SecureCPS: Cognitive inspired framework for detection of cyber attacks in cyber–physical systems

A Makkar, JH Park - Information processing & management, 2022 - Elsevier
In the era of autonomous systems, the security is indispensable module for flexible
computing environment. Due to increased computer power and network speed, a new …

A dynamic algorithm for stochastic trust propagation in online social networks: Learning automata approach

M Ghavipour, MR Meybodi - Computer Communications, 2018 - Elsevier
The dynamic nature of trust has been universally accepted in the literature. As two users
interact with each other, trust between them evolves based on their interaction's experience …

Instance-based ontology matching: a literature review

M Abubakar, H Hamdan, N Mustapha… - Recent Advances on Soft …, 2018 - Springer
The volume of research articles published today associated to instance-based ontology
matching is significant and it is thought to reflect the growing interest of ontology matching …

Propagating both trust and distrust with target differentiation for combating link-based Web spam

X Zhang, Y Wang, N Mou, W Liang - ACM Transactions on the Web …, 2014 - dl.acm.org
Semi-automatic anti-spam algorithms propagate either trust through links from a good seed
set (eg, TrustRank) or distrust through inverse links from a bad seed set (eg, Anti-TrustRank) …

Approximating web communities using subspace decomposition

J Eustace, X Wang, J Li - Knowledge-Based Systems, 2014 - Elsevier
Herein, we propose an algorithm to approximate web communities from the topic related
web pages. The approximation is achieved by subspace factorization of the topic related …

Detecting spammers on Twitter based on content and social interaction

H Shen, X Liu - 2015 International Conference on Network and …, 2015 - ieeexplore.ieee.org
Twitter has become a target platform on which spammers spread large amounts of harmful
information. These malicious spamming activities have seriously threatened normal users' …

Privacy-preserving trust management for unwanted traffic control

L Zhang, Z Yan, R Kantola - Future Generation Computer Systems, 2017 - Elsevier
The pervasive use of the Internet has caused an incredible growth of unwanted traffic, such
as spam, malware and malicious intrusions. Controlling unwanted traffic based on trust and …

Using deep belief network to demote web spam

X Zhuang, Y Zhu, Q Peng, F Khurshid - Future Generation Computer …, 2021 - Elsevier
Many score propagation based Web Spam Demotion Algorithms (WSDAs) have been
proposed in last decade. There are two major challenges those algorithms suffer from. First …

Human ABCC1 interacts and colocalizes with ATP synthase α, revealed by interactive proteomics analysis

Y Yang, Z Li, W Mo, R Ambadipudi… - Journal of proteome …, 2012 - ACS Publications
Human ABCC1 is a member of the ATP-binding cassette (ABC) transporter superfamily, and
its overexpression has been shown to cause multidrug resistance by active efflux of a wide …

OpinionRank: Trustworthy website detection using three valued subjective logic

X Niu, G Liu, Q Yang - IEEE Transactions on Big Data, 2020 - ieeexplore.ieee.org
For a web search engine, it is critical to design a mechanism to promote trustworthy websites
and eliminate spam ones in the searching results. In this paper, we propose the …