SecureCPS: Cognitive inspired framework for detection of cyber attacks in cyber–physical systems
In the era of autonomous systems, the security is indispensable module for flexible
computing environment. Due to increased computer power and network speed, a new …
computing environment. Due to increased computer power and network speed, a new …
A dynamic algorithm for stochastic trust propagation in online social networks: Learning automata approach
M Ghavipour, MR Meybodi - Computer Communications, 2018 - Elsevier
The dynamic nature of trust has been universally accepted in the literature. As two users
interact with each other, trust between them evolves based on their interaction's experience …
interact with each other, trust between them evolves based on their interaction's experience …
Instance-based ontology matching: a literature review
M Abubakar, H Hamdan, N Mustapha… - Recent Advances on Soft …, 2018 - Springer
The volume of research articles published today associated to instance-based ontology
matching is significant and it is thought to reflect the growing interest of ontology matching …
matching is significant and it is thought to reflect the growing interest of ontology matching …
Propagating both trust and distrust with target differentiation for combating link-based Web spam
X Zhang, Y Wang, N Mou, W Liang - ACM Transactions on the Web …, 2014 - dl.acm.org
Semi-automatic anti-spam algorithms propagate either trust through links from a good seed
set (eg, TrustRank) or distrust through inverse links from a bad seed set (eg, Anti-TrustRank) …
set (eg, TrustRank) or distrust through inverse links from a bad seed set (eg, Anti-TrustRank) …
Approximating web communities using subspace decomposition
J Eustace, X Wang, J Li - Knowledge-Based Systems, 2014 - Elsevier
Herein, we propose an algorithm to approximate web communities from the topic related
web pages. The approximation is achieved by subspace factorization of the topic related …
web pages. The approximation is achieved by subspace factorization of the topic related …
Detecting spammers on Twitter based on content and social interaction
H Shen, X Liu - 2015 International Conference on Network and …, 2015 - ieeexplore.ieee.org
Twitter has become a target platform on which spammers spread large amounts of harmful
information. These malicious spamming activities have seriously threatened normal users' …
information. These malicious spamming activities have seriously threatened normal users' …
Privacy-preserving trust management for unwanted traffic control
The pervasive use of the Internet has caused an incredible growth of unwanted traffic, such
as spam, malware and malicious intrusions. Controlling unwanted traffic based on trust and …
as spam, malware and malicious intrusions. Controlling unwanted traffic based on trust and …
Using deep belief network to demote web spam
X Zhuang, Y Zhu, Q Peng, F Khurshid - Future Generation Computer …, 2021 - Elsevier
Many score propagation based Web Spam Demotion Algorithms (WSDAs) have been
proposed in last decade. There are two major challenges those algorithms suffer from. First …
proposed in last decade. There are two major challenges those algorithms suffer from. First …
Human ABCC1 interacts and colocalizes with ATP synthase α, revealed by interactive proteomics analysis
Y Yang, Z Li, W Mo, R Ambadipudi… - Journal of proteome …, 2012 - ACS Publications
Human ABCC1 is a member of the ATP-binding cassette (ABC) transporter superfamily, and
its overexpression has been shown to cause multidrug resistance by active efflux of a wide …
its overexpression has been shown to cause multidrug resistance by active efflux of a wide …
OpinionRank: Trustworthy website detection using three valued subjective logic
For a web search engine, it is critical to design a mechanism to promote trustworthy websites
and eliminate spam ones in the searching results. In this paper, we propose the …
and eliminate spam ones in the searching results. In this paper, we propose the …