Leveraging Social Networks to Combat Collusion in Reputation Systems for Peer-to-Peer Networks
暂无分享,去创建一个
Haiying Shen | Karan Sapra | Ze Li | Haiying Shen | Karan Sapra | Ze Li
[1] Zhong Chen,et al. Sorcery: Could we make P2P content sharing systems robust to deceivers? , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[2] Ion Stoica,et al. Robust incentive techniques for peer-to-peer networks , 2004, EC '04.
[3] Chris Lesniewski-Laas,et al. A Sybil-proof one-hop DHT , 2008, SocialNets '08.
[4] Mao Yang,et al. Bring Reputation System to Social Network in the Maze P2P File-Sharing System , 2006, International Symposium on Collaborative Technologies and Systems (CTS'06).
[5] Min Cai,et al. MAAN: A Multi-Attribute Addressable Network for Grid Information Services , 2003, Journal of Grid Computing.
[6] Chris GauthierDickey,et al. Result verification and trust-based scheduling in peer-to-peer grids , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
[7] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[8] David D. Jensen,et al. Creating social networks to improve peer-to-peer networking , 2005, KDD '05.
[9] Jure Leskovec,et al. Predicting positive and negative links in online social networks , 2010, WWW '10.
[10] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Elizabeth R. Jessup,et al. Matrices, Vector Spaces, and Information Retrieval , 1999, SIAM Rev..
[12] Ian T. Foster,et al. Small-world file-sharing communities , 2003, IEEE INFOCOM 2004.
[13] Reihaneh Safavi-Naini,et al. X2Rep: Enhanced Trust Semantics for the XRep Protocol , 2004, ACNS.
[14] M. McPherson,et al. Birds of a Feather: Homophily in Social Networks , 2001 .
[15] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[16] Ernesto Damiani,et al. Choosing reputable servents in a P2P network , 2002, WWW.
[17] David Mazières,et al. RE: Reliable Email , 2006, NSDI.
[18] M. Frans Kaashoek,et al. Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.
[19] Shanyu Zhao,et al. Result Verification and Trust-based Scheduling in Open Peer-to-Peer Cycle Sharing Systems , 2004 .
[20] Weisong Shi,et al. PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[21] Kai Hwang,et al. Gossip-Based Reputation Management for Unstructured Peer-to-Peer Networks* , 2007 .
[22] Akbar Ghaffarpour Rahbar,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[23] Jussara M. Almeida,et al. Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems , 2007, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007).
[24] Ling Liu,et al. TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[25] Shanshan Song,et al. Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.
[26] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[27] Haiying Shen,et al. SOAP: A Social network Aided Personalized and effective spam filter to clean your e-mail box , 2011, 2011 Proceedings IEEE INFOCOM.
[28] Gayatri Swamynathan,et al. Do social networks improve e-commerce?: a study on social marketplaces , 2008, WOSN '08.
[29] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[30] Andrew Twigg,et al. Trading in Trust, Tokens, and Stamps , 2003 .
[31] Ben Y. Zhao,et al. An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[32] Kai Hwang,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[33] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[34] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[35] Ersin Uzun,et al. A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[36] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[37] Jennifer Neville,et al. Modeling relationship strength in online social networks , 2010, WWW '10.
[38] Mudhakar Srivatsa,et al. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.
[39] Thomas E. Anderson,et al. Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.
[40] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[41] Emin Gün Sirer,et al. Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.
[42] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.