暂无分享,去创建一个
Athman Bouguettaya | Azadeh Ghari Neiat | Mohammed Bahutair | A. Bouguettaya | A. G. Neiat | A. Neiat | Mohammed Bahutair
[1] Feng Hao,et al. Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks , 2021, ACM Trans. Cyber Phys. Syst..
[2] Kwong-Sak Leung,et al. A Survey of Crowdsourcing Systems , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[3] Seng Wai Loke,et al. Computing with Nearby Mobile Devices: A Work Sharing Algorithm for Mobile Edge-Clouds , 2019, IEEE Transactions on Cloud Computing.
[4] Prashant Krishnamurthy,et al. Location Affiliation Networks: Bonding Social and Spatial Information , 2012, ECML/PKDD.
[5] Antonio Iera,et al. A subjective model for trustworthiness evaluation in the social Internet of Things , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[6] Djamal Zeghlache,et al. Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..
[7] Dino Pedreschi,et al. Human mobility, social ties, and link prediction , 2011, KDD.
[8] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[9] Sibel Adali,et al. Measuring behavioral trust in social networks , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.
[10] Yao Yu,et al. Privacy Protection Scheme Based on CP-ABE in Crowdsourcing-IoT for Smart Ocean , 2020, IEEE Internet of Things Journal.
[11] Christian Haas,et al. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks , 2014, IEEE Transactions on Services Computing.
[12] Zhen Cao,et al. Social Wi-Fi: Hotspot sharing with online friends , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[13] Athman Bouguettaya,et al. Reputation Bootstrapping for Trust Establishment among Web Services , 2009, IEEE Internet Computing.
[14] Xi Fang,et al. Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.
[15] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[16] Eric Gilbert,et al. Predicting tie strength with social media , 2009, CHI.
[17] Christos Faloutsos,et al. Sampling from large graphs , 2006, KDD '06.
[18] Luigi Atzori,et al. A Dataset for Performance Analysis of the Social Internet of Things , 2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC).
[19] Boleslaw K. Szymanski,et al. Is Crowdcharging Possible? , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).
[20] J V Tu,et al. Advantages and disadvantages of using artificial neural networks versus logistic regression for predicting medical outcomes. , 1996, Journal of clinical epidemiology.
[21] J. Zurada,et al. Determining the Significance of Input Parameters using Sensitivity Analysis , 1995, IWANN.
[22] Wenjia Li,et al. Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities , 2018, IEEE Internet of Things Journal.
[23] Yan Liu,et al. Inferring Social Strength from Spatiotemporal Data , 2016, TODS.
[24] Antanas Verikas,et al. Feature selection with neural networks , 2002, Pattern Recognit. Lett..
[25] Khaled A. Harras,et al. Femto Clouds: Leveraging Mobile Devices to Provide Cloud Service at the Edge , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[26] N. Feamster,et al. IoT Inspector , 2019, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[27] Vladik Kreinovich,et al. Why Linear Interpolation , 2017 .
[28] Stephen Lin,et al. Graph Embedding and Extensions: A General Framework for Dimensionality Reduction , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[29] Gaith Rjoub,et al. An endorsement-based trust bootstrapping approach for newcomer cloud services , 2020, Inf. Sci..
[30] Gaith Rjoub,et al. BigTrustScheduling: Trust-aware big data task scheduling approach in cloud computing environments , 2020, Future Gener. Comput. Syst..
[31] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[32] Eric A. Wan,et al. Neural network classification: a Bayesian interpretation , 1990, IEEE Trans. Neural Networks.
[33] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[34] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[35] Timos K. Sellis,et al. Spatio-Temporal Composition of Crowdsourced Services , 2015, ICSOC.
[36] Subhas Chandra Mukhopadhyay,et al. Towards the Implementation of IoT for Environmental Condition Monitoring in Homes , 2013, IEEE Sensors Journal.
[37] Hadi Otrok,et al. Multi-worker multi-task selection framework in mobile crowd sourcing , 2019, J. Netw. Comput. Appl..
[38] Cécile Paris,et al. A survey of trust in social networks , 2013, CSUR.
[39] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[40] Dimosthenis Kyriazis,et al. Smart, Autonomous and Reliable Internet of Things , 2013, EUSPN/ICTH.
[41] H. T. Mouftah,et al. Mobility-aware trustworthy crowdsourcing in cloud-centric Internet of Things , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).
[42] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.