参考文献
[1]LIN L,XU L,HUANG Y,et al.On exploiting priority relation graph for reliable multi-path communication in mobile social networks[J].Information Sciences,2019,3(477):490-507.
[2]QIU T,CHEN B,SANGAIAH A,et al.A survey of mobile social networks:applications,social characteristicsand challenges[J].IEEE Systems Journal,2018,12(4):3932-3947.
[3]MORENO J.Who shall survive?A new approach to the problem of human interlation[J].JAMA:The Journal of the American Medical Association,1934.DOI:10.1037/10648-000.
[4]ERDOS P,RENYI A.On the evolution of random graph[J].Publications of the Mathematical Institute of the Hungarian Academy of Sciences,1961,5(1):17-60.
[5]KARKI B,HAMALAINEN A,PORRAS J.Social networking on mobile environment[C]// Proceedings of the ACM/IFIP/USENIX Middleware’08 Conference Companion.[S.l.]:[s.n.],2008:93-94.
[6]DONG Z,SONG G,XIE K,et al.An experimental study of large-scale mobile social network[C]// Proceedings of the 18th International Conference on World Wide Web.[S.l.]:[s.n.], 2009:1175-1176.
[7]YU W,SIDDIQUI A.Towards a wireless mobile social network system design in healthcare[C]//2009 Third International Conference on Multimedia and Ubiquitous Engineering.[S.l.]:[s.n.], 2009:429-436.
[8]HU X,CHU T,LEUNG V,et al.A survey on mobile social networks:applications,platforms,system architecturesand future research directions[J].IEEE Communications Surveys and Tutorials,2015,17(3):1557-1581.
[9]MAO Z,JIANG Y,MIN G,et al.Mobile social networks:design requirements,architectureand state-of-the-art technology[J].Computer Communications,2017,100:1-19.
[10]TULU M,MKIRAMWENI M,HOU R,et al.Influential nodes selection to enhance data dissemination in mobile social networks:a survey[J].Journal of Network and Computer Application,2020,169:102768.
[11]NIKOLAOS V,KUN Y.Mobile social networks:architectures,social propertiesand key research challenges[J].IEEE Communications Surveys and Tutorials,2013,15(3):1355-1371.
[12]ZHANG K,NI J,YANG K,et al.Security and privacy in smartcity applications:challenges and solutions[J].IEEE Communications Magazine,2017,55(1):122-129.
[13]ZHANG K,LIANG X,NI J,et al.Exploiting social network to enhance human-to-human infection analysis without privacy leakage[J].IEEE Transactions on Dependable and Secure Computing,2018,15(4):607-619.
[14]ZHANG K,LIANG X,LU R,et al.PIF:A personalized fine-grained spam filtering scheme with privacy preservation in mobile social networks[J].IEEE Transactions on Computational Social Systems,2015,2(3):41-52.
[15]ZHANG K,YANG K,LIANG X,et al.Security and privacy formobile healthcare networks from quality-of-protection perspective[J].IEEE Wireless Communications,2015,22(4):104-112.
[16]HE Q,LEI Z,WANG X,et al.An effective scheme to address influence maximization for opinion formation in social networks[J].Transactions on Emerging Telecommunications Technologies,2019,30(6):e3599.
[17]SHI J,WANG X,HUANG M,et al.Information-centric routing in MSN based on community detection[J].Transactions on Emerging Telecommunications Technologies,2019,30(1):e3554.
[18]YANG S,WANG X,ZHANG S,et al.Trust-based security routing mechanism in mobile social networks[J].Neural Computing and Application,2020,32(10):5609-5620.
[19]HE Q,SUN L,WANG X,et al.Positive opinion maximization in signed social networks[J].Information Science,2021,558:34-49.
[20]陈卫.大数据网络传播模型和算法[M].北京:人民邮电出版社,2020.
[21]CHEN W,CASTILLO C,LAKSHMANAN L.Information and influence propagation in social networks[M].[S.l.]:Synthesis Lectures on Data Management,Morgan & Claypool Publishers ,2013:1-177.
[22]SERINA C,EMMA P,WEI K,et al.Mobility network models of COVID-19 explain inequities and inform reopening[J].Nature,2021,589(7840):82-87.
[23]MILINA B,PILEGGI S,PALAU C,et al.A social framework for content distribution in mobile transient networks[C]//Proceedings of the third international workshop on Use of P2P,grid and agents for the development of content networks.Piscataway:IEEE,2008:29-36.
[24]CHANG Y,LIU H,WANG T.Mobile social assistive technology:a case study in supported employment for people with serve mental illness[C]//Third International Conference on Convergence and Hybird Information Technology.[S.l.]:IEEE Computer Society,2008,1:442-447.
