Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing
暂无分享,去创建一个
Ilsun You | Pankoo Kim | Vishal Sharma | Ravinder Kumar | I. You | Vishal Sharma | Pankoo Kim | Ravinder Kumar
[1] Luo Si,et al. A study of mixture models for collaborative filtering , 2006, Information Retrieval.
[2] Gianpiero Costantino,et al. Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[3] Carol J. Fung,et al. Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model , 2015, J. Internet Serv. Inf. Secur..
[4] Mudita Singhal,et al. Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[5] Zheng Yan,et al. Trust Evaluation in Social Networking: A Review , 2016, MobiMedia.
[6] Jie Wu,et al. Generating trusted graphs for trust evaluation in online social networks , 2014, Future Gener. Comput. Syst..
[7] Inderveer Chana,et al. Artificial bee colony based energy‐aware resource utilization technique for cloud computing , 2015, Concurr. Comput. Pract. Exp..
[8] Valtteri Niemi,et al. Secure pervasive social networking based on multi-dimensional trust levels , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[9] D. Karaboga,et al. On the performance of artificial bee colony (ABC) algorithm , 2008, Appl. Soft Comput..
[10] ChanaInderveer,et al. Artificial bee colony based energy-aware resource utilization technique for cloud computing , 2015 .
[11] Kouichi Sakurai,et al. A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints , 2016, J. Internet Serv. Inf. Secur..
[12] Luo Si,et al. Flexible Mixture Model for Collaborative Filtering , 2003, ICML.
[13] Yue Shen,et al. PerContRep: a practical reputation system for pervasive content services , 2014, The Journal of Supercomputing.
[14] Azzedine Boukerche,et al. Pervasive forwarding mechanism for mobile social networks , 2016, Comput. Networks.
[15] Santosh V. Nagaraj,et al. Entropy-based spectrum sensing in cognitive radio , 2009, Signal Process..
[16] Zheng Yan,et al. PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management , 2015, ACM Trans. Multim. Comput. Commun. Appl..
[17] J. Mosimann. On the compound multinomial distribution, the multivariate β-distribution, and correlations among proportions , 1962 .
[18] Xuemin Shen,et al. Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions , 2015, IEEE Communications Magazine.
[19] Georgios Theodoropoulos,et al. Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware) , 2015, MIST@CCS.
[20] Yue Shen,et al. A practical reputation system for pervasive social chatting , 2013, J. Comput. Syst. Sci..
[21] Jia Guo,et al. Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.
[22] Zhou Su,et al. Cooperative Networking towards Maritime Cyber Physical Systems , 2016, Int. J. Distributed Sens. Networks.
[23] Lale Özbakır,et al. Artificial Bee Colony Algorithm and Its Application to Generalized Assignment Problem , 2007 .
[24] Rajiv Ranjan,et al. Osmotic Computing: A New Paradigm for Edge/Cloud Integration , 2016, IEEE Cloud Computing.
[25] Raimo Kantola,et al. Unwanted Content Control via Trust Management in Pervasive Social Networking , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[26] Zheng Yan,et al. Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels , 2017, IEEE Systems Journal.
[27] Zheng Yan,et al. Secure Pervasive Social Communications Based on Trust in a Distributed Way , 2016, IEEE Access.
[28] Yan Zheng,et al. Anonymous Authentication for Trustworthy Pervasive Social Networking , 2015, IEEE Transactions on Computational Social Systems.
[29] Yue Zhang,et al. Social behavior study under pervasive social networking based on decentralized deep reinforcement learning , 2017, J. Netw. Comput. Appl..
[30] Thomas Stützle,et al. Ant colony optimization: artificial ants as a computational intelligence technique , 2006 .
[31] Hsing-Chung Chen,et al. Driver behaviour detection and vehicle rating using multi-UAV coordinated vehicular networks , 2017, J. Comput. Syst. Sci..
[32] Michael H. Coen. A Similarity Metric for Spatial Probability Distributions , .
[33] Raimo Kantola,et al. Personal Data Access Based on Trust Assessment in Mobile Social Networking , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.