메뉴 건너뛰기




Volumn 7, Issue 4, 2021, Pages 632-642

Security-Aware Resource Allocation for Mobile Social Big Data: A Matching-Coalitional Game Solution

Author keywords

and coalition game; big data; matching theory; Mobile social network; security resource

Indexed keywords

BIG DATA; MOBILE TELECOMMUNICATION SYSTEMS; POPULATION STATISTICS; RESOURCE ALLOCATION;

EID: 85112727604     PISSN: None     EISSN: 23327790     Source Type: Journal    
DOI: 10.1109/TBDATA.2017.2700318     Document Type: Article
Times cited : (27)

References (51)
  • 1
    • 81855199790 scopus 로고    scopus 로고
    • Applications, architectures, and protocol design issues formobile social networks: Asurvey
    • Dec
    • N. Kayastha, D. Niyato, P. Wang, and E. Hossain, "Applications, architectures, and protocol design issues formobile social networks: Asurvey," Proc. IEEE, vol. 99, no. 12, pp. 2130-2158,Dec. 2011.
    • (2011) Proc. IEEE , vol.99 , Issue.12 , pp. 2130-2158
    • Kayastha, N.1    Niyato, D.2    Wang, P.3    Hossain, E.4
  • 2
    • 84982290703 scopus 로고    scopus 로고
    • A game theoretical incentive scheme for relay selection services in mobile social networks
    • Aug
    • Q. Xu, Z. Su, and S. Guo, "A game theoretical incentive scheme for relay selection services in mobile social networks," IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6692-6702, Aug. 2016.
    • (2016) IEEE Trans. Veh. Technol. , vol.65 , Issue.8 , pp. 6692-6702
    • Xu, Q.1    Su, Z.2    Guo, S.3
  • 3
    • 84979846189 scopus 로고    scopus 로고
    • Amobile offloading game against smart attacks
    • L. Xiao, C. Xie, T. Chen,H. Dai, andH. V. Poor, "Amobile offloading game against smart attacks," IEEEAccess, vol. 4, pp. 2281-2291, 2016.
    • (2016) IEEEAccess , vol.4 , pp. 2281-2291
    • Xiao, L.1    Xie, C.2    Chen, T.3    Dai, H.4    Poor, H.V.5
  • 4
    • 84979527744 scopus 로고    scopus 로고
    • Game theoretic resource allocation in media cloud with mobile social networks
    • Aug
    • Z. Su, Q. Xu, M. Fei, and M. Dong, "Game theoretic resource allocation in media cloud with mobile social networks," IEEE Trans. Multimedia, vol. 18, no. 8, pp. 1650-1660, Aug. 2016.
    • (2016) IEEE Trans. Multimedia , vol.18 , Issue.8 , pp. 1650-1660
    • Su, Z.1    Xu, Q.2    Fei, M.3    Dong, M.4
  • 5
    • 85018864378 scopus 로고    scopus 로고
    • Cloud storage defense against advanced persistent threats: A prospect theoretic study
    • Mar
    • L. Xiao, D. Xu, C. Xie, N. B. Mandayam, and H. V. Poor, "Cloud storage defense against advanced persistent threats: A prospect theoretic study," IEEE J. Sel. Areas Commun., vol. 35, no. 5, pp. 534-544, Mar. 2017, doi: 10.1109/JSAC.2017.2659418.
    • (2017) IEEE J. Sel. Areas Commun. , vol.35 , Issue.5 , pp. 534-544
    • Xiao, L.1    Xu, D.2    Xie, C.3    Mandayam, N.B.4    Poor, H.V.5
  • 6
    • 85067107089 scopus 로고    scopus 로고
    • Utility based data computing scheme to provide sensing service in internet of things
    • Y. Hui, Z. Su, and S. Guo, "Utility based data computing scheme to provide sensing service in internet of things," IEEE Trans. Emerging Topics Comput., 2017, doi: 10.1109/TETC.2017.2674023.
    • (2017) IEEE Trans. Emerging Topics Comput.
    • Hui, Y.1    Su, Z.2    Guo, S.3
  • 7
    • 84938351590 scopus 로고    scopus 로고
    • Epidemic information dissemination in mobile social networks in opportunistic links
    • Sep
    • Q. Xu, Z. Su, K. Zhang, P. Ren, and X. Shen, "Epidemic information dissemination in mobile social networks in opportunistic links," IEEE Trans. Emerging Topics Comput., vol. 3, no. 3, pp. 399-409, Sep. 2015.
