Understanding graph-based trust evaluation in online social networks: Methodologies and challenges

W Jiang, G Wang, MZA Bhuiyan, J Wu - Acm Computing Surveys (Csur), 2016 - dl.acm.org
Online Social Networks (OSNs) are becoming a popular method of meeting people and
keeping in touch with friends. OSNs resort to trust evaluation models and algorithms to …

A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks

A Ahmed, K Abu Bakar, MI Channa, K Haseeb… - Frontiers of Computer …, 2015 - Springer
Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained
remarkable appreciation and technological development over the last few years. Despite …

Edge computing architecture for mobile crowdsensing

M Marjanović, A Antonić, IP Žarko - Ieee access, 2018 - ieeexplore.ieee.org
Mobile crowdsensing (MCS) is a human-driven Internet of Things service empowering
citizens to observe the phenomena of individual, community, or even societal value by …

Generating trusted graphs for trust evaluation in online social networks

W Jiang, G Wang, J Wu - Future generation computer systems, 2014 - Elsevier
We propose a novel trust framework to address the issue of “Can Alice trust Bob on a
service?” in large online social networks (OSNs). Many models have been proposed for …

[PDF][PDF] Neutrosophic Crisp Set Theory

AA Salama - 2015 - philarchive.org
Page 1 AA Salama & Florentin Smarandache Neutrosophic Crisp Set Theory Neutrosophic
Crisp Set with Type 3. Neutrosophic Crisp Set with Type 2. Neutrosophic Crisp Set with Type …

Comparative study of trust and reputation systems for wireless sensor networks

O Khalid, SU Khan, SA Madani, K Hayat… - Security and …, 2013 - Wiley Online Library
Wireless sensor networks (WSNs) are emerging as useful technology for information
extraction from the surrounding environment by using numerous small‐sized sensor nodes …

Analysis of secure LEACH-based clustering protocols in wireless sensor networks

M Masdari, SM Bazarchi, M Bidaki - Journal of Network and Computer …, 2013 - Elsevier
LEACH or Low-Energy Adaptive Clustering Hierarchy is a successful clustering-based
routing protocol that recently has attracted a lot of attention in literature. However, this …

Fine-grained feature-based social influence evaluation in online social networks

G Wang, W Jiang, J Wu, Z Xiong - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
The evaluation of a user's social influence is essential for various applications in online
social networks (OSNs). We propose a fine-grained feature-based social influence (FBI) …

Catching packet droppers and modifiers in wireless sensor networks

C Wang, T Feng, J Kim, G Wang… - 2009 6th Annual IEEE …, 2009 - ieeexplore.ieee.org
Packet dropping and modification are common attacks that can be launched by an
adversary to disrupt communication in wireless multi-hop sensor networks. Many schemes …

Forming opinions via trusted friends: Time-evolving rating prediction using fluid dynamics

W Jiang, J Wu, G Wang, H Zheng - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Trust-based recommendation systems study how people form opinions via trusted friends,
so as to predict unknown ratings based on the ratings expressed by trusted friends. Most of …