{"id":"https://openalex.org/W2904410103","doi":"https://doi.org/10.3934/mfc.2018018","title":"Relay selection based on social relationship prediction and information leakage reduction for mobile social networks","display_name":"Relay selection based on social relationship prediction and information leakage reduction for mobile social networks","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2904410103","doi":"https://doi.org/10.3934/mfc.2018018","mag":"2904410103"},"language":"en","primary_location":{"id":"doi:10.3934/mfc.2018018","is_oa":true,"landing_page_url":"https://doi.org/10.3934/mfc.2018018","pdf_url":"https://www.aimsciences.org/article/exportPdf?id=2b074275-4305-4677-9bbb-7b0e7314889d","source":{"id":"https://openalex.org/S4210238810","display_name":"Mathematical Foundations of Computing","issn_l":"2577-8838","issn":["2577-8838"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315844","host_organization_name":"American Institute of Mathematical Sciences","host_organization_lineage":["https://openalex.org/P4310315844"],"host_organization_lineage_names":["American Institute of Mathematical Sciences"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mathematical Foundations of Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.aimsciences.org/article/exportPdf?id=2b074275-4305-4677-9bbb-7b0e7314889d","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087934370","display_name":"Xiaoshuang Xing","orcid":"https://orcid.org/0000-0003-0381-1389"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xiaoshuang Xing","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007565575","display_name":"Gaofei Sun","orcid":"https://orcid.org/0000-0003-4975-9846"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gaofei Sun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025623120","display_name":"Yong Long Jin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yong Jin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101045678","display_name":"Wenyi Tang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenyi Tang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100692488","display_name":"Xiuzhen Cheng","orcid":"https://orcid.org/0000-0001-5912-4647"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiuzhen Cheng","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5087934370"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1845,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.57485536,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"1","issue":"4","first_page":"369","last_page":"382"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.841092586517334},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7378981113433838},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5845986604690552},{"id":"https://openalex.org/keywords/stochastic-game","display_name":"Stochastic game","score":0.49845075607299805},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.45766785740852356},{"id":"https://openalex.org/keywords/selection-algorithm","display_name":"Selection algorithm","score":0.4489242732524872},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.43672317266464233},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42547470331192017},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.41197165846824646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33602991700172424},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3215729594230652},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.31544575095176697}],"concepts":[{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.841092586517334},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7378981113433838},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5845986604690552},{"id":"https://openalex.org/C22171661","wikidata":"https://www.wikidata.org/wiki/Q1074380","display_name":"Stochastic game","level":2,"score":0.49845075607299805},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.45766785740852356},{"id":"https://openalex.org/C2775973920","wikidata":"https://www.wikidata.org/wiki/Q3252726","display_name":"Selection algorithm","level":3,"score":0.4489242732524872},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.43672317266464233},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42547470331192017},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.41197165846824646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33602991700172424},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3215729594230652},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.31544575095176697},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3934/mfc.2018018","is_oa":true,"landing_page_url":"https://doi.org/10.3934/mfc.2018018","pdf_url":"https://www.aimsciences.org/article/exportPdf?id=2b074275-4305-4677-9bbb-7b0e7314889d","source":{"id":"https://openalex.org/S4210238810","display_name":"Mathematical Foundations of Computing","issn_l":"2577-8838","issn":["2577-8838"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315844","host_organization_name":"American Institute of Mathematical Sciences","host_organization_lineage":["https://openalex.org/P4310315844"],"host_organization_lineage_names":["American Institute of Mathematical Sciences"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mathematical Foundations of Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3934/mfc.2018018","is_oa":true,"landing_page_url":"https://doi.org/10.3934/mfc.2018018","pdf_url":"https://www.aimsciences.org/article/exportPdf?id=2b074275-4305-4677-9bbb-7b0e7314889d","source":{"id":"https://openalex.org/S4210238810","display_name":"Mathematical Foundations of Computing","issn_l":"2577-8838","issn":["2577-8838"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315844","host_organization_name":"American Institute of Mathematical Sciences","host_organization_lineage":["https://openalex.org/P4310315844"],"host_organization_lineage_names":["American Institute of Mathematical Sciences"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mathematical Foundations of Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.5600000023841858,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2904410103.pdf","grobid_xml":"https://content.openalex.org/works/W2904410103.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2112725968","https://openalex.org/W2518911182","https://openalex.org/W2354921479","https://openalex.org/W2226591687","https://openalex.org/W2056285986","https://openalex.org/W2462272799","https://openalex.org/W2783685863","https://openalex.org/W3161834737","https://openalex.org/W2487565010","https://openalex.org/W2904410103"],"abstract_inverted_index":{"Despite":[0],"the":[1,49,70,73,76,81,87,91,114,118,121,127,130,140,143],"extensive":[2],"study":[3],"on":[4,32,79],"relay":[5,38,109,144],"selection":[6,39,110,145],"in":[7],"mobile":[8],"social":[9,82],"networks":[10],"(MSNs),":[11],"few":[12],"work":[13],"has":[14],"taken":[15],"both":[16,69,96,149],"transmission":[17],"latency":[18],"(i.e.":[19,25],"efficiency)":[20],"and":[21,36,72,98,125,152,170],"information":[22,50],"leakage":[23,51],"probability":[24,52],"security)":[26],"into":[27,100],"consideration.":[28],"Therefore":[29],"we":[30,59,102],"target":[31],"designing":[33,120],"an":[34],"efficient":[35],"secure":[37],"algorithm":[40,111,146,160],"to":[41,53,138],"enable":[42],"communication":[43],"among":[44,84,90],"legitimate":[45],"users":[46,67],"while":[47],"reducing":[48],"other":[54,162],"users.":[55],"In":[56],"this":[57],"paper,":[58],"propose":[60],"a":[61,104,166],"novel":[62],"mobility":[63],"model":[64],"for":[65],"MSN":[66],"considering":[68],"randomness":[71],"sociality":[74],"of":[75,117,129,142],"movements,":[77],"based":[78,108],"which":[80],"relationship":[83],"users,":[85,92,119],"i.e.":[86],"meeting":[88],"probabilities":[89],"are":[93],"predicted.":[94],"Taken":[95],"efficiency":[97,169],"security":[99],"consideration,":[101],"design":[103],"network":[105,132],"formation":[106],"game":[107,122],"by":[112,147,164],"defining":[113],"payoff":[115],"functions":[116],"evolving":[123],"rules,":[124],"proving":[126],"stability":[128],"formed":[131],"structure.":[133],"Extensive":[134],"simulation":[135],"is":[136],"conducted":[137],"validate":[139],"performance":[141],"using":[148],"synthetic":[150],"trace":[151],"real-world":[153],"trace.":[154],"The":[155],"results":[156],"show":[157],"that":[158],"our":[159],"outperforms":[161],"algorithms":[163],"trading":[165],"balance":[167],"between":[168],"security.":[171]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