    • (2015) IEEE Trans. Emerging Topics Comput. , vol.3 , Issue.3 , pp. 399-409
    • Xu, Q.1    Su, Z.2    Zhang, K.3    Ren, P.4    Shen, X.5
  • 8
    • 84969508563 scopus 로고    scopus 로고
    • Adaptive and channelaware detection of selective forwarding attacks in wireless sensor networks
    • May
    • J. Ren, Y. Zhamg, K. Zhang, and X. Shen, "Adaptive and channelaware detection of selective forwarding attacks in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 15, no. 5, pp. 3718-3731, May 2016.
    • (2016) IEEE Trans. Wireless Commun. , vol.15 , Issue.5 , pp. 3718-3731
    • Ren, J.1    Zhamg, Y.2    Zhang, K.3    Shen, X.4
  • 9
    • 84933054696 scopus 로고    scopus 로고
    • Content distribution over content centric mobile social network in 5G
    • Jun
    • Z. Su and Q. Xu, "Content distribution over content centric mobile social network in 5G," IEEE Commun. Mag., vol. 53, no. 6, pp. 66-72, Jun. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.6 , pp. 66-72
    • Su, Z.1    Xu, Q.2
  • 10
    • 85014107345 scopus 로고    scopus 로고
    • A survey on emerging computing paradigms for big data
    • Y. Zhang, J. Ren, J. Liu, C. Xv, H. Guo, and Y. Liu, "A survey on emerging computing paradigms for big data," Chinese J. Electron., vol. 2016, no. 1, pp. 1-12, 2017.
    • (2017) Chinese J. Electron. , vol.2016 , Issue.1 , pp. 1-12
    • Zhang, Y.1    Ren, J.2    Liu, J.3    Xv, C.4    Guo, H.5    Liu, Y.6
  • 11
    • 84933057232 scopus 로고    scopus 로고
    • A novel design for content delivery over software defined mobile social networks
    • Jul./Aug
    • Z. Su, Q. Xu, H. Zhu, and Y. Wang, "A novel design for content delivery over software defined mobile social networks," IEEE Netw., vol. 29, no. 4, pp. 62-67, Jul./Aug. 2015.
    • (2015) IEEE Netw. , vol.29 , Issue.4 , pp. 62-67
    • Su, Z.1    Xu, Q.2    Zhu, H.3    Wang, Y.4
  • 12
    • 85112702045 scopus 로고    scopus 로고
    • Cisco Visual Networking Index: Global mobile data traffic forecastupdate 2015-2020
    • Cisco Visual Networking Index: Global mobile data traffic forecastupdate 2015-2020.
  • 13
    • 84962028249 scopus 로고    scopus 로고
    • Big data in mobile social networks: A QoE-oriented framework
    • Jan./Feb
    • Z. Su, Q. Xu, and Q. Qi, "Big data in mobile social networks: A QoE-oriented framework," IEEE Netw., vol. 30, no. 1, pp. 52-57, Jan./Feb. 2016.
    • (2016) IEEE Netw. , vol.30 , Issue.1 , pp. 52-57
    • Su, Z.1    Xu, Q.2    Qi, Q.3
  • 14
    • 84994525119 scopus 로고    scopus 로고
    • Exploiting secure and energy efficient collaborative spectrum sensing for cognitive radio sensor networks
    • Oct
    • J. Ren, Y. Zhamg, Q. Ye, K. Yang, K. Zhang, and X. Shen, "Exploiting secure and energy efficient collaborative spectrum sensing for cognitive radio sensor networks," IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6813-6827, Oct. 2016.
    • (2016) IEEE Trans. Wireless Commun. , vol.15 , Issue.10 , pp. 6813-6827
    • Ren, J.1    Zhamg, Y.2    Ye, Q.3    Yang, K.4    Zhang, K.5    Shen, X.6
  • 15
    • 85017258278 scopus 로고    scopus 로고
    • A resource allocation model based on double-sided combinational auctions for transparent computing
    • J. Wang, A. Liu, T. Yan, and Z. Zeng, "A resource allocation model based on double-sided combinational auctions for transparent computing," Peer-to-Peer Netw. Appl., doi: 10.1007/s12083-017-0556-6, pp. 1-8, 2017.
