-
3
-
-
84889593981
-
Mining large streams of user data for personalized recommendations
-
2012
-
X. Amatriain. 2012. Mining large streams of user data for personalized recommendations. SIGKDD Explorations 14, 2 (2012), 37-48.
-
(2012)
SIGKDD Explorations
, vol.14
, Issue.2
, pp. 37-48
-
-
Amatriain, X.1
-
4
-
-
49249126404
-
Trust-based recommendation systems: An axiomatic approach
-
2008
-
R. Andersen, C. Borgs, J. Chayes, U. Feige, A. Flaxman, A. Kalai, V. Mirrokni, and M. Tennenholtz. 2008. Trust-based recommendation systems: An axiomatic approach. In Proceedings of the 17th ACM International Conference on World Wide Web (WWW) (2008), 199-208.
-
(2008)
Proceedings of the 17th ACM International Conference on World Wide Web (WWW)
, pp. 199-208
-
-
Andersen, R.1
Borgs, C.2
Chayes, J.3
Feige, U.4
Flaxman, A.5
Kalai, A.6
Mirrokni, V.7
Tennenholtz, M.8
-
5
-
-
33750998761
-
Social balance on networks: The dynamics of friendship and enmity
-
2006
-
T. Antal, P. L. Krapivsky, and S. Redner. 2006. Social balance on networks: The dynamics of friendship and enmity. Physica D: Nonlinear Phenomena 224 (2006), 130-136.
-
(2006)
Physica D: Nonlinear Phenomena
, vol.224
, pp. 130-136
-
-
Antal, T.1
Krapivsky, P.L.2
Redner, S.3
-
8
-
-
70350564215
-
The socialtrust framework for trusted social information management: Architecture and algorithms
-
January 2010
-
J. Caverleea, L. Liu, and S. Web. 2010. The socialtrust framework for trusted social information management: Architecture and algorithms. Information Sciences 180(1) (January 2010), 95-112.
-
(2010)
Information Sciences
, vol.180
, Issue.1
, pp. 95-112
-
-
Caverleea, J.1
Liu, L.2
Web, S.3
-
9
-
-
84930863652
-
k-FuzzyTrust: An efficient trust computation for large-scale mobile social networks using fuzzy implicit social graph
-
2014
-
S. Chen, G. Wang, and W. Jia. 2014. k-FuzzyTrust: An efficient trust computation for large-scale mobile social networks using fuzzy implicit social graph. Elsevier: Information Sciences. DOI information:10.1016/j.ins.2014.09.058 (2014).
-
(2014)
Elsevier: Information Sciences
-
-
Chen, S.1
Wang, G.2
Jia, W.3
-
10
-
-
84880122204
-
Influence maximization in social networks when negative opinions may emerge and propagate
-
W. Chen, A. Collins, R. Cummings, T. Ke, Z. Liu, D. Rincon, X. Sun, Y. Wang, W. Wei, and Y. Yuan. 2011. Influence maximization in social networks when negative opinions may emerge and propagate. In Proceedings of the 11th SIAM International Conference on Data Mining (SDM). 379-390.
-
(2011)
Proceedings of the 11th SIAM International Conference on Data Mining (SDM)
, pp. 379-390
-
-
Chen, W.1
Collins, A.2
Cummings, R.3
Ke, T.4
Liu, Z.5
Rincon, D.6
Sun, X.7
Wang, Y.8
Wei, W.9
Yuan, Y.10
-
13
-
-
84945919302
-
A survey on trust modeling
-
2015
-
J. Cho, K. Chan, and S. Adali. 2015. A survey on trust modeling. ACM Computing Surveys (CSUR) 48, 2 (2015), 28.
-
(2015)
ACM Computing Surveys (CSUR)
, vol.48
, Issue.2
, pp. 28
-
-
Cho, J.1
Chan, K.2
Adali, S.3
-
14
-
-
84857844113
-
A survey on trust management for mobile ad hoc networks
-
2011
-
J. Cho, A. Swami, and I. Chen. 2011. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys Tutorials 13, 4 (2011), 562-583.
-
(2011)
IEEE Communications Surveys Tutorials
, vol.13
, Issue.4
, pp. 562-583
-
-
Cho, J.1
Swami, A.2
Chen, I.3
-
15
-
-
84858050885
-
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
-
2012
-
J. Cho, A. Swami, and I. Chen. 2012. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications 35(3) (2012), 1001-1012.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.3
, pp. 1001-1012
-
-
Cho, J.1
Swami, A.2
Chen, I.3
-
16
-
-
0000283893
-
Social Influence: Social Norms, Conformity and Compliance
-
(4th ed.). McGraw-Hill
-
B. Cialdini and R. Trost. 1998. Social Influence: Social Norms, Conformity and Compliance. The handbook of social psychology, Vol. 1 and 2 (4th ed.). McGraw-Hill.
