-
1
-
-
84962053885
-
Maximizing acceptance probability for active friending in online social networks
-
D.-N. Yang, H.-J. Hung, W.-C. Lee, and W. Chen, "Maximizing acceptance probability for active friending in online social networks," in 19th ACM SIGKDD, 2013, pp. 713-721.
-
(2013)
19th ACM SIGKDD
, pp. 713-721
-
-
Yang, D.-N.1
Hung, H.-J.2
Lee, W.-C.3
Chen, W.4
-
2
-
-
84869390901
-
OTO: Online trust oracle for user-centric trust establishment
-
T. H.-J. Kim, P. Gupta, J. Han, E. Owusu, J. Hong, A. Perrig, and D. Gao, "OTO: online trust oracle for user-centric trust establishment," in Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 2012, pp. 391-403.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM
, pp. 391-403
-
-
Kim, T.H.-J.1
Gupta, P.2
Han, J.3
Owusu, E.4
Hong, J.5
Perrig, A.6
Gao, D.7
-
3
-
-
78149337076
-
An analysis of social network-based sybil defenses
-
ACM
-
B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove, "An analysis of social network-based sybil defenses," in ACM SIGCOMM Computer Communication Review, vol. 40, no. 4. ACM, 2010, pp. 363-374.
-
(2010)
ACM SIGCOMM Computer Communication Review
, vol.40
, Issue.4
, pp. 363-374
-
-
Viswanath, B.1
Post, A.2
Gummadi, K.P.3
Mislove, A.4
-
4
-
-
79960882233
-
SocialFilter: Introducing social trust to collaborative spam mitigation
-
M. Sirivianos, K. Kim, and X. Yang, "SocialFilter: introducing social trust to collaborative spam mitigation," in INFOCOM, 2011 Proceedings IEEE. IEEE, 2011, pp. 2300-2308.
-
(2011)
INFOCOM, 2011 Proceedings IEEE. IEEE
, pp. 2300-2308
-
-
Sirivianos, M.1
Kim, K.2
Yang, X.3
-
5
-
-
84861603155
-
Sybildefender: Defend against sybil attacks in large social networks
-
W. Wei, F. Xu, C. C. Tan, and Q. Li, "Sybildefender: Defend against sybil attacks in large social networks," in INFOCOM, 2012 Proceedings IEEE. IEEE, 2012, pp. 1951-1959.
-
(2012)
INFOCOM, 2012 Proceedings IEEE. IEEE
, pp. 1951-1959
-
-
Wei, W.1
Xu, F.2
Tan, C.C.3
Li, Q.4
-
6
-
-
78650005953
-
Designs to account for trust in social network-based sybil defenses
-
A. Mohaisen, N. Hopper, and Y. Kim, "Designs to account for trust in social network-based sybil defenses," in Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010, pp. 714-716.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM
, pp. 714-716
-
-
Mohaisen, A.1
Hopper, N.2
Kim, Y.3
-
7
-
-
84883058982
-
Votetrust: Leveraging friend invitation graph to defend against social network sybils
-
J. Xue, Z. Yang, X. Yang, X. Wang, L. Chen, and Y. Dai, "Votetrust: Leveraging friend invitation graph to defend against social network sybils," in INFOCOM, 2013 Proceedings IEEE, 2013, pp. 2400-2408.
-
(2013)
INFOCOM, 2013 Proceedings IEEE
, pp. 2400-2408
-
-
Xue, J.1
Yang, Z.2
Yang, X.3
Wang, X.4
Chen, L.5
Dai, Y.6
-
8
-
-
84883113927
-
SybilShield: An agent-aided social network-based sybil defense among multiple communities
-
L. Shi, S. Yu, W. Lou, and Y. Hou, "SybilShield: An agent-aided social network-based sybil defense among multiple communities," in INFOCOM, 2013 Proceedings IEEE, 2013, pp. 1034-1042.
-
(2013)
INFOCOM, 2013 Proceedings IEEE
, pp. 1034-1042
-
-
Shi, L.1
Yu, S.2
Lou, W.3
Hou, Y.4
-
10
-
-
0347608169
-
A logic for uncertain probabilities
-
A. Jøsang, "A logic for uncertain probabilities," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 9, no. 03, pp. 279-311, 2001.
-
(2001)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.9
, Issue.3
, pp. 279-311
-
-
Jøsang, A.1
-
11
-
-
0000077268
-
Measurement of specific interpersonal trust: Construction and validation of a scale to assess trust in a specific other
-
C. Johnson-George and W. C. Swap, "Measurement of specific interpersonal trust: Construction and validation of a scale to assess trust in a specific other." Journal of Personality and Social Psychology, vol. 43, no. 6, pp. 1306-1317, 1982.
-
(1982)
Journal of Personality and Social Psychology
, vol.43
, Issue.6
, pp. 1306-1317
-
-
Johnson-George, C.1
Swap, W.C.2
-
12
-
-
28844432363
-
Probabilistic prediction of peers performance in p2p networks
-
Z. Despotovic and K. Aberer, "Probabilistic prediction of peers performance in p2p networks," Engineering Applications of Artificial Intelligence, vol. 18, no. 7, pp. 771-780, 2005.
