"S. Zhang, G. Wang, M.Z.A. Bhuiyan, Q. Liu, A dual privacy preserving scheme in continuous location-based services. IEEE Internet of Things Journal. 5(5), 4191\u20134200 (2018)","journal-title":"IEEE Internet of Things Journal."},{"key":"1538_CR22","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.ins.2018.11.030","volume":"480","author":"L Qi","year":"2019","unstructured":"L. Qi, R. Wang, S. Li, Q. He, X. Xu, C. Hu, Time-aware distributed service recommendation with privacy-preservation. Information Sciences 480, 354\u2013364 (2019)","journal-title":"Information Sciences"},{"key":"1538_CR23","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1016\/j.future.2017.06.022","volume":"86","author":"S Zhang","year":"2018","unstructured":"S. Zhang, K.K.R. Choo, Q. Liu, G. Wang, Enhancing privacy through uniform grid and caching in location-based services. Future Generation Computer Systems 86, 881\u2013892 (2018)","journal-title":"Future Generation Computer Systems"},{"key":"1538_CR24","doi-asserted-by":"publisher","first-page":"67734","DOI":"10.1109\/ACCESS.2019.2918585","volume":"7","author":"Xiaolong Xu","year":"2019","unstructured":"X. Xu, D. Li, Z. Dai, S. Li, X. Chen, A heuristic offloading method for deep learning edge services in 5G networks. IEEE Access (2019). \n                    https:\/\/doi.org\/10.1109\/ACCESS.2019.2918585","journal-title":"IEEE Access"},{"issue":"8180451","key":"1538_CR25","first-page":"1","volume":"2018","author":"X Xu","year":"2018","unstructured":"X. Xu, R. Huang, R. Dou, Y. Li, J. Zhang, T. Huang, W. Yu, Energy-efficient cloudlet management for privacy preservation in wireless metropolitan area networks. Security and Communication Networks 2018(8180451), 1\u201313 (2018)","journal-title":"Security and Communication Networks"},{"issue":"3","key":"1538_CR26","doi-asserted-by":"publisher","first-page":"4242","DOI":"10.1109\/JIOT.2018.2875715","volume":"6","author":"Y Chen","year":"2019","unstructured":"Y. Chen, N. Zhang, Y. Zhang, X. Chen, Dynamic computation offloading in edge computing for internet of things. IEEE Internet of Things Journal 6(3), 4242\u20134251 (2019)","journal-title":"IEEE Internet of Things Journal"},{"issue":"6421607","key":"1538_CR27","first-page":"1","volume":"2018","author":"X Xu","year":"2018","unstructured":"X. Xu, S. Fu, Q. Cai, W. Tian, W. Liu, W. Dou, X. Sun, A.X. Liu, Dynamic resource allocation for load balancing in fog environment. Wireless Communications and Mobile Computing 2018(6421607), 1\u201315 (2018)","journal-title":"Wireless Communications and Mobile Computing"},{"key":"1538_CR28","doi-asserted-by":"publisher","unstructured":"L. Qi, Y. Chen, Y. Yuan, S. Fu, X. Zhang, X. Xu, A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web Journal (2019). \n                    https:\/\/doi.org\/10.1007\/s11280-019-00684-y","DOI":"10.1007\/s11280-019-00684-y"},{"key":"1538_CR29","doi-asserted-by":"publisher","unstructured":"X. Xu, X. Zhang, M. Khan, W. Dou, S. Xue, S. Yu, A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems. Future Generation Computer Systems (2017). \n                    https:\/\/doi.org\/10.1016\/j.future.2017.08.057","DOI":"10.1016\/j.future.2017.08.057"},{"key":"1538_CR30","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.knosys.2018.02.014","volume":"147","author":"Y Zhang","year":"2018","unstructured":"Y. Zhang, Y. Zhou, F. Wang, et al., Service recommendation based on quotient space granularity analysis and covering algorithm on Spark. Knowledge-Based Systems 147, 25\u201335 (2018)","journal-title":"Knowledge-Based Systems"},{"key":"1538_CR31","doi-asserted-by":"publisher","unstructured":"Y. Zhang, K. Wang, Q. He, et al., Covering-based web service quality prediction via neighborhood-aware matrix factorization. IEEE Transactions on Services Computing (2019). \n                    https:\/\/doi.org\/10.1109\/TSC.2019.2891517","DOI":"10.1109\/TSC.2019.2891517"},{"issue":"1","key":"1538_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1550147716688696","volume":"13","author":"L Qi","year":"2017","unstructured":"L. Qi, P. Dai, J. Yu, Z. Zhou, Y. Xu, \u201cTime-location-frequency\u201d-aware internet of things service selection based on historical records. International Journal of Distributed Sensor Networks 13(1), 1\u20139 (2017)","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"2","key":"1538_CR33","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1109\/TCC.2016.2607750","volume":"7","author":"Y Chen","year":"2019","unstructured":"Y. Chen, J. Huang, C. Lin, X. Shen, Multi-objective service composition with QoS dependencies. IEEE Transactions on Cloud Computing 7(2), 537\u2013552 (2019)","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"4358536","key":"1538_CR34","first-page":"9","volume":"2017","author":"L Qi","year":"2017","unstructured":"L. Qi, J. Yu, Z. Zhou, An invocation cost optimization method for web services in cloud environment. Scientific Programming 2017(4358536), 9 (2017)","journal-title":"Scientific Programming"},{"issue":"3","key":"1538_CR35","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TSC.2014.2381493","volume":"8","author":"Y Chen","year":"2015","unstructured":"Y. Chen, J. Huang, C. Lin, J. Hu, A partial selection methodology for efficient QoS-aware service composition. IEEE Transactions on Services Computing 8(3), 384\u2013397 (2015)","journal-title":"IEEE Transactions on Services Computing"},{"issue":"1","key":"1538_CR36","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s00607-014-0413-x","volume":"98","author":"L Qi","year":"2016","unstructured":"L. Qi, W. Dou, J. Chen, Weighted principal component analysis-based service selection method for multimedia services in cloud. Computing 98(1), 195\u2013214 (2016)","journal-title":"Computing"},{"key":"1538_CR37","doi-asserted-by":"publisher","unstructured":"X. Xu, Q. Cai, G. Zhang, J. Zhang, W. Tian, X. Zhang, A.X. Liu, An incentive mechanism for crowdsourcing markets with social welfare maximization in cloud-edge computing. Concurrency and Computation: Practice and Experience (2018). \n                    https:\/\/doi.org\/10.1002\/cpe.4961","DOI":"10.1002\/cpe.4961"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1538-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1538-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1538-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T23:05:38Z","timestamp":1598396738000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1538-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,27]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1538"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1538-6","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,8,27]]},"assertion":[{"value":"3 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"211"}}