Detecting unfair recommendations in trust-based pervasive environments
暂无分享,去创建一个
Francesco Palmieri | Gianni D'Angelo | Salvatore Rampone | F. Palmieri | S. Rampone | Gianni D’Angelo
[1] Timothy W. Finin,et al. Communications - Trust-Based Security in Pervasive Computing Environments , 2001, Computer.
[2] A. M. Madni,et al. Recommender systems in e-commerce , 2014, 2014 World Automation Congress (WAC).
[3] Sheikh Iqbal Ahamed,et al. Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments , 2010, J. Syst. Softw..
[4] Usama M. Fayyad,et al. Knowledge Discovery in Databases: An Overview , 1997, ILP.
[5] Chandan Mazumdar,et al. A Survey of Trust Models for Enterprise Information Systems , 2016 .
[6] Mudhakar Srivatsa,et al. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.
[7] Chunyan Miao,et al. A fuzzy logic based reputation model against unfair ratings , 2013, AAMAS.
[8] Gianni D'Angelo,et al. Diagnosis of aerospace structure defects by a HPC implemented soft computing algorithm , 2014, 2014 IEEE Metrology for Aerospace (MetroAeroSpace).
[9] Francesco Palmieri,et al. Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification , 2017, Soft Comput..
[10] Zengyou He,et al. FP-outlier: Frequent pattern based outlier detection , 2005, Comput. Sci. Inf. Syst..
[11] Enrique Herrera-Viedma,et al. A model to represent users trust in recommender systems using ontologies and fuzzy linguistic modeling , 2015, Inf. Sci..
[12] Osmar R. Zaïane,et al. Mammography Classification By an Association Rule-based Classifier , 2002, MDM/KDD.
[13] Voula C. Georgopoulos,et al. Medical Decision Support Systems based on Soft Computing techniques , 2011 .
[14] Chunyan Miao,et al. Protecting Online Rating Systems from Unfair Ratings , 2005, TrustBus.
[15] Gianni D'Angelo,et al. Shape-based defect classification for non destructive testing , 2015, 2015 IEEE Metrology for Aerospace (MetroAeroSpace).
[16] Naima Iltaf,et al. A mechanism for detecting dishonest recommendation in indirect trust computation , 2013, EURASIP J. Wirel. Commun. Netw..
[17] Yan Sun,et al. Security of Online Reputation Systems: The evolution of attacks and defenses , 2012, IEEE Signal Process. Mag..
[18] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[19] Naima Iltaf,et al. Modeling interaction using trust and recommendation in ubiquitous computing environment , 2012, EURASIP J. Wirel. Commun. Netw..
[20] Laurence T. Yang,et al. Security, privacy and trust of user-centric solutions , 2018, Future Gener. Comput. Syst..
[21] Ernesto Damiani,et al. Choosing reputable servents in a P2P network , 2002, WWW.
[22] Alfredo De Santis,et al. A triadic closure and homophily-based recommendation system for online social networks , 2015, World Wide Web.
[23] Anjali Barmade. An Efficient Strategy to Detect Outlier Transactions , 2014 .
[24] Tom M. Mitchell,et al. Machine Learning and Data Mining , 2012 .
[25] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[26] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[27] Kris Bubendorfer,et al. Reputation systems: A survey and taxonomy , 2015, J. Parallel Distributed Comput..
[28] Tao Sun,et al. A Distributed Trust Management Scheme in the Pervasive Computing Environment , 2007, 2007 Canadian Conference on Electrical and Computer Engineering.
[29] Giuseppe Cattaneo,et al. FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[30] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[31] Mark Weiser,et al. The computer for the 21st Century , 1991, IEEE Pervasive Computing.
[32] Francesco Palmieri,et al. An Artificial Intelligence-Based Trust Model for Pervasive Computing , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
[33] Chrysanthos Dellarocas,et al. The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..
[34] Gianni D'Angelo,et al. Toward a soft computing-based correlation between oxygen toxicity seizures and hyperoxic hyperpnea , 2018, Soft Comput..
[35] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[36] Aphrodite Tsalgatidou,et al. Reputation Systems Evaluation Survey , 2015, ACM Comput. Surv..
[37] Andrés Marín López,et al. Trust management for multimedia P2P applications in autonomic networking , 2011, Ad Hoc Networks.
[38] Shailendra Narayan Singh,et al. Outlier Detection: Applications and techniques in Data Mining , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).
[39] Gianni D'Angelo,et al. Feature Extraction and Soft Computing Methods for Aerospace Structure Defect Classification , 2016, ArXiv.
[40] Ross A. Malaga. Web-Based Reputation Management Systems: Problems and Suggested Solutions , 2001, Electron. Commer. Res..
[41] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[42] Gianni D'Angelo,et al. Automated Eddy Current non-destructive testing through low definition lissajous figures , 2016, 2016 IEEE Metrology for Aerospace (MetroAeroSpace).
[43] Ossama H. Embarak. A method for solving the cold start problem in recommendation systems , 2011, 2011 International Conference on Innovations in Information Technology.