-
(1998)
The Handbook of Social Psychology
, vol.1-2
-
-
Cialdini, B.1
Trost, R.2
-
18
-
-
85206061973
-
-
Homepage
-
Clever. 2014. Homepage. Retrieved from http://www.research.ibm.com/topics/popups/innovate/hci/html/chow.html.
-
(2014)
Clever
-
-
-
19
-
-
21644443762
-
Trust building via risk taking: A cross-societal experiment
-
June 2005
-
S. Cook, T. Yamagishi, C. Cheshire, R. Cooper, M. Matsuda, and R. Mashima. 2005. Trust building via risk taking: A cross-societal experiment. Social Psychology Quarterly 68, 2 (June 2005), 121-142.
-
(2005)
Social Psychology Quarterly
, vol.68
, Issue.2
, pp. 121-142
-
-
Cook, S.1
Yamagishi, T.2
Cheshire, C.3
Cooper, R.4
Matsuda, M.5
Mashima, R.6
-
20
-
-
65449185511
-
Feedback effects between similarity and social influence in online communities
-
D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg, and S. Suri. 2008. Feedback effects between similarity and social influence in online communities. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 160-168. http://doi.acm.org/10.1145/1401890.1401914
-
(2008)
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 160-168
-
-
Crandall, D.1
Cosley, D.2
Huttenlocher, D.3
Kleinberg, J.4
Suri, S.5
-
23
-
-
0000516376
-
Upper and lower probabilities induced by a multivalued mapping
-
1967
-
A. Dempster. 1967. Upper and lower probabilities induced by a multivalued mapping. Annals of Mathematical Statistics 38, 2 (1967), 325-339.
-
(1967)
Annals of Mathematical Statistics
, vol.38
, Issue.2
, pp. 325-339
-
-
Dempster, A.1
-
25
-
-
68949206252
-
An analysis of the exponential decay principle in probabilistic trust models
-
2009
-
E. ElSalamouny, K. Krukow, and V. Sassone. 2009. An analysis of the exponential decay principle in probabilistic trust models. Theoretical Computer Science 410, 41 (2009), 4067-4084.
-
(2009)
Theoretical Computer Science
, vol.410
, Issue.41
, pp. 4067-4084
-
-
ElSalamouny, E.1
Krukow, K.2
Sassone, V.3
-
27
-
-
0004198018
-
-
Princeton University Press, Princeton, NJ (1962)
-
L. Ford and R. Fulkerson. 1962. Flows in Networks. Princeton University Press, Princeton, NJ (1962).
-
(1962)
Flows in Networks
-
-
Ford, L.1
Fulkerson, R.2
-
28
-
-
1142268386
-
Reflections on the dimensions of trust and trustworthiness among online consumers
-
2002
-
D. Gefen. 2002. Reflections on the dimensions of trust and trustworthiness among online consumers. SIGMIS Database 33, 3 (2002), 38-53. http://doi.acm.org/10.1145/569905.569910
-
(2002)
SIGMIS Database
, vol.33
, Issue.3
, pp. 38-53
-
-
Gefen, D.1
-
29
-
-
84871553108
-
The boundaries of trust and risk: The quadratic moderating role of institutional structures
-
2012
-
D. Gefen and P. A. Pavlou. 2012. The boundaries of trust and risk: The quadratic moderating role of institutional structures. Information Systems Research 23, 3-part-2 (2012), 940-959.
-
(2012)
Information Systems Research
, vol.23
, Issue.3
, pp. 940-959
-
-
Gefen, D.1
Pavlou, P.A.2
-
32
-
-
33845467053
-
Inferring binary trust relationships in web-based social networks
-
2006
-
J. Golbeck and J. Hendler. 2006. Inferring binary trust relationships in web-based social networks. ACM Transactions on Internet Technology (TOIT) 6, 4 (2006), 497-529.
-
(2006)
ACM Transactions on Internet Technology (TOIT)
, vol.6
, Issue.4
, pp. 497-529
-
-
Golbeck, J.1
Hendler, J.2
-
34
-
-
0002572137
-
Individuals, interpersonal relations and trust
-
D. Gambetta (Ed.). chapter 3 (1988), NewYork: Basil Black
-
D. Good. 1988. Individuals, interpersonal relations and trust. In Trust: Making and Breaking Cooperative Relations, D. Gambetta (Ed.). chapter 3 (1988), 31-48, NewYork: Basil Black.
