A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks
暂无分享,去创建一个
Ho-fung Leung | Yongquan Liang | Shujuan Ji | Haiyan Ma | Chun-jin Zhang | Ho-fung Leung | Yongquan Liang | Chun-jin Zhang | Shujuan Ji | Haiyan Ma
[1] Norman L. Chervany,et al. Trust and Distrust Definitions: One Bite at a Time , 2000, Trust in Cyber-societies.
[2] R. Lewicki,et al. Trust And Distrust: New Relationships and Realities , 1998 .
[3] Chris Cornelis,et al. Trust- and Distrust-Based Recommendations for Controversial Reviews , 2011, IEEE Intelligent Systems.
[4] Munindar P. Singh,et al. Detecting deception in reputation management , 2003, AAMAS '03.
[5] Seema Bawa,et al. A Privacy, Trust and Policy based Authorization Framework for Services in Distributed Environments , 2007 .
[6] Hongfei Lin,et al. Combating Web spam through trust-distrust propagation with confidence , 2013, Pattern Recognit. Lett..
[7] Jie Zhang,et al. A framework for trust modeling in multiagent electronic marketplaces with buying advisors to consider varying seller behavior and the limiting of seller bids , 2013, TIST.
[8] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[9] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[10] Jie Zhang,et al. Robustness of Trust Models and Combinations for Handling Unfair Ratings , 2012, IFIPTM.
[11] Chris Cornelis,et al. Enhancing the trust-based recommendation process with explicit distrust , 2013, TWEB.
[12] A. Jøsang,et al. Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .
[13] Jie Zhang,et al. Multi-faceted trust and distrust prediction for recommender systems , 2015, Decis. Support Syst..
[14] Nicholas R. Jennings,et al. TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.
[15] Audun Jøsang,et al. Robustness of Trust and Reputation Systems: Does It Matter? , 2012, IFIPTM.
[16] D. Harrison McKnight,et al. Distrust and trust in B2C e-commerce: do they differ? , 2006, ICEC '06.
[17] Chunyan Miao,et al. AN INTEGRATED CLUSTERING‐BASED APPROACH TO FILTERING UNFAIR MULTI‐NOMINAL TESTIMONIES , 2014, Comput. Intell..
[18] Jie Zhang,et al. An evolutionary model for constructing robust trust networks , 2013, AAMAS.
[19] Dickson K. W. Chiu,et al. A pre-evolutionary advisor list generation strategy for robust defensing reputation attacks , 2016, Knowl. Based Syst..
[20] Masahiro Kimura,et al. Detecting changes in information diffusion patterns over social networks , 2013, TIST.
[21] Chunyan Miao,et al. iCLUB: an integrated clustering-based approach to improve the robustness of reputation systems , 2011, AAMAS.
[22] Audun Jsang,et al. Analysing topologies of transitive trust , 2003 .
[23] Munindar P. Singh,et al. An evidential model of distributed reputation management , 2002, AAMAS '02.
[24] Jeff T. Larsen,et al. Being bad isn't always good: affective context moderates the attention bias toward negative information. , 2006, Journal of personality and social psychology.