[25]GALINDO L,MORO D,LOZANO D.The social network behind telecom networks[C]// Proceedings of W3C Workshop Future Social Network.[S.l.]:[s.n.],2009:1-4.
[26]COHEN R,RAZ D.Cost-effective resource allocation of overlay routing relay nodes[J].IEEE/ACM Transactions on Networking,2014,22(2):636-646.
[27]GAO W,CAO G,PORTA T,et al.On exploiting transient social contact patterns for data forwarding in delay-tolerant networks[J].IEEE Transactions on Mobile Computing,2013,12(1):151-165.
[28]GAO L,LI M,BONTI A,et al.Multidimensional routing protocol in human-associated delay-tolerant networks[J].IEEE Transactions on Mobile Computing,2013,12(11):2132-2144.
[29]GAO W,LI Q,ZHAO B,et al.Social-aware multicast in disruption-tolerant networks[J].IEEE/ACM Transactions on Networking,2012,20(5):1553-1566.
[30]KOSTA S,MEI A,STEFA J.Large-scale synthetic social mobile networks with SWIM[J].IEEE Transactions on Mobile Computing,2014,13(1):116-129.
[31]LEE C,EUN D.On the forwarding performance under heterogeneous contact dynamics in mobile opportunistic networks[J].IEEE Transactions on Mobile Computing,2013,12(6):1107-1119.
[32]XIAO M,WU J,HUANG L.Community-aware opportunistic routing in mobile social networks[J].IEEE Transactions on Computers,2014,63(7):1682-1695.
[33]ZHANG X,NEGLIA G,KUROSE J,et al.Benefites of network coding for unicast application in disruption-tolerant networks[J].ACM/IEEE Transactions on Networking,2013,21(5):1407-1420.
[34]林丽美.拓扑图的可靠性分析及其在移动社会网络中的应用[D].福州:福建师范大学,2016.
[35]ZHOU L,LUO E,WANG G,et al.Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks[J].Information Sciences,2021,554:15-32.
[36]WEI K,LIANG X,XU K.A survey of social-aware routing protocols in delay tolerant networks:applications,taxonomy and design-related issues[J].IEEE Communications Surveys and Tutorials,2014,16(1):556-578.
[37]WANG X,CHEN M,LEUNG V,et al.Integrating social networks with mobile device-to-device services[J].IEEE Transactions on Services Computing,2021,14(4):1209-1223.
[38]ZHU Y,XU B,SHI X,et al.A survey of social-based routing in delay tolerant networks:positive and negative social effects[J].IEEE Communications Surveys and Tutorials,2013,15(1):387-401.
[39]WANG R,WANG X,HAO F,et al.Social identity-aware opportunistic routing in mobile social networks[J].Transactions on Emerging Telecommunications Technologies,2018,29(5):e3297.
[40]GAO Z,ZHOU W,WANG Y.Exploiting social relationship for secure routing in mobile social networks[C]//MILCOM 2016-2016 IEEE Military Communications Conference.Piscataway:IEEE,2016:569-575.
[41]KONG X, XIA F, NING Z, et al.Mobility dataset generation for vehicular social networks based on floating car data[J].IEEE Transactions on Vehicular Technology, 2018, 67(5): 3874-3886.
[42]冯伟.信息物理社会系统中对信任的匿名认证[D].西安:西安电子科技大学,2020.
[43]WANG Z, LIAO J, CAO Q, et al.Friendbook: a semantic-based friend recommendation system for social networks[J].IEEE Transactions on Mobile Computing, 2015, 14(3):538-551.
[44]XU J, DENG D, DEMIRYUREK U, et al.Mining the situation: spatiotemporal traffic prediction with big data[J].IEEE Journal of Selected Topics in Signal Processing, 2015, 9(4): 702-715.
[45]KONG X,XU Z,SHEN G,et al.Urban traffic congestion estimation and prediction based on floating car trajectory data[J].Future Generation Computer Systems,2016,61:97-107.
[46]YUAN N,ZHENG Y,XIE X,et al.Discovering urban functional zones using latent activity trajectories[J].IEEE Transactions on Knowledge and Data Engineering,2015,27(3):712-725.
[47]FERREIRA M,CONCEICAO H,FERNANDES R,et al.Stereoscopic aerial photography:an alternative to model-based urban mobility approaches[J].Vehicular Ad Hoc Networks, 2009:53-62.