-
(1988)
Trust: Making and Breaking Cooperative Relations
, pp. 31-48
-
-
Good, D.1
-
35
-
-
0009481412
-
A survey of trust in internet applications
-
Oct. 2000
-
T. Grandison and M. Sloman. 2000. A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3, 4 (Oct. 2000), 2-16. DOI:http://dx.doi.org/10.1109/COMST.2000.5340804
-
(2000)
IEEE Communications Surveys and Tutorials
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
36
-
-
0000917844
-
The strength of weak ties: A network theory revisited
-
1983
-
M. Granovetter. 1983. The strength of weak ties: A network theory revisited. Sociological Theory 1 (1983), 201-233.
-
(1983)
Sociological Theory
, vol.1
, pp. 201-233
-
-
Granovetter, M.1
-
37
-
-
4544337627
-
-
Technical Report. Stanford Knowledge Systems Laboratory, Stanford, CA
-
R. Guha. 2003. Open Rating Systems. Technical Report. Stanford Knowledge Systems Laboratory, Stanford, CA.
-
(2003)
Open Rating Systems
-
-
Guha, R.1
-
40
-
-
84875836507
-
Shin: Generalized trust propagation with limited evidence
-
2013
-
C. Hang, Z. Zhang, and M. P. Singh. 2013. Shin: Generalized trust propagation with limited evidence. Computer 46, 3 (2013), 78-85.
-
(2013)
Computer
, vol.46
, Issue.3
, pp. 78-85
-
-
Hang, C.1
Zhang, Z.2
Singh, M.P.3
-
41
-
-
84893451982
-
On the application of supervised machine learning to trustworthiness assessment
-
2013
-
S. Hauke, S. Biedermanny, M. Muhlhauser, and D. Heider. 2013. On the application of supervised machine learning to trustworthiness assessment. In Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2013), 525-534.
-
(2013)
Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 525-534
-
-
Hauke, S.1
Biedermanny, S.2
Muhlhauser, M.3
Heider, D.4
-
42
-
-
85206058059
-
Pretty good privacy (PGP)
-
T. Van, C. A. Henk, and S. Jajodia (Eds.). Springer
-
C. Heinrich. 2011. Pretty good privacy (PGP). In Encyclopedia of Cryptography and Security (2nd Ed.), T. Van, C. A. Henk, and S. Jajodia (Eds.). Springer, 955-958.
-
(2011)
Encyclopedia of Cryptography and Security (2nd Ed.)
, pp. 955-958
-
-
Heinrich, C.1
-
43
-
-
71649094416
-
A survey of attack and defense techniques for reputation systems
-
2009
-
K. Hoffman, D. Zage, and C. Nita-Rotaru. 2009. A survey of attack and defense techniques for reputation systems. Computer Surveys 42, 1 (2009), 1-31.
-
(2009)
Computer Surveys
, vol.42
, Issue.1
, pp. 1-31
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
44
-
-
33646262580
-
Reputation in auctions: Theory and evidence from eBay
-
2006
-
D. Houser and J. Wooders. 2006. Reputation in auctions: Theory and evidence from eBay. Journal of Economics & Management Strategy 15, 2 (2006), 353-369.
-
(2006)
Journal of Economics & Management Strategy
, vol.15
, Issue.2
, pp. 353-369
-
-
Houser, D.1
Wooders, J.2
-
48
-
-
84890115875
-
Generating trusted graphs for trust evaluation in online social networks
-
2014
-
W. Jiang, G. Wang, and J. Wu. 2014. Generating trusted graphs for trust evaluation in online social networks. Future Generation Computer Systems 31 (2014), 48-58.
-
(2014)
Future Generation Computer Systems
, vol.31
, pp. 48-58
-
-
Jiang, W.1
Wang, G.2
Wu, J.3
-
50
-
-
84962046506
-
Trust evaluation in online social networks using generalized flow
-
2016
-
W. Jiang, J. Wu, F. Li, G. Wang, and H. Zheng. 2016. Trust evaluation in online social networks using generalized flow. IEEE Transactions on Computers 65(3) (2016), 952-963.
-
(2016)
IEEE Transactions on Computers
, vol.65
, Issue.3
, pp. 952-963
-
-
Jiang, W.1
Wu, J.2
Li, F.3
Wang, G.4
Zheng, H.5
-
52
-
-
84948955639
-
On selecting recommenders for trust evaluation in online social networks
-
2015
-
W. Jiang, J. Wu, and G. Wang. 2015. On selecting recommenders for trust evaluation in online social networks. ACM Transactions on Internet Technology (TOIT) 15(4) (2015), Article 14.
-
(2015)
ACM Transactions on Internet Technology (TOIT)
, vol.15
, Issue.4
-
-
Jiang, W.1
Wu, J.2
Wang, G.3
-
54
-
-
84963778744
-
Forming opinions via trusted friends: Time-evolving rating prediction using fluid dynamics
-
2016
-
W. Jiang, J. Wu, G. Wang, and H. Zheng. 2016. Forming opinions via trusted friends: Time-evolving rating prediction using fluid dynamics. IEEE Transactions on Computers 65, 4 (2016), 1211-1224. DOI:10.1109/TC.2015.2444842
-
(2016)
IEEE Transactions on Computers
, vol.65
, Issue.4
, pp. 1211-1224
-
-
Jiang, W.1
Wu, J.2
Wang, G.3
Zheng, H.4
-
57
-
-
33744773886
-
Simplification and analysis of transitive trust networks
-
2006
-
A. Jøsang, E. Gray, and M. Kinateder. 2006a. Simplification and analysis of transitive trust networks. Web Intelligence and Agent System 4 (2) (2006), 139-161.
