A course in fuzzy systems and control
A course in fuzzy systems and control
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
Computing and using reputations for internet ratings
Proceedings of the 3rd ACM conference on Electronic Commerce
Trust for Ubiquitous, Transparent Collaboration
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
An Entropy-Based Approach to Protecting Rating Systems from Unfair Testimonies
IEICE - Transactions on Information and Systems
A survey of trust and reputation systems for online service provision
Decision Support Systems
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing
IEEE Transactions on Parallel and Distributed Systems
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
Adjustable Trust Model for Access Control
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Probabilistic Trust Management in Pervasive Computing
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
Journal of Systems and Software
New Methods for Deviation-Based Outlier Detection in Large Database
FSKD '09 Proceedings of the 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery - Volume 01
Evaluating rater credibility for reputation assessment of web services
WISE'07 Proceedings of the 8th international conference on Web information systems engineering
Trust management in ubiquitous computing: A Bayesian approach
Computer Communications
Defense of trust management vulnerabilities in distributed networks
IEEE Communications Magazine
Detecting Imprudence of 'Reliable' Sellers in Online Auction Sites
TRUSTCOM '12 Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Hi-index | 0.00 |
The performance of indirect trust computation models (based on recommendations) can be easily compromised due to the subjective and social-based prejudice of the provided recommendations. Eradicating the influence of such recommendation remains an important and challenging issue in indirect trust computation models. An effective model for indirect trust computation is proposed which is capable of identifying dishonest recommendations. Dishonest recommendations are identified by using deviation based detecting technique. The concept of measuring the credibility of recommendation (rather than credibility of recommender) using fuzzy inference engine is also proposed to determine the influence of each honest recommendation. The proposed model has been compared with other existing evolutionary recommendation models in this field, and it is shown that the model is more accurate in measuring the trustworthiness of unknown entity.