{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T04:12:39Z","timestamp":1740111159553,"version":"3.37.3"},"reference-count":36,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T00:00:00Z","timestamp":1699056000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702066"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013223","name":"Chongqing Research Program of Basic Research and Frontier Technology","doi-asserted-by":"publisher","award":["cstc2021jcyj-msxmX0530","cstc2021jcyj-msxmX0761"],"id":[{"id":"10.13039\/501100013223","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1016\/j.comnet.2023.110087","type":"journal-article","created":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T03:27:51Z","timestamp":1699327671000},"page":"110087","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Social tie-driven coupling propagation of user awareness and information in Device-to-Device communications"],"prefix":"10.1016","volume":"237","author":[{"given":"Chenquan","family":"Gan","sequence":"first","affiliation":[]},{"given":"Anqi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qingyi","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4776-4932","authenticated-orcid":false,"given":"Ye","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"11","key":"10.1016\/j.comnet.2023.110087_b1","doi-asserted-by":"crossref","first-page":"7021","DOI":"10.1109\/TWC.2020.3007702","article-title":"A secure group-oriented device-to-device authentication protocol for 5G wireless networks","volume":"19","author":"Shang","year":"2020","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.comnet.2023.110087_b2","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.comcom.2021.01.010","article-title":"Secure device-to-device communications for 5G enabled internet of things applications","volume":"169","author":"Gaba","year":"2021","journal-title":"Comput. Commun."},{"issue":"4","key":"10.1016\/j.comnet.2023.110087_b3","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1007\/s11235-022-00954-7","article-title":"Security aspects of device-to-device (D2D) networks in wireless communication: A comprehensive survey","volume":"81","author":"Khan","year":"2022","journal-title":"Telecommun. Syst."},{"issue":"3","key":"10.1016\/j.comnet.2023.110087_b4","doi-asserted-by":"crossref","first-page":"2133","DOI":"10.1109\/COMST.2018.2828120","article-title":"A survey of device-to-device communications: Research issues and challenges","volume":"20","author":"Jameel","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"10.1016\/j.comnet.2023.110087_b5","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCOMSTD.0001.2100077","article-title":"Device-to-device communications at the terahertz band: Open challenges for realistic implementation","volume":"7","author":"Wu","year":"2023","journal-title":"IEEE Commun. Stand. Mag."},{"issue":"3","key":"10.1016\/j.comnet.2023.110087_b6","doi-asserted-by":"crossref","first-page":"2169","DOI":"10.1109\/COMST.2018.2820069","article-title":"A survey on socially aware device-to-device communications","volume":"20","author":"Ahmed","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comnet.2023.110087_b7","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107249","article-title":"Many-to-many matching for social-aware minimized redundancy caching in D2D-enabled cellular networks","volume":"175","author":"Qian","year":"2020","journal-title":"Comput. Netw."},{"issue":"9","key":"10.1016\/j.comnet.2023.110087_b8","doi-asserted-by":"crossref","first-page":"8860","DOI":"10.1109\/TVT.2018.2851779","article-title":"Social-aware D2D relay networks for stability enhancement: An optimal stopping approach","volume":"67","author":"Zhang","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"8","key":"10.1016\/j.comnet.2023.110087_b9","doi-asserted-by":"crossref","first-page":"7538","DOI":"10.1109\/TVT.2018.2825366","article-title":"Physical\u2013social-aware D2D content sharing networks: A provider\u2013demander matching game","volume":"67","author":"Wu","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2023.110087_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2022.102955","article-title":"An adaptive social-aware device-to-device communication mechanism for wireless networks","volume":"137","author":"Zen Alden","year":"2022","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.comnet.2023.110087_b11","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1109\/OJCOMS.2020.3010270","article-title":"6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions","volume":"1","author":"Chowdhury","year":"2020","journal-title":"IEEE Open J. Commun. Soc."},{"issue":"10","key":"10.1016\/j.comnet.2023.110087_b12","doi-asserted-by":"crossref","first-page":"10289","DOI":"10.1109\/TVT.2019.2933064","article-title":"Matching theory-based cooperative secure transmission strategy for social-aware D2D communications","volume":"68","author":"Wang","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2023.110087_b13","first-page":"134","article-title":"The impact of awareness diffusion on SIR-like epidemics in multiplex networks","volume":"349","author":"Wang","year":"2019","journal-title":"Appl. Math. Comput."},{"key":"10.1016\/j.comnet.2023.110087_b14","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.ins.2018.08.050","article-title":"A new coupled disease-awareness spreading model with mass media on multiplex networks","volume":"471","author":"Xia","year":"2019","journal-title":"Inform. Sci."},{"key":"10.1016\/j.comnet.2023.110087_b15","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1016\/j.cnsns.2019.01.020","article-title":"Analysis of epidemic outbreaks in two-layer networks with different structures for information spreading and disease diffusion","volume":"72","author":"Kabir","year":"2019","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"4","key":"10.1016\/j.comnet.2023.110087_b16","doi-asserted-by":"crossref","first-page":"2177","DOI":"10.1109\/JIOT.2020.3026995","article-title":"Social interaction and information diffusion in social internet of things: Dynamics, cloud-edge, traceability","volume":"8","author":"Yi","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"10.1016\/j.comnet.2023.110087_b17","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1038\/s41562-020-00945-1","article-title":"Realistic modelling of information spread using peer-to-peer diffusion patterns","volume":"4","author":"Zhou","year":"2020","journal-title":"Nat. Hum. Behav."