    • (2017) Peer-to-Peer Netw. Appl. , pp. 1-8
    • Wang, J.1    Liu, A.2    Yan, T.3    Zeng, Z.4
  • 16
    • 84940523433 scopus 로고    scopus 로고
    • Security and privacy for mobile healthcare networks: From a quality of protection perspective
    • Aug
    • K. Zhang, K. Yang, X. Liang, Z. Su, and X. She, "Security and privacy for mobile healthcare networks: From a quality of protection perspective," IEEE Wireless Commun., vol. 22, no. 4, pp. 104-112, Aug. 2015.
    • (2015) IEEE Wireless Commun. , vol.22 , Issue.4 , pp. 104-112
    • Zhang, K.1    Yang, K.2    Liang, X.3    Su, Z.4    She, X.5
  • 17
    • 84939233387 scopus 로고    scopus 로고
    • Security and privacy in mobile croudsourcing networks: Challenges and opportunities
    • Aug
    • K. Yang, K. Zhang, J. Ren, and X. Shen, "Security and privacy in mobile croudsourcing networks: Challenges and opportunities," IEEE Commun. Mag., vol. 53, no. 8, pp. 75-81, Aug. 2016.
    • (2016) IEEE Commun. Mag. , vol.53 , Issue.8 , pp. 75-81
    • Yang, K.1    Zhang, K.2    Ren, J.3    Shen, X.4
  • 18
    • 85029331493 scopus 로고    scopus 로고
    • A reinforcement learning-based data storage scheme for vehicular Ad Hoc networks
    • C.Wu, T. Yoshinaga, Y. Ji, T.Murase, and Y. Zhang, "A reinforcement learning-based data storage scheme for vehicular Ad Hoc networks," IEEE Trans. Veh. Technol., 2016, Doi: 10.1109/TVT.2016.2643665.
    • (2016) IEEE Trans. Veh. Technol.
    • Wu, C.1    Yoshinaga, T.2    Ji, Y.3    Murase, T.4    Zhang, Y.5
  • 19
    • 85015763182 scopus 로고    scopus 로고
    • On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices
    • D. Wang, H. Cheng, D. He, and P. Wang, "On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices," IEEE Syst. J., vol. PP, no. 99, pp. 1-10, 2017.
    • (2017) IEEE Syst. J. , Issue.99 , pp. 1-10
    • Wang, D.1    Cheng, H.2    He, D.3    Wang, P.4
  • 20
    • 84883345595 scopus 로고    scopus 로고
    • Fully anonymous profile matching in mobile social networks
    • Sep
    • X. Liang, K. Zhang, R. Lu, X. Lin, and X. Shen, "Fully anonymous profile matching in mobile social networks," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 641-655, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 641-655
    • Liang, X.1    Zhang, K.2    Lu, R.3    Lin, X.4    Shen, X.5
  • 21
    • 84979812487 scopus 로고    scopus 로고
    • Big privacy: Challenges and opportunities of privacy study in the age of big data
    • S. Yu, "Big privacy: Challenges and opportunities of privacy study in the age of big data" IEEE Access, vol. 4, pp. 2751-2763, 2016.
    • (2016) IEEE Access , vol.4 , pp. 2751-2763
    • Yu, S.1
  • 22
    • 85017165469 scopus 로고    scopus 로고
    • APMD: A fast data transmission protocol with reliability guarantee for pervasive sensing data communication
    • Y. Liu, A. Liu, Y. Li, Y. Choi, H. Sekiya, and J. Li, "APMD: A fast data transmission protocol with reliability guarantee for pervasive sensing data communication," Pervasive Mobile Comput., pp. 1-23, 2017.
    • (2017) Pervasive Mobile Comput. , pp. 1-23
    • Liu, Y.1    Liu, A.2    Li, Y.3    Choi, Y.4    Sekiya, H.5    Li, J.6
  • 23
    • 85014086530 scopus 로고    scopus 로고
    • Networking for big data: A survey
    • Jan.-Mar
    • S. Yu, M. Liu, W. Dou, X. Liu, and S. Zhou, "Networking for big data: A survey," IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 531-549, Jan.-Mar. 2017.