-
(2006)
Web Intelligence and Agent System
, vol.4
, Issue.2
, pp. 139-161
-
-
Jøsang, A.1
Gray, E.2
Kinateder, M.3
-
59
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
2007
-
A. Jøsang, R. Ismail, and C. Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (2007), 618-644.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
60
-
-
84868142548
-
Dempster's rule as seen by little colored balls
-
2012
-
A. Jøsang and S. Pope. 2012. Dempster's rule as seen by little colored balls. Computational Intelligence 28, 4 (2012), 453-474.
-
(2012)
Computational Intelligence
, vol.28
, Issue.4
, pp. 453-474
-
-
Jøsang, A.1
Pope, S.2
-
61
-
-
0014178927
-
A new scale for the measurement of interpersonal trust
-
1967
-
B. R. Julian.1967. A new scale for the measurement of interpersonal trust. Journal of Personality 4 (1967), 651-665.
-
(1967)
Journal of Personality
, vol.4
, pp. 651-665
-
-
Julian, B.R.1
-
64
-
-
80051470135
-
Strategies for predicting local trust based on trust propagation in social networks
-
2011
-
Y. A. Kim and H. S. Song. 2011. Strategies for predicting local trust based on trust propagation in social networks. Knowledge-Based Systems 24(8) (2011), 1360-1371.
-
(2011)
Knowledge-Based Systems
, vol.24
, Issue.8
, pp. 1360-1371
-
-
Kim, Y.A.1
Song, H.S.2
-
65
-
-
84893721621
-
Hubs, authorities, and communities
-
1999
-
J. M. Kleinberg. 1999. Hubs, authorities, and communities. Computer Surveys 31, 4es, Article 5 (1999).
-
(1999)
Computer Surveys
, vol.31
, Issue.4
-
-
Kleinberg, J.M.1
-
68
-
-
65349083748
-
Fuzzy trust aggregation and personalized trust inference in virtual social networks
-
2009
-
M. Lesani and N. Montazeri. 2009. Fuzzy trust aggregation and personalized trust inference in virtual social networks. Computational Intelligence 25 (2) (2009), 51-83.
-
(2009)
Computational Intelligence
, vol.25
, Issue.2
, pp. 51-83
-
-
Lesani, M.1
Montazeri, N.2
-
74
-
-
77952978241
-
Uncertainty modeling and reduction in MANETs
-
2010
-
F. Li and J. Wu. 2010. Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing 9, 7 (2010), 1035-1048.
-
(2010)
IEEE Transactions on Mobile Computing
, vol.9
, Issue.7
, pp. 1035-1048
-
-
Li, F.1
Wu, J.2
-
75
-
-
0032119093
-
Toward a qualitative search engine
-
1998
-
Y. Li. 1998. Toward a qualitative search engine. IEEE Internet Computing 2, 4 (1998), 24-29.
-
(1998)
IEEE Internet Computing
, vol.2
, Issue.4
, pp. 24-29
-
-
Li, Y.1
-
76
-
-
67649643417
-
Smallblue: Social network analysis for expertise search and collective intelligence
-
C. Lin, N. Cao, S. Liuand S. Papadimitriou, J. Sun, and X. Yan. 2009a. Smallblue: Social network analysis for expertise search and collective intelligence. In Proceedings of the 25th International Conference on Data Engineering (ICDE). 1483-1486.
-
(2009)
Proceedings of the 25th International Conference on Data Engineering (ICDE)
, pp. 1483-1486
-
-
Lin, C.1
Cao, N.2
Liuand, S.3
Papadimitriou, S.4
Sun, J.5
Yan, X.6
-
77
-
-
70449836186
-
Hierarchical fuzzy trust management for peer-to-peer network
-
H. Lin, X. Wu, and H. Lin. 2009b. Hierarchical fuzzy trust management for peer-to-peer network. In ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM), Vol. 4. 377-380.
-
(2009)
ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM)
, vol.4
, pp. 377-380
-
-
Lin, H.1
Wu, X.2
Lin, H.3
-
78
-
-
84878843099
-
Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks
-
2013
-
G. Liu, Y. Wang, M. A. Orgun, and E. Lim. 2013b. Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Transactions on Services Computing 6(2) (2013), 152-167.
-
(2013)
IEEE Transactions on Services Computing
, vol.6
, Issue.2
, pp. 152-167
-
-
Liu, G.1
Wang, Y.2
Orgun, M.A.3
Lim, E.4
-
79
-
-
84904420643
-
Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic
-
G. Liu, Q. Yang, H. Wang, X. Lin, and M. Wittie. 2014. Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. In Proceedings of the 33rd IEEE International Conference on Computer Communications (INFOCOM). 1698-1706.