},{"issue":"2","key":"10.1016\/j.comnet.2023.110087_b18","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MCOM.001.1900089","article-title":"Exploiting social relationships for trustworthy D2D relay in 5G cellular networks","volume":"58","author":"Saxena","year":"2020","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"10.1016\/j.comnet.2023.110087_b19","doi-asserted-by":"crossref","first-page":"1471","DOI":"10.1109\/TNET.2014.2329956","article-title":"Exploiting social ties for cooperative D2D communications: A mobile social networking case","volume":"23","author":"Chen","year":"2014","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.1016\/j.comnet.2023.110087_b20","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.ins.2018.12.045","article-title":"Social tie-driven content priority scheme for D2D communications","volume":"480","author":"Zhang","year":"2019","journal-title":"Inform. Sci."},{"issue":"3","key":"10.1016\/j.comnet.2023.110087_b21","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1007\/s11036-017-0973-z","article-title":"Social-aware D2D pairing for cooperative video transmission using matching theory","volume":"23","author":"Zhang","year":"2018","journal-title":"Mob. Netw. Appl."},{"issue":"5","key":"10.1016\/j.comnet.2023.110087_b22","doi-asserted-by":"crossref","first-page":"3124","DOI":"10.1109\/TCOMM.2019.2894138","article-title":"Dynamic social-aware peer selection for cooperative relay management with D2D communications","volume":"67","author":"Gao","year":"2019","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"10.1016\/j.comnet.2023.110087_b23","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1109\/TCCN.2020.3027697","article-title":"A multiplex social contagion dynamics model to shape and discriminate D2D content dissemination","volume":"7","author":"Scat\u00e0","year":"2021","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"issue":"11","key":"10.1016\/j.comnet.2023.110087_b24","doi-asserted-by":"crossref","first-page":"8454","DOI":"10.1109\/JIOT.2021.3113914","article-title":"Satisfied matching-embedded social internet of things for content preference-aware resource allocation in D2D underlaying cellular networks","volume":"9","author":"Li","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"10.1016\/j.comnet.2023.110087_b25","doi-asserted-by":"crossref","first-page":"5607","DOI":"10.1109\/TCOMM.2023.3292282","article-title":"Mode selection and resource allocation for D2D communications with tradeoff of throughput and user satisfaction","volume":"71","author":"Li","year":"2023","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/j.comnet.2023.110087_b26","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.chaos.2018.12.017","article-title":"Analysis of SIR epidemic model with information spreading of awareness","volume":"119","author":"Kabir","year":"2019","journal-title":"Chaos Solitons Fractals"},{"issue":"8","key":"10.1016\/j.comnet.2023.110087_b27","first-page":"7651","article-title":"A measurement-driven analysis and prediction of content propagation in the device-to-device social networks","volume":"35","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"10.1016\/j.comnet.2023.110087_b28","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1109\/LCOMM.2021.3097762","article-title":"A cooperative D2D content sharing scheme using NOMA under social ties","volume":"26","author":"Li","year":"2022","journal-title":"IEEE Commun. Lett."},{"issue":"4","key":"10.1016\/j.comnet.2023.110087_b29","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MWC.2016.7553029","article-title":"Caching based socially-aware D2D communications in wireless content delivery networks: A hypergraph framework","volume":"23","author":"Bai","year":"2016","journal-title":"IEEE Wirel. Commun."},{"key":"10.1016\/j.comnet.2023.110087_b30","doi-asserted-by":"crossref","DOI":"10.1155\/2020\/1915840","article-title":"Modeling and analysis of dynamic social ties in D2D collaborative video transmission","volume":"2020","author":"Zhang","year":"2020","journal-title":"Discrete Dyn. Nat. Soc."},{"year":"2012","series-title":"An Introduction to Dynamical Systems: Continuous and Discrete, Vol. 19","author":"Robinson","key":"10.1016\/j.comnet.2023.110087_b31"},{"key":"10.1016\/j.comnet.2023.110087_b32","first-page":"351","article-title":"Asymptotically autonomous differential equations in the plane","author":"Thieme","year":"1994","journal-title":"Rocky Mountain J. Math."},{"key":"10.1016\/j.comnet.2023.110087_b33","unstructured":"http:\/\/snap.stanford.edu\/data\/p2p-Gnutella31.html."},{"key":"10.1016\/j.comnet.2023.110087_b34","unstructured":"http:\/\/snap.stanford.edu\/data\/ego-Facebook.html."},{"key":"10.1016\/j.comnet.2023.110087_b35","doi-asserted-by":"crossref","unstructured":"J. Bi, S. He, F. Luo, J. Chen, D.-W. Huang, M. Sun, Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering Systems, in: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom, 2022, pp. 97\u2013104.","DOI":"10.1109\/TrustCom56396.2022.00024"},{"issue":"9","key":"10.1016\/j.comnet.2023.110087_b36","doi-asserted-by":"crossref","first-page":"9619","DOI":"10.1109\/TII.2022.3231406","article-title":"Defense of advanced persistent threat on industrial internet of things with lateral movement modeling","volume":"19","author":"Bi","year":"2023","journal-title":"IEEE Trans. Ind. Inform."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128623005327?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128623005327?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T22:05:07Z","timestamp":1701554707000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128623005327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":36,"alternative-id":["S1389128623005327"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2023.110087","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Social tie-driven coupling propagation of user awareness and information in Device-to-Device communications","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2023.110087","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"110087"}}