    • (2017) IEEE Commun. Surveys Tuts. , vol.19 , Issue.1 , pp. 531-549
    • Yu, S.1    Liu, M.2    Dou, W.3    Liu, X.4    Zhou, S.5
  • 24
    • 85030666259 scopus 로고    scopus 로고
    • On the hybrid using of unicast-broadcast in wireless sensor networks
    • Q. Liu and A. Liu, "On the hybrid using of unicast-broadcast in wireless sensor networks," Comput. Elect. Eng., pp. 1-19, 2017.
    • (2017) Comput. Elect. Eng. , pp. 1-19
    • Liu, Q.1    Liu, A.2
  • 25
    • 84994164440 scopus 로고    scopus 로고
    • Dynamic-scheduling mechanism of controllers based on security policy in software-defined network
    • C. Qi, J. Wu, H. Hu, and G. Cheng, "Dynamic-scheduling mechanism of controllers based on security policy in software-defined network," Electron. Lett., vol. 52, no. 23, pp. 1918-1920, 2016.
    • (2016) Electron. Lett. , vol.52 , Issue.23 , pp. 1918-1920
    • Qi, C.1    Wu, J.2    Hu, H.3    Cheng, G.4
  • 26
    • 85014119108 scopus 로고    scopus 로고
    • Identifying propagation sources in networks: State-of-The-art and comparative studies
    • Jan.-Mar
    • J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou, "Identifying propagation sources in networks: State-of-the-art and comparative studies," IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 465-481, Jan.-Mar. 2017.
    • (2017) IEEE Commun. Surveys Tuts. , vol.19 , Issue.1 , pp. 465-481
    • Jiang, J.1    Wen, S.2    Yu, S.3    Xiang, Y.4    Zhou, W.5
  • 27
    • 77951441926 scopus 로고    scopus 로고
    • Packet size optimization for increased throughput in multi-level security wireless networks
    • M. Younis, Q. Farrag, and W. Amico, "Packet size optimization for increased throughput in multi-level security wireless networks," in Proc. IEEE Military Commun. Conf., 2009, pp. 1-7.
    • (2009) Proc. IEEE Military Commun. Conf. , pp. 1-7
    • Younis, M.1    Farrag, Q.2    Amico, W.3
  • 28
    • 85027694554 scopus 로고    scopus 로고
    • Adaptive base station cooperation for physical layer security in two-cell wireless networks
    • L. Hu, H. Wen, B. Wu, J. Tang, and F. Pan, "Adaptive base station cooperation for physical layer security in two-cell wireless networks," IEEE Access, vol. 4, pp. 5607-5623, 2016.
    • (2016) IEEE Access , vol.4 , pp. 5607-5623
    • Hu, L.1    Wen, H.2    Wu, B.3    Tang, J.4    Pan, F.5
  • 29
    • 85000416096 scopus 로고    scopus 로고
    • On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system
    • J. Zhang, G. Pan, and H. Wang, "On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system," IEEE Access, vol. 4, pp. 3887-3893, 2016.
    • (2016) IEEE Access , vol.4 , pp. 3887-3893
    • Zhang, J.1    Pan, G.2    Wang, H.3
  • 30
    • 84861611405 scopus 로고    scopus 로고
    • Optimal resource allocation to defend against deliberate attackers in networking infrastructures
    • X. Xiao, M. Li, J. Wang, and C. Qiao, "Optimal resource allocation to defend against deliberate attackers in networking infrastructures," in Proc. IEEE INFOCOM, 2012, pp. 639-647.
    • (2012) Proc. IEEE INFOCOM , pp. 639-647
    • Xiao, X.1    Li, M.2    Wang, J.3    Qiao, C.4
  • 31
    • 79960606609 scopus 로고    scopus 로고
    • Resource allocation for security services in mobile cloud computing
    • H. Liang, D. Huang, L. Cai, X. Shen, and D. Peng, "Resource allocation for security services in mobile cloud computing," in Proc. IEEE INFOCOM, 2011, pp. 191-195.
    • (2011) Proc. IEEE INFOCOM , pp. 191-195
    • Liang, H.1    Huang, D.2    Cai, L.3    Shen, X.4    Peng, D.5
  • 33
    • 84904430618 scopus 로고    scopus 로고
    • Information diffusion in mobile social networks: The speed perspective
    • May
    • Z. Lu, Y. Wen, and C. Cao, "Information diffusion in mobile social networks: The speed perspective," in Proc. IEEE INFOCOM, May 2014, pp. 1932-1940.