-
(2014)
Proceedings of the 33rd IEEE International Conference on Computer Communications (INFOCOM)
, pp. 1698-1706
-
-
Liu, G.1
Yang, Q.2
Wang, H.3
Lin, X.4
Wittie, M.5
-
81
-
-
85206036264
-
A generic trust framework for large-scale open systems using machine learning
-
2013
-
X. Liu, G. Tredan, and A. Datta. 2013a. A generic trust framework for large-scale open systems using machine learning. Computational Intelligence (2013).
-
(2013)
Computational Intelligence
-
-
Liu, X.1
Tredan, G.2
Datta, A.3
-
83
-
-
84926455204
-
Social network and tag sources based augmenting collaborative recommender system
-
T. Ma, J. Zhou, M. Tang, Y. Tian, A. Al-Dhelaan, M. Al-Rodhaan, and S. Lee. 2015. Social network and tag sources based augmenting collaborative recommender system. IEICE Transactions on Information and Systems E98-D, 4, 902-910.
-
(2015)
IEICE Transactions on Information and Systems
, vol.E98-D
, Issue.4
, pp. 902-910
-
-
Ma, T.1
Zhou, J.2
Tang, M.3
Tian, Y.4
Al-Dhelaan, A.5
Al-Rodhaan, M.6
Lee, S.7
-
87
-
-
77950627981
-
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
-
2010
-
F. G. Marmol and G. M. Perez. 2010. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards and Interfaces 32 (2010), 185-196.
-
(2010)
Computer Standards and Interfaces
, vol.32
, pp. 185-196
-
-
Marmol, F.G.1
Perez, G.M.2
-
88
-
-
0003839495
-
-
PhD Thesis, Department of Mathematics and Computer Science, University of Stirling, Stirling, UK (1994)
-
S. Marsh. 1994. Formalising trust as a computational concept. PhD Thesis, Department of Mathematics and Computer Science, University of Stirling, Stirling, UK (1994).
-
(1994)
Formalising Trust as a Computational Concept
-
-
Marsh, S.1
-
89
-
-
29244436370
-
Taxonomy of trust: Categorizing P2P reputation systems
-
March 2006
-
S. Marti and H. Garcia-Molina. 2006. Taxonomy of trust: Categorizing P2P reputation systems. Computer Networks 50(4) (March 2006), 472-484.
-
(2006)
Computer Networks
, vol.50
, Issue.4
, pp. 472-484
-
-
Marti, S.1
Garcia-Molina, H.2
-
92
-
-
56649092791
-
Trust metrics on controversial users: Balancing between tyranny of the majority and echo chambers
-
2007
-
P. Massa and P. Avesani. 2007b. Trust metrics on controversial users: Balancing between tyranny of the majority and echo chambers. International Journal on Semantic Web and Information Systems 3 (2007), 39-64.
-
(2007)
International Journal on Semantic Web and Information Systems
, vol.3
, pp. 39-64
-
-
Massa, P.1
Avesani, P.2
-
94
-
-
85086528004
-
Using trust in recommender systems: An experimental analysis
-
P. Massa and B. Bhattacharjee. 2004. Using trust in recommender systems: An experimental analysis. In Trust Management. Vol. 2995. 221-235.
-
(2004)
Trust Management
, vol.2995
, pp. 221-235
-
-
Massa, P.1
Bhattacharjee, B.2
-
95
-
-
42149117427
-
Measurement and analysis of online social networks
-
2007
-
A. Mislove, M. Marcon, K. Gummadi, P. Druschel, and B. Bhattacharjee. 2007. Measurement and analysis of online social networks. In Proceedings of the 5th ACM/Usenix Internet Measurement Conference (IMC) (2007), 29-42.
-
(2007)
Proceedings of the 5th ACM/Usenix Internet Measurement Conference (IMC)
, pp. 29-42
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.3
Druschel, P.4
Bhattacharjee, B.5
-
96
-
-
80054703857
-
Ostra: Leveraging trust to thwart unwanted communication
-
USENIX Association, Berkeley, CA
-
A. Mislove, A. Post, P. Druschel, and K. Gummadi. 2008. Ostra: Leveraging trust to thwart unwanted communication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI). USENIX Association, Berkeley, CA, 15-30.
-
(2008)
Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI)
, pp. 15-30
-
-
Mislove, A.1
Post, A.2
Druschel, P.3
Gummadi, K.4
-
98
-
-
0035343905
-
The nature of trust: From Georg Simmel to a theory of expectation, interpretation and suspension
-
2001
-
G. Möllering. 2001. The nature of trust: From Georg Simmel to a theory of expectation, interpretation and suspension. Sociology 35, 2 (2001), 403-420.
-
(2001)
Sociology
, vol.35
, Issue.2
, pp. 403-420
-
-
Möllering, G.1
-
100
-
-
0035532948
-
Trust, social capital, civil society, and democracy
-
2001
-
K. Newton. 2001. Trust, social capital, civil society, and democracy. International Political Science Review 22, 2 (2001), 201-214.