-
(2005)
Engineering Applications of Artificial Intelligence
, vol.18
, Issue.7
, pp. 771-780
-
-
Despotovic, Z.1
Aberer, K.2
-
13
-
-
84866485603
-
An efficient and versatile approach to trust and reputation using hierarchical bayesian modelling
-
W. Teacy, M. Luck, A. Rogers, and N. R. Jennings, "An efficient and versatile approach to trust and reputation using hierarchical bayesian modelling," Artificial Intelligence, vol. 193, no. 0, pp. 149-185, 2012.
-
(2012)
Artificial Intelligence
, vol.193
, Issue.0
, pp. 149-185
-
-
Teacy, W.1
Luck, M.2
Rogers, A.3
Jennings, N.R.4
-
14
-
-
79958778609
-
Dirichlet-based trust management for effective collaborative intrusion detection networks
-
C. J. Fung, J. Zhang, I. Aib, and R. Boutaba, "Dirichlet-based trust management for effective collaborative intrusion detection networks," Network and Service Management, IEEE Transactions on, vol. 8, no. 2, pp. 79-91, 2011.
-
(2011)
Network and Service Management, IEEE Transactions on
, vol.8
, Issue.2
, pp. 79-91
-
-
Fung, C.J.1
Zhang, J.2
Aib, I.3
Boutaba, R.4
-
15
-
-
38149043562
-
Semantic constraints for trust transitivity
-
Australian Computer Society, Inc.
-
A. Jøsang and S. Pope, "Semantic constraints for trust transitivity," in Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling-Vol.43. Australian Computer Society, Inc., 2005, pp. 59-68.
-
(2005)
Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling
, vol.43
, pp. 59-68
-
-
Jøsang, A.1
Pope, S.2
-
16
-
-
55849096985
-
Optimal trust network analysis with subjective logic
-
A. Josang and T. Bhuiyan, "Optimal trust network analysis with subjective logic," in Emerging Security Information, Systems and Technologies, 2008. SECURWARE'08. Second International Conference on. IEEE, 2008, pp. 179-184.
-
(2008)
Emerging Security Information, Systems and Technologies, 2008. SECURWARE'08. Second International Conference On. IEEE
, pp. 179-184
-
-
Josang, A.1
Bhuiyan, T.2
-
17
-
-
70350446538
-
Trust representation and aggregation in a distributed agent system
-
Y. Wang and M. P. Singh, "Trust representation and aggregation in a distributed agent system," in AAAI, vol. 6, 2006, pp. 1425-1430.
-
(2006)
AAAI
, vol.6
, pp. 1425-1430
-
-
Wang, Y.1
Singh, M.P.2
-
18
-
-
79956343086
-
A probabilistic approach for maintaining trust based on evidence
-
Y. Wang, C.-W. Hang, and M. P. Singh, "A probabilistic approach for maintaining trust based on evidence," Journal of Artificial Intelligence Research, vol. 40, no. 1, pp. 221-267, 2011.
-
(2011)
Journal of Artificial Intelligence Research
, vol.40
, Issue.1
, pp. 221-267
-
-
Wang, Y.1
Hang, C.-W.2
Singh, M.P.3
-
19
-
-
78649705255
-
Evidence-based trust: A mathematical model geared for multiagent systems
-
Y. Wang and M. P. Singh, "Evidence-based trust: A mathematical model geared for multiagent systems," ACM Trans. Auton. Adapt. Syst., vol. 5, no. 4, pp. 14:1-14:28, 2010.
-
(2010)
ACM Trans. Auton. Adapt. Syst.
, vol.5
, Issue.4
, pp. 141-1428
-
-
Wang, Y.1
Singh, M.P.2
-
20
-
-
77953576532
-
Using probabilistic confidence models for trust inference in web-based social networks
-
U. Kuter and J. Golbeck, "Using probabilistic confidence models for trust inference in web-based social networks," ACM Trans. Internet Technol., vol. 10, no. 2, pp. 8:1-8:23, 2010.
-
(2010)
ACM Trans. Internet Technol.
, vol.10
, Issue.2
, pp. 81-823
-
-
Kuter, U.1
Golbeck, J.2
-
21
-
-
84896062976
-
Operators for propagating trust and their evaluation in social networks
-
C.-W. Hang, Y. Wang, and M. P. Singh, "Operators for propagating trust and their evaluation in social networks," in Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 2, 2009, pp. 1025-1032.
-
(2009)
Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems
, vol.2
, pp. 1025-1032
-
-
Hang, C.-W.1
Wang, Y.2
Singh, M.P.3
-
22
-
-
77953306999
-
A formal study of trust-based routing in wireless ad hoc networks
-
C. Zhang, X. Zhu, Y. Song, and Y. Fang, "A formal study of trust-based routing in wireless ad hoc networks," in INFOCOM, 2010 Proceedings IEEE. IEEE, 2010, pp. 1-9.
-
(2010)
INFOCOM, 2010 Proceedings IEEE. IEEE
, pp. 1-9
-
-
Zhang, C.1
Zhu, X.2
Song, Y.3
Fang, Y.4
-
23
-
-
84957059772
-
Space efficient algorithms for series-parallel graphs
-
Springer
-
A. Jakoby, M. Liskiewicz, and R. Reischuk, "Space efficient algorithms for series-parallel graphs," in STACS 2001. Springer, 2001, pp. 339-352.
-
(2001)
STACS 2001
, pp. 339-352
-
-
Jakoby, A.1
Liskiewicz, M.2
Reischuk, R.3
|