    • (2014) Proc. IEEE INFOCOM , pp. 1932-1940
    • Lu, Z.1    Wen, Y.2    Cao, C.3
  • 34
    • 84891558659 scopus 로고    scopus 로고
    • Cloud-based multicasting with feedback in mobile social networks
    • Dec
    • Y. Wang, J. Wu, and W. Yang, "Cloud-based multicasting with feedback in mobile social networks," IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6043-6053, Dec. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.12 , pp. 6043-6053
    • Wang, Y.1    Wu, J.2    Yang, W.3
  • 35
    • 84904408894 scopus 로고    scopus 로고
    • Improving data forwarding in mobile social networks with infrastructure support: A space-crossing community approach
    • May
    • Z. Li, C. Wang, S. Yang, and J. Chang, and I. Stojmenovic, "Improving data forwarding in mobile social networks with infrastructure support: A space-crossing community approach," in Proc. IEEE INFOCOM, May 2014, pp. 1941-1949.
    • (2014) Proc. IEEE INFOCOM , pp. 1941-1949
    • Li, Z.1    Wang, C.2    Yang, S.3    Chang, J.4    Stojmenovic, I.5
  • 36
    • 84896447687 scopus 로고    scopus 로고
    • Security and privacy in mobile social networks challenges and solutions
    • Mar
    • X. Liang, K. Zhang, X. Shen, and X. Lin, "Security and privacy in mobile social networks challenges and solutions," IEEE Wireless Commun., vol. 21, no. 1, pp. 33-41, Mar. 2014.
    • (2014) IEEE Wireless Commun. , vol.21 , Issue.1 , pp. 33-41
    • Liang, X.1    Zhang, K.2    Shen, X.3    Lin, X.4
  • 38
    • 70849109966 scopus 로고    scopus 로고
    • Solutions to security and privacy issues in mobile social networking
    • Aug
    • A. Beach, M. Gartrell, and R. Han, "Solutions to security and privacy issues in mobile social networking," in Proc. Int. Conf. Comput. Sci. Eng., Aug. 2009, pp. 1036-1042.
    • (2009) Proc. Int. Conf. Comput. Sci. Eng. , pp. 1036-1042
    • Beach, A.1    Gartrell, M.2    Han, R.3
  • 39
    • 84973643707 scopus 로고    scopus 로고
    • A sybil attack detection scheme for privacypreserving mobile social networks
    • Dec
    • P. Li and R. Lu, "A sybil attack detection scheme for privacypreserving mobile social networks," in Proc. 10th Int. Conf. Inf. Commun. Signal Process., Dec. 2015, pp. 1-5.
    • (2015) Proc. 10th Int. Conf. Inf. Commun. Signal Process. , pp. 1-5
    • Li, P.1    Lu, R.2
  • 40
    • 84966783569 scopus 로고    scopus 로고
    • Privacy-preserving friendship establishment based on blind signature and bloom filterin mobile social networks
    • Nov
    • X. Zhu, Y. Su, M. Gao, and Y. Huang, "Privacy-preserving friendship establishment based on blind signature and bloom filterin mobile social networks," in Proc. IEEE/CIC Int. Conf. Commun. China, Nov. 2015, pp. 1-6.
    • (2015) Proc. IEEE/CIC Int. Conf. Commun. China , pp. 1-6
    • Zhu, X.1    Su, Y.2    Gao, M.3    Huang, Y.4
  • 42
    • 80051889537 scopus 로고    scopus 로고
    • Location cheating: A security challenge to location-based social network services
    • Jun
    • W. He, X. Liu, and M. Ren, "Location cheating: A security challenge to location-based social network services," in Proc. 31th Int. Conf. Distrib. Comput. Syst., Jun. 2011, pp. 740-749.
    • (2011) Proc. 31th Int. Conf. Distrib. Comput. Syst. , pp. 740-749
    • He, W.1    Liu, X.2    Ren, M.3
  • 44
    • 79960608392 scopus 로고    scopus 로고
    • A cooperative social and vehicular network and its dynamic bandwidth allocation algorithms
    • Apr
    • R. Fei, K. Yang, and X. Cheng, "A cooperative social and vehicular network and its dynamic bandwidth allocation algorithms," in Proc. IEEE Conf. Comput. Commun. Workshops, Apr. 2011, pp. 63-67.