-
(2001)
International Political Science Review
, vol.22
, Issue.2
, pp. 201-214
-
-
Newton, K.1
-
103
-
-
84887477922
-
Trust management of services in cloud environments: Obstacles and solutions
-
2013
-
T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu. 2013. Trust management of services in cloud environments: Obstacles and solutions. Computer Surveys 46(1), 4 (2013), 12:1-12:30.
-
(2013)
Computer Surveys
, vol.46
, Issue.1-4
, pp. 12:1-12:30
-
-
Noor, T.H.1
Sheng, Q.Z.2
Zeadally, S.3
Yu, J.4
-
104
-
-
77958015833
-
The state of the art in trust and reputation systems: A framework for comparison
-
Aug. 2010
-
Z. Noorian and M. Ulieru. 2010. The state of the art in trust and reputation systems: A framework for comparison. Journal of Theoretical and Applied Electronic Commerce Research 5, 2 (Aug. 2010), 97-117.
-
(2010)
Journal of Theoretical and Applied Electronic Commerce Research
, vol.5
, Issue.2
, pp. 97-117
-
-
Noorian, Z.1
Ulieru, M.2
-
107
-
-
77950193796
-
Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks
-
2010
-
S. Peng, W. Jia, G. Wang, J. Wu, and M. Guo. 2010. Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks. IEICE Transactions on Information and Systems 93-D (2010), 510-517.
-
(2010)
IEICE Transactions on Information and Systems
, vol.93 D
, pp. 510-517
-
-
Peng, S.1
Jia, W.2
Wang, G.3
Wu, J.4
Guo, M.5
-
109
-
-
84878107220
-
Computational trust and reputation models for open multi-agent systems: A review
-
2013
-
I. Pinyol and J. Sabater-Mir. 2013. Computational trust and reputation models for open multi-agent systems: A review. Artificial Intelligence Review 40, 1 (2013), 1-25.
-
(2013)
Artificial Intelligence Review
, vol.40
, Issue.1
, pp. 1-25
-
-
Pinyol, I.1
Sabater-Mir, J.2
-
111
-
-
84873157193
-
Online social networks and social network services: A technical survey
-
M. Ilyas and H. Mouftah (Eds.). CRC Press
-
H. Quan, J. Wu, and Y. Shi. 2011. Online social networks and social network services: A technical survey. Handbook of Pervasive Communication, M. Ilyas and H. Mouftah (Eds.). CRC Press.
-
(2011)
Handbook of Pervasive Communication
-
-
Quan, H.1
Wu, J.2
Shi, Y.3
-
112
-
-
77955270883
-
Social influence
-
A. S. R. Manstead, M. Hewstone (Eds.), Blackwell Publishing
-
L. Rashotte. 2007. Social influence. A. S. R. Manstead, M. Hewstone (Eds.), The Blackwell Encyclopedia of Social Psychology, Blackwell Publishing, 562-563.
-
(2007)
The Blackwell Encyclopedia of Social Psychology
, pp. 562-563
-
-
Rashotte, L.1
-
113
-
-
0002101577
-
Reputation systems
-
2000
-
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman. 2000. Reputation systems. Communications of the ACM 43, 12 (2000), 45-48.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
114
-
-
34547637688
-
Trust among strangers in internet transactions: Empirical analysis of eBay's reputation system
-
M. R. Baye (Ed.). JAI Press Inc.
-
P. Resnick and R. Zeckhauser. 2002. Trust among strangers in internet transactions: Empirical analysis of eBay's reputation system. In The Economics of the Internet and E-Commerce, M. R. Baye (Ed.). Vol. 11. JAI Press Inc., 127-157.
-
(2002)
The Economics of the Internet and E-Commerce
, vol.11
, pp. 127-157
-
-
Resnick, P.1
Zeckhauser, R.2
-
118
-
-
85006210403
-
Review on computational trust and reputation models
-
2005
-
J. Sabater and C. Sierra. 2005. Review on computational trust and reputation models. Artificial Intelligence Review 24(1) (2005), 33-60.
-
(2005)
Artificial Intelligence Review
, vol.24
, Issue.1
, pp. 33-60
-
-
Sabater, J.1
Sierra, C.2
-
121
-
-
84885211259
-
A survey of trust in social networks
-
2013
-
W. Sherchan, S. Nepal, and C. Paris. 2013. A survey of trust in social networks. Computer Surveys 45, 4 (2013), 47:1-47:33.
