A mechanism for detecting dishonest recommendation in indirect trust computation
暂无分享,去创建一个
[1] Kai Hwang,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[2] Iraklis Varlamis,et al. A Study on Social Network Metrics and Their Application in Trust Networks , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.
[3] Jie Zhang,et al. Detecting Imprudence of 'Reliable' Sellers in Online Auction Sites , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[4] Michael R. Lyu,et al. Learning to recommend with social trust ensemble , 2009, SIGIR.
[5] Athman Bouguettaya,et al. Evaluating Rater Credibility for Reputation Assessment of Web Services , 2007, WISE.
[6] Paddy Nixon,et al. A formal model of trust lifecycle management , 2003 .
[7] Jaswinder Pal Singh,et al. Computing and using reputations for internet ratings , 2001, EC '01.
[8] Paddy Nixon,et al. Trusting Collaboration in Global Computing Systems , 2003, iTrust.
[9] Prabhakar Raghavan,et al. A Linear Method for Deviation Detection in Large Databases , 1996, KDD.
[10] Isaac Woungang,et al. Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..
[11] Jennifer Golbeck,et al. Investigating interactions of trust and interest similarity , 2007, Decis. Support Syst..
[12] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[13] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[14] Celeste Campo,et al. Managing Ad-Hoc Trust Relationships in Pervasive Computing Environments , 2004 .
[15] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[16] Chunyan Miao,et al. An Entropy-Based Approach to Protecting Rating Systems from Unfair Testimonies , 2006, IEICE Trans. Inf. Syst..
[17] A. Jøsang,et al. Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .
[18] Akbar Ghaffarpour Rahbar,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[19] Andrés Marín López,et al. Trust management for multimedia P2P applications in autonomic networking , 2011, Ad Hoc Networks.
[20] B. Matthews. Comparison of the predicted and observed secondary structure of T4 phage lysozyme. , 1975, Biochimica et biophysica acta.
[21] Mohsen Afsharchi,et al. A Social Network-Based Approach to Expert Recommendation System , 2012, HAIS.
[22] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[23] Naima Iltaf,et al. Modeling interaction using trust and recommendation in ubiquitous computing environment , 2012, EURASIP J. Wirel. Commun. Netw..
[24] Jean Bacon,et al. Trust for Ubiquitous, Transparent Collaboration , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[25] Xia Feng,et al. New Methods for Deviation-Based Outlier Detection in Large Database , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.
[26] Chunyan Miao,et al. AN INTEGRATED CLUSTERING‐BASED APPROACH TO FILTERING UNFAIR MULTI‐NOMINAL TESTIMONIES , 2014, Comput. Intell..
[27] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[28] Sheikh Iqbal Ahamed,et al. Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments , 2010, J. Syst. Softw..
[29] Tao Sun,et al. Probabilistic Trust Management in Pervasive Computing , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.