    • (2011) Proc. IEEE Conf. Comput. Commun. Workshops , pp. 63-67
    • Fei, R.1    Yang, K.2    Cheng, X.3
  • 45
    • 84893575900 scopus 로고    scopus 로고
    • A novel hierarchical bandwidth allocation approach in heterogeneous wireless networks, in Proc. 8th Int. Conf. Commun. Netw. China
    • Aug
    • B. Wang, H. Tian, B. Liu, S. Fan, and K. Sun, "A novel hierarchical bandwidth allocation approach in heterogeneous wireless networks, in Proc. 8th Int. Conf. Commun. Netw. China, Aug. 2013, pp. 206-211.
    • (2013) , pp. 206-211
    • Wang, B.1    Tian, H.2    Liu, B.3    Fan, S.4    Sun, K.5
  • 46
    • 79960381001 scopus 로고    scopus 로고
    • Dynamic QoS-based bandwidth allocation framework for broadband wireless networks
    • Jul
    • A. Esmailpour and N. Nasser, "Dynamic QoS-based bandwidth allocation framework for broadband wireless networks," IEEE Trans. Veh. Technol., vol. 60, no. 6, pp. 2690-2700, Jul. 2011.
    • (2011) IEEE Trans. Veh. Technol. , vol.60 , Issue.6 , pp. 2690-2700
    • Esmailpour, A.1    Nasser, N.2
  • 47
    • 84897583900 scopus 로고    scopus 로고
    • Stackelberg game for bandwidth allocation in cloud-based wireless live-streaming social networks
    • Mar
    • G. Nan, Z. Mao, M. Yu, M. Li, H. Wang, and Y. Zhang, "Stackelberg game for bandwidth allocation in cloud-based wireless live-streaming social networks," IEEE Syst. J., vol. 8, no. 1, pp. 256-267, Mar. 2014.
    • (2014) IEEE Syst. J. , vol.8 , Issue.1 , pp. 256-267
    • Nan, G.1    Mao, Z.2    Yu, M.3    Li, M.4    Wang, H.5    Zhang, Y.6
  • 48
    • 84861611405 scopus 로고    scopus 로고
    • Optimal resource allocation to defend against deliberate attackers in networking infrastructures
    • X. Xiao, M. Li, J. Wang, and C. Qiao, "Optimal resource allocation to defend against deliberate attackers in networking infrastructures," in Proc. IEEE INFOCOM, 2012, pp. 639-647.
    • (2012) Proc. IEEE INFOCOM , pp. 639-647
    • Xiao, X.1    Li, M.2    Wang, J.3    Qiao, C.4
  • 49
    • 79960606609 scopus 로고    scopus 로고
    • Resource allocation for security services in mobile cloud computing
    • H. Liang, D. Huang, L. Cai, X. Shen, and D. Peng, "Resource allocation for security services in mobile cloud computing," in Proc. IEEE INFOCOM, 2011, pp. 191-195.
    • (2011) Proc. IEEE INFOCOM , pp. 191-195
    • Liang, H.1    Huang, D.2    Cai, L.3    Shen, X.4    Peng, D.5
  • 50
    • 85015034778 scopus 로고    scopus 로고
    • QoE-based distributed multichannel allocation 5G heterogeneous cellular networks: A matching-coalitional game solution
    • Sept
    • D. Wu, Q. Wu, Y. Xu, J. Jing, and Z. Qin, "QoE-based distributed multichannel allocation 5G heterogeneous cellular networks: A matching-coalitional game solution," IEEE Access, vol. 5, pp. 61-71, Sept. 2016.
    • (2016) IEEE Access , vol.5 , pp. 61-71
    • Wu, D.1    Wu, Q.2    Xu, Y.3    Jing, J.4    Qin, Z.5
  • 51
    • 85018500654 scopus 로고    scopus 로고
    • Social networkbased content delivery in device-to-device underlay cellular networks using matching theory
    • Nov
    • C. Xu, C. Gao, Z. Zhou, Z. Chang, and Y. Jia, "Social networkbased content delivery in device-to-device underlay cellular networks using matching theory," IEEE Access, vol. 5, pp. 924-937, Nov. 2016.
    • (2016) IEEE Access , vol.5 , pp. 924-937
    • Xu, C.1    Gao, C.2    Zhou, Z.3    Chang, Z.4    Jia, Y.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.