-
(2013)
Computer Surveys
, vol.45
, Issue.4
, pp. 47:1-47:33
-
-
Sherchan, W.1
Nepal, S.2
Paris, C.3
-
123
-
-
84864182941
-
Reputation and trust-based systems for ad hoc and sensor networks
-
A. Boukerche (Ed.), Wiley, (2008)
-
A. Srinivasan, J. Teitelbaum, H. Liang, J. Wu, and M. Cardei. 2008. Reputation and trust-based systems for ad hoc and sensor networks. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks, A. Boukerche (Ed.), Wiley, ISBN: 978-0-470-38358-2 (2008).
-
(2008)
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks
-
-
Srinivasan, A.1
Teitelbaum, J.2
Liang, H.3
Wu, J.4
Cardei, M.5
-
125
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
2006
-
Y. Sun, W. Yu, Z. Han, and K. Liu. 2006b. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24, 2 (2006), 305-317.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Liu, K.4
-
126
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
2006
-
Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu. 2006a. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proceedings of IEEE INFOCOM (2006), 1-13.
-
(2006)
Proceedings of IEEE INFOCOM
, pp. 1-13
-
-
Sun, Y.L.1
Han, Z.2
Yu, W.3
Liu, K.J.R.4
-
131
-
-
0344280869
-
Beyond recommender systems: Helping people help each other
-
L. Terveen and W. Hill. 2001. Beyond recommender systems: Helping people help each other. In HCI in the New Millennium. 487-509.
-
(2001)
HCI in the New Millennium
, pp. 487-509
-
-
Terveen, L.1
Hill, W.2
-
133
-
-
84887052468
-
Sybil-resilient online content voting
-
D. N. Tran, B. Min, J. Li, and L. Subramanian. 2009. Sybil-resilient online content voting. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Vol. 9. 15-28.
-
(2009)
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI)
, vol.9
, pp. 15-28
-
-
Tran, D.N.1
Min, B.2
Li, J.3
Subramanian, L.4
-
135
-
-
85206049870
-
-
2014
-
Trustlet. 2014. Index of Advogato Dataset: http://www.trustlet.org/datasets/advogato/. (2014).
-
(2014)
Index of Advogato Dataset
-
-
-
136
-
-
84874737209
-
An analysis of social network-based sybil defenses
-
2011
-
B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. 2011. An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review 41, 4 (2011), 363-374.
-
(2011)
ACM SIGCOMM Computer Communication Review
, vol.41
, Issue.4
, pp. 363-374
-
-
Viswanath, B.1
Post, A.2
Gummadi, K.P.3
Mislove, A.4
-
137
-
-
84906079432
-
Fine-grained feature-based social influence evaluation in online social networks
-
2014
-
G. Wang, W. Jiang, J. Wu, and Z. Xiong. 2014. Fine-grained feature-based social influence evaluation in online social networks. IEEE Transactions on Parallel and Distributed Systems 25, 9 (2014), 2286-2296.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.9
, pp. 2286-2296
-
-
Wang, G.1
Jiang, W.2
Wu, J.3
Xiong, Z.4
-
138
-
-
79958065264
-
FlowTrust: Trust inference with network flows
-
2011
-
G. Wang and J. Wu. 2011a. FlowTrust: Trust inference with network flows. Frontiers of Computer Science in China 5(2) (2011), 181-194.
-
(2011)
Frontiers of Computer Science in China
, vol.5
, Issue.2
, pp. 181-194
-
-
Wang, G.1
Wu, J.2
-
139
-
-
79951851519
-
Multi-dimensional evidence-based trust management with multi-trusted paths
-
2011
-
G. Wang and J. Wu. 2011b. Multi-dimensional evidence-based trust management with multi-trusted paths. Future Generation Computer Systems (Elsevier) 27(5) (2011), 529-538.
-
(2011)
Future Generation Computer Systems (Elsevier)
, vol.27
, Issue.5
, pp. 529-538
-
-
Wang, G.1
Wu, J.2
-
142
-
-
85206048421
-
Trust mechanisms and their applications in MANETs
-
J. Wu. 2009. Trust mechanisms and their applications in MANETs. Keynote speech in IEEE TrustCom'09.
-
(2009)
Keynote Speech in IEEE TrustCom'09
-
-
Wu, J.1
-
143
-
-
81255162557
-
A subjective trust management model with multiple decision factors for MANET based on AHP and fuzzy logic rules
-
H. Xia, Z. Jia, L. Ju, X. Li, and Y. Zhu. 2011. A subjective trust management model with multiple decision factors for MANET based on AHP and fuzzy logic rules. In Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom). 124-130.
-
(2011)
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom)
, pp. 124-130
-
-
Xia, H.1
Jia, Z.2
Ju, L.3
Li, X.4
Zhu, Y.5
-
145
-
-
80052396145
-
Like like alike: Joint friendship and interest propagation in social networks
-
S. Yang, B. Long, A. Smola, N. Sadagopan, Z. Zheng, and H. Zha. 2011a. Like like alike: Joint friendship and interest propagation in social networks. In Proceedings of the 20th ACM International Conference on World Wide Web (WWW). 537-546.
