A maximum independent set approach for collusion detection in voting pools

F Araujo, J Farinha, P Domingues, GC Silaghi… - Journal of Parallel and …, 2011 - Elsevier
From agreement problems to replicated software execution, we frequently find scenarios
with voting pools. Unfortunately, Byzantine adversaries can join and collude to distort the …

Distributed results checking for MapReduce in volunteer computing

M Moca, GC Silaghi, G Fedak - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
MapReduce is a promising approach to support data-intensive applications on Volunteer
Computing Systems. Existent middleware like Bit Dew allows running MapReduce …

Collusion in peer-to-peer systems

G Ciccarelli, RL Cigno - Computer Networks, 2011 - Elsevier
P2P systems are used to provide distributed storage, file sharing, video streaming,
distributed gaming, and other applications based on the collaboration of participating peers …

[PDF][PDF] Trusted community: a novel multiagent organisation for open distributed systems

L Klejnowski - 2014 - repo.uni-hannover.de
Open Distributed Systems, be it the Internet, peer-to-peer systems, e-commerce systems,
Desktop Grid Systems, wireless sensor networks, or vehicular ad-hoc networks, have …

Collusion detection for grid computing

E Staab, T Engel - … 9th IEEE/ACM International Symposium on …, 2009 - ieeexplore.ieee.org
A common technique for result verification in grid computing is to delegate a computation
redundantly to different workers and apply majority voting to the returned results. However …

Virtual screening in a desktop grid: Replication and the optimal quorum

I Chernov, N Nikitina - … , PaCT 2015, Petrozavodsk, Russia, August 31 …, 2015 - Springer
We propose a mathematical model of a desktop grid computing system that solves tasks with
two possible answers. Replication is used in order to reduce the error risk: wrong answers …

Optimal spot-checking for collusion tolerance in computer grids

G Levitin, L Xing, Y Dai - IEEE Transactions on Dependable …, 2017 - ieeexplore.ieee.org
Many grid-computing systems adopt voting-based techniques to resist sabotage. However,
these techniques become ineffective in grid systems subject to collusion behavior, where …

Algorithmic mechanisms for reliable crowdsourcing computation under collusion

A Fernández Anta, C Georgiou, MA Mosteiro, D Pareja - PloS one, 2015 - journals.plos.org
We consider a computing system where a master processor assigns a task for execution to
worker processors that may collude. We model the workers' decision of whether to comply …

CoVFeFE: Collusion-Resilient verifiable computing framework for Resource-Constrained devices at network edge

J Wang, A Mtibaa - 2024 IEEE 13th International Conference on …, 2024 - ieeexplore.ieee.org
With the rapid growth of Internet of Vehicles (IoV) applications and the advancement of edge
computing, resource-limited vehicles (and other IoT devices) increasingly rely on external …

A fuzzy collusive attack detection mechanism for reputation aggregation in mobile social networks: A trust relationship based perspective

B Zhang, Q Song, T Yang, Z Zheng… - Mobile Information …, 2016 - Wiley Online Library
While the mechanism of reputation aggregation proves to be an effective scheme for
indicating an individual's trustworthiness and further identifying malicious ones in mobile …