{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T06:14:46Z","timestamp":1676441686218},"reference-count":5,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2021,8,1]]},"DOI":"10.1587\/transfun.2020eal2125","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T22:12:59Z","timestamp":1613686379000},"page":"1084-1087","source":"Crossref","is-referenced-by-count":2,"title":["A Statistical Trust for Detecting Malicious Nodes in IoT Sensor Networks"],"prefix":"10.1587","volume":"E104.A","author":[{"given":"Fang","family":"WANG","sequence":"first","affiliation":[{"name":"School of Computer Science, Civil Aviation Flight University of China"}]},{"given":"Zhe","family":"WEI","sequence":"additional","affiliation":[{"name":"School of Computer Science, Civil Aviation Flight University of China"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] E.K. Wang, C.-M. Chen, D. Zhao, W.H. Ip, and K.L. Yung, \u201cA dynamic trust model in internet of things,\u201d Soft Comput., vol.24, pp.5773-5782, 2020. 10.1007\/s00500-019-04319-2","DOI":"10.1007\/s00500-019-04319-2"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] S. Filip, Y. Nakatsukasa, L.N. Trefethen, and B. Beckermann, \u201cRational minimax approximation via adaptive barycentric representations,\u201d SIAM J. Sci. Comput., vol.40, no.4, pp.A2427-A2455, 2018. 10.1137\/17m1132409","DOI":"10.1137\/17M1132409"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] Y. Cai and N. Raymond \u201cIndexing spatio-temporal trajectories with Chebyshev polynomials,\u201d Proc. ACM SIGMOD, pp.599-610, 2004. 10.1145\/1007568.1007636","DOI":"10.1145\/1007568.1007636"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] J.C. Mason and D. Handscomb, Chebyshev Polynomials, Chapman &amp; Hall, 2003. 10.1201\/9781420036114","DOI":"10.1201\/9781420036114"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] Z. Wei and F. Wang, \u201cOn mitigating on-off attacks in wirless senor networks,\u201d IEICE Trans. Fundamentals, vol.E101-A, no.1, pp.298-301, Jan. 2018. 10.1587\/transfun.e101.a.298","DOI":"10.1587\/transfun.E101.A.298"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E104.A\/8\/E104.A_2020EAL2125\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,7]],"date-time":"2021-08-07T05:02:42Z","timestamp":1628312562000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E104.A\/8\/E104.A_2020EAL2125\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,1]]},"references-count":5,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2020eal2125","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,1]]},"article-number":"2020EAL2125"}}