-
(2011)
Proceedings of the 20th ACM International Conference on World Wide Web (WWW)
, pp. 537-546
-
-
Yang, S.1
Long, B.2
Smola, A.3
Sadagopan, N.4
Zheng, Z.5
Zha, H.6
-
146
-
-
80052129672
-
Collaborative competitive filtering: Learning recommender using context of user choice
-
S. Yang, B. Long, A. Smola, H. Zha, and Z. Zheng. 2011b. Collaborative competitive filtering: Learning recommender using context of user choice. In Proceedings of the 34th International ACM Conference on Research and Development in Information Retrieval (SIGIR). 295-304.
-
(2011)
Proceedings of the 34th International ACM Conference on Research and Development in Information Retrieval (SIGIR)
, pp. 295-304
-
-
Yang, S.1
Long, B.2
Smola, A.3
Zha, H.4
Zheng, Z.5
-
148
-
-
84859974140
-
Addressing common vulnerabilities of reputation systems for electronic commerce
-
April 2012
-
Y. Yao, S. Ruohomaa, and F. Xu. 2012a. Addressing common vulnerabilities of reputation systems for electronic commerce. Journal of Theoretical and Applied Electronic Commerce Research 7, 1 (April 2012), 1-20.
-
(2012)
Journal of Theoretical and Applied Electronic Commerce Research
, vol.7
, Issue.1
, pp. 1-20
-
-
Yao, Y.1
Ruohomaa, S.2
Xu, F.3
-
149
-
-
84874253276
-
Subgraph extraction for trust inference in social networks
-
IEEE Computer Society
-
Y. Yao, H. Tong, F. Xu, and J. Lu. 2012b. Subgraph extraction for trust inference in social networks. In ASONAM. IEEE Computer Society, 163-170.
-
(2012)
ASONAM
, pp. 163-170
-
-
Yao, Y.1
Tong, H.2
Xu, F.3
Lu, J.4
-
150
-
-
84890644208
-
MATRI: A multi-aspect and transitive trust inference model
-
Y. Yao, H. Tong, X. Yan, F. Xu, and J. Lu. 2013. MATRI: A multi-aspect and transitive trust inference model. In Proceedings of the 22nd ACM International Conference on World Wide Web (WWW). 1467-1476.
-
(2013)
Proceedings of the 22nd ACM International Conference on World Wide Web (WWW)
, pp. 1467-1476
-
-
Yao, Y.1
Tong, H.2
Yan, X.3
Xu, F.4
Lu, J.5
-
151
-
-
84898975095
-
Generalized belief propagation
-
eds. T. K. Leen, T. G. Dietterich, and V. Tresp, MIT Press (2001)
-
J. S. Yedidia, W. T. Freeman, and Y. Weiss. 2001. Generalized belief propagation. Advances in Neural Information Processing Systems 13, eds. T. K. Leen, T. G. Dietterich, and V. Tresp, MIT Press (2001).
-
(2001)
Advances in Neural Information Processing Systems 13
-
-
Yedidia, J.S.1
Freeman, W.T.2
Weiss, Y.3
-
154
-
-
33750285481
-
SybilGuard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. 2006. SybilGuard: Defending against sybil attacks via social networks. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM). 267-278.
-
(2006)
Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
155
-
-
77956948315
-
A survey of trust and reputation management systems in wireless communications
-
2010
-
H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato. 2010. A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 98(10) (2010), 1755-1772.
-
(2010)
Proceedings of the IEEE
, vol.98
, Issue.10
, pp. 1755-1772
-
-
Yu, H.1
Shen, Z.2
Miao, C.3
Leung, C.4
Niyato, D.5
-
156
-
-
84858038684
-
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
-
(2012), Special Issue on Trusted Computing and Communications
-
Y. Yu, K. Li, W. Zhou, and P. Li. 2012. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications 35, 3 (2012), 867-880. Special Issue on Trusted Computing and Communications.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.3
, pp. 867-880
-
-
Yu, Y.1
Li, K.2
Zhou, W.3
Li, P.4
-
157
-
-
77549084183
-
Improved trust-aware recommender system using smallworldness of trust networks
-
April (April 2010)
-
W. Yuan, D. Guan, and Y.-K. Lee. April 2010. Improved trust-aware recommender system using smallworldness of trust networks. Knowledge-Based Systems 23 (April 2010), 232-238.
-
(2010)
Knowledge-Based Systems
, vol.23
, pp. 232-238
-
-
Yuan, W.1
Guan, D.2
Lee, Y.-K.3
-
160
-
-
29844444091
-
Propagation models for trust and distrust in social networks
-
2005
-
C. Ziegler and G. Lausen. 2005. Propagation models for trust and distrust in social networks. Information Systems Frontiers 7, 4-5 (2005), 337-358.
-
(2005)
Information Systems Frontiers
, vol.7
, Issue.4-5
, pp. 337-358
-
-
Ziegler, C.1
Lausen, G.2
|