Chchain: Secure and parallel crowdsourcing driven by hybrid blockchain

W Tong, X Dong, Y Shen, Y Zhang, X Jiang… - Future Generation …, 2022 - Elsevier
Blockchain-based crowdsourcing solutions have been widely used in the industry to solve
insider threats and free-riding/false-reporting issues. However, the existing solutions suffer …

Fog computing-enabled secure demand response for internet of energy against collusion attacks using consensus and ACE

G Li, J Wu, J Li, Z Guan, L Guo - IEEE Access, 2018 - ieeexplore.ieee.org
Internet of Energy (IoE) is a novel decentralized energy supplying paradigm, which
integrated highly scalable and distributed energy resources to satisfy the various demands …

Building sentiment analysis model and compute reputation scores in e-commerce environment using machine learning techniques

EI Elmurngi, A Gherbi - International Journal of Organizational and …, 2020 - igi-global.com
Online reputation systems are a novel and active part of e-commerce environments such as
eBay, Amazon, etc. These corporations use reputation reporting systems for trust evaluation …

Share-ratio-based incentive mechanism for file sharing with BitTorrent protocol

A Adamu - IEEE Access, 2021 - ieeexplore.ieee.org
Several P2P file-sharing networks were successfully deployed and are used by millions of
Internet users globally to share files (such as movies, video clips, software systems, e-books …

A novel trust model based on SLA and behavior evaluation for clouds

Z Tan, Y Niu, Y Liu, G Yang - 2016 14th Annual Conference on …, 2016 - ieeexplore.ieee.org
In recent years, trust has emerged with the development of cloud computing. It is a critical
step to select a trusted cloud provider before the service begins, which is related to the …

Dealing with collusion attack in a trust-based MANET

R Abassi - Cybernetics and Systems, 2018 - Taylor & Francis
Trust allows collaborating entities to cope with their uncertainty especially when these
collaborations are the bedrock of the network existence such as in Mobile Ad hoc NETworks …

A multi-criteria detection scheme of collusive fraud organization for reputation aggregation in social networks

B Zhang, Q Zhang, Z Huang, M Li, L Li - Future Generation Computer …, 2018 - Elsevier
In social networks, reputation aggregation is an effective approach for recognizing malicious
behaviors and individuals. However, organized collusive fraud to obtain a high reputation is …

Adaptive approach to restraining content pollution in peer-to-peer networks

M Hawa, R Al-Zubi, KA Darabkh… - Information Systems …, 2017 - Springer
Abstract Peer-to-Peer (P2P) networks face the challenge of frequent pollution attacks. In
such attacks, malicious peers pollute the network by sharing mislabeled, corrupt or infected …

Simulation of clutch slipping control of automatic transmission

Q Lijun, Y Nianjiong, W Daojun - 2010 Second International …, 2010 - ieeexplore.ieee.org
Automatic transmission typically includes the following four categories: Hydraulic-
mechanical Automatic Transmission (AT), Automated Mechanical Transmission (AMT) …

[PDF][PDF] MCTModel: A Multi-clouds Trust Model Based on SLA in Cloud Computing

ZH Tan, YC Liu, NX Shi, XW Wang, N Guo - Journal of Computers, 2017 - csroc.org.tw
Trust has become a critical issue in the development of cloud computing in recent years. In
most of the existing models, only a single cloud provider (called single cloud) is selected to …