Clarifying trust in social internet of things
Z Lin, L Dong - IEEE Transactions on Knowledge and Data …, 2017 - ieeexplore.ieee.org
A social approach can be exploited for the Internet of Things (IoT) to manage a large number
of connected objects. These objects operate as autonomous agents to request and provide …
of connected objects. These objects operate as autonomous agents to request and provide …
A survey of trust management systems for online social communities–trust modeling, trust inference and attacks
Trust can help participants in online social communities to make decisions; however, it is a
challenge for systems to map trust into computational models because of its subjective …
challenge for systems to map trust into computational models because of its subjective …
Energy saving strategy and Nash equilibrium of hybrid P2P networks
Z Ma, C Zhang, L Zhang, S Wang - Journal of Parallel and Distributed …, 2021 - Elsevier
This paper proposes a penalty strategy with differentiated service rate based on the free
riding phenomenon in P2P networks, and establishes an M/M/c+d queueing model. Based …
riding phenomenon in P2P networks, and establishes an M/M/c+d queueing model. Based …
Context-aware trustworthy service evaluation in social internet of things
Abstract In Social Internet of Things (SIoT) environments, a large number of users and
Internet of Things (IoT) based devices are connected to each other, so that they can share …
Internet of Things (IoT) based devices are connected to each other, so that they can share …
Gait correlation analysis based human identification
J Chen - The Scientific World Journal, 2014 - Wiley Online Library
Human gait identification aims to identify people by a sequence of walking images.
Comparing with fingerprint or iris based identification, the most important advantage of gait …
Comparing with fingerprint or iris based identification, the most important advantage of gait …
TrueTrust: a feedback-based trust management model without filtering feedbacks in P2P networks
X Meng, G Zhang - Peer-to-Peer Networking and Applications, 2020 - Springer
With the increases of P2P applications and their users, the attacks on P2P networks have
also increased significantly. To handle the problem, researchers have proposed many kinds …
also increased significantly. To handle the problem, researchers have proposed many kinds …
A robust trust model for service-oriented systems
In service-oriented computing applications, service consumers and providers need to
evaluate the trust levels of potential partners before engaging in interactions. The accuracy …
evaluate the trust levels of potential partners before engaging in interactions. The accuracy …
Rigorous or tolerant: The effect of different reputation attitudes in complex networks
In the collaborative network environment, the ubiquitous cooperation phenomenon among
autonomous and selfish individuals has drawn extensive attentions during the last years …
autonomous and selfish individuals has drawn extensive attentions during the last years …
Enhancing collusion resilience in reputation systems
Real-world applications, such as peer-to-peer (P2P) networks, e-commerce and social
networks, usually employ reputation systems to provide guidance in selecting trustworthy …
networks, usually employ reputation systems to provide guidance in selecting trustworthy …
speedTrust: a super peer-guaranteed trust model in hybrid P2P networks
X Meng - The Journal of Supercomputing, 2018 - Springer
To curb malicious behavior, researchers have proposed a lot of trust models for P2P
networks, most of which, however, suffer from the problems of high complexity, bad …
networks, most of which, however, suffer from the problems of high complexity, bad …