Clarifying trust in social internet of things

Z Lin, L Dong - IEEE Transactions on Knowledge and Data …, 2017 - ieeexplore.ieee.org
A social approach can be exploited for the Internet of Things (IoT) to manage a large number
of connected objects. These objects operate as autonomous agents to request and provide …

A survey of trust management systems for online social communities–trust modeling, trust inference and attacks

Y Ruan, A Durresi - Knowledge-Based Systems, 2016 - Elsevier
Trust can help participants in online social communities to make decisions; however, it is a
challenge for systems to map trust into computational models because of its subjective …

Energy saving strategy and Nash equilibrium of hybrid P2P networks

Z Ma, C Zhang, L Zhang, S Wang - Journal of Parallel and Distributed …, 2021 - Elsevier
This paper proposes a penalty strategy with differentiated service rate based on the free
riding phenomenon in P2P networks, and establishes an M/M/c+d queueing model. Based …

Context-aware trustworthy service evaluation in social internet of things

M Khani, Y Wang, MA Orgun, F Zhu - Service-Oriented Computing: 16th …, 2018 - Springer
Abstract In Social Internet of Things (SIoT) environments, a large number of users and
Internet of Things (IoT) based devices are connected to each other, so that they can share …

Gait correlation analysis based human identification

J Chen - The Scientific World Journal, 2014 - Wiley Online Library
Human gait identification aims to identify people by a sequence of walking images.
Comparing with fingerprint or iris based identification, the most important advantage of gait …

TrueTrust: a feedback-based trust management model without filtering feedbacks in P2P networks

X Meng, G Zhang - Peer-to-Peer Networking and Applications, 2020 - Springer
With the increases of P2P applications and their users, the attacks on P2P networks have
also increased significantly. To handle the problem, researchers have proposed many kinds …

A robust trust model for service-oriented systems

X Su, M Zhang, Y Mu, Q Bai - Journal of Computer and System Sciences, 2013 - Elsevier
In service-oriented computing applications, service consumers and providers need to
evaluate the trust levels of potential partners before engaging in interactions. The accuracy …

Rigorous or tolerant: The effect of different reputation attitudes in complex networks

Y Ren, G Wang, L Yu, B Shi, W Hu, Z Wang - Future Generation Computer …, 2018 - Elsevier
In the collaborative network environment, the ubiquitous cooperation phenomenon among
autonomous and selfish individuals has drawn extensive attentions during the last years …

Enhancing collusion resilience in reputation systems

H Shen, Y Lin, K Sapra, Z Li - IEEE Transactions on Parallel …, 2015 - ieeexplore.ieee.org
Real-world applications, such as peer-to-peer (P2P) networks, e-commerce and social
networks, usually employ reputation systems to provide guidance in selecting trustworthy …

speedTrust: a super peer-guaranteed trust model in hybrid P2P networks

X Meng - The Journal of Supercomputing, 2018 - Springer
To curb malicious behavior, researchers have proposed a lot of trust models for P2P
networks, most of which, however, suffer from the problems of high complexity, bad …