[48]BEDOGNI L,GRAMAGLIA M,VESCO A,et al.The Bologna ringway dataset:improving road network conversion in sumo and validating urban mobility via navigation services[J].IEEE Transactions on Vehicular Technology,2015,64(12):5464-5476.
[49]KHPWAJ S, KHUWAJA P, DEV K, et al.A secure data sharing scheme in community segmented vehicular social networks for 6G[J].IEEE Transactions on Industrial Informatics,2023, 19(1): 890-899.
[50]SHEN H, ZHOU J, CAO Z, et al.Blockchain-based lightweight certificate authority for efficient privacy-preserving location-based service in vehicular social networks[J].IEEE Internet of Things Journal , 2020, 7(7): 6610-6622.
[51]CHEN B, WUL, WANG H, et al.A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks[J].IEEE Transactions on Vehicular Technology, 2020, 69(6): 5813-5825.
[52]PU Y, XIANG T, HU C, et al.An efficient blockchain-based privacy preserving scheme for vehicular social networks [J].Information Science, 2020, 540: 308-324.
[53]CHEN Y, ZHOU T, ZHOU J, et al.SAVE: efficient privacy-preserving location-based service bundle authentication in self-organizing vehicular social networks[J].IEEE Transactions on Intelligent Transportation Systems, 2022, 23(8): 11752-11766.
[54]MIKAVICAN B, KOSTIC A.Blockchain-based solutions for security, privacy and trustmanagement in vehicular networks: a survey[J].The Journal of Supercomputing, 2021, 77(9):9520-9575.
[55]GROVER J.Security of vehicular ad hoc networks using blockchain: a comprehensive review[J].Vehicular Communications, 2022, 34: 100458.
[56]LU Z, WANG Q, QU G, et al.BARS: a blockchain-based anonymous reputation system for trust management in VANETs[C]// 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE).Piscataway: IEEE, 2018: 98-103.
[57]SUN J, XIONG H, ZHANG S, et al.A secure flexible and tampering-resistant data sharing system for vehicular social networks[J].IEEE Transactions on Vehicular Technology, 2020,69(11): 12938-12950.
[58]杨泽渠.智能电网中用户数据安全及隐私保护研究[D].杭州:浙江大学,2017.
[59]PALENSKY P, DIETRICH D.Demand side management: demand response, intelligent energy systems and smart loads[J].IEEE Transactions on Industrial Informatics, 2011, 7(3): 381-388.
[60]MARTIN A,JUSTIN T.Smart metering for residential energy efficiency:the use of community based social marketing for behavioural change and smart grid introduction[J].Renewable Energy:An International Journal,2014,67:119-127.
[61]HUANG Q,LI X,ZHAO J,et al.Social networking reduces peak power consumption in smart grid[J].IEEE Transactions on Smart Grid,2015,6(3):1403-1413.
[62]CIUCIU I,ROBERT M,THARAM D.Social network of smart-metered homes and SMEs for grid-based renewable energy exchange[C]// 2012 6th IEEE International Conference on Digital Ecosystems and Technologies.Piscataway:IEEE,2012:1-6.
[63]LUO F, RANZIB G, Xibin WANG X, et al.Social information filtering-based electricity retail plan recommender system for smart grid end users[J].IEEE Transactions on Smart Grid,2019,10(1): 95-104.
[64]刁凤,张方国.智能电表的完整隐私保护系统[J].密码学报,2014,1(4):400-409.
[65]DIAO F,ZHANG F,CHENG X.A privacy-preserving smart metering scheme using linkable anonymous credential[J].IEEE Transactions on Smart Grid,2017,6(1):461-467.
[66]TSAI J,LO N.Secure anonymous key distribution scheme for smart grid[J].IEEE Transactions on Smart Grid,2016,7(2):906-914.
[67]NI J,ZHANG K,ALHARBI K,et al.Differentially private smart metering with fault tolerance and range-based filtering[J].IEEE Transactions on Smart Grid,2017,8(5):2483-2493.
[68]LI S,XUE K,YANG Q,et al.PPMA:privacy-preserving multi-subset aggregation in smart grid[J].IEEE Transactions on Industrial Informatics,2017,14(2):462-472.
[69]王海鸥.智能电网建设中的主要技术应用分析[J].高等教育前言,2021-1-25(2):225-236.
[70]施巍松,孙辉,曹杰,等.边缘计算:万物互联时代新型计算模型[J].计算机研究与发展,2017,54(5):907-924.
[71]施巍松,刘芳,孙辉.边缘计算[M].北京:科学出版社,2018.
[72]ABBAS N,ZHANG Y.Mobile edge computing:a survey[J],IEEE Internet Things,2017,5(1):450-465.