Computer Science ›› 2018, Vol. 45 ›› Issue (6): 76-83.doi: 10.11896/j.issn.1002-137X.2018.06.013
• Netword & Communication • Previous Articles Next Articles
ZHU Wen-qiang
CLC Number:
[1]腾讯公司.移动QQ及微信用户人数统计[EB/OL].(2016-10).http://pc.qq.com/mobile.html. [2]CNNIC.2016年第38次中国互联网络发展状况统计报告[R].北京:2016. [3]YORK S N.Mobile Social Network[M]//Encyclopedia of Social Network Analysis and Mining.New York:Springer,2014. [4]CCTV.2016年315晚会[EB/OL].http://315.cntv.cn/special/2016/index.shtml. [5]LEVIEN R.Attack-Resistant Trust Metrics[M]//Computing with Social Trust.2009:121-132. [6]AL-OUFI S,KIM H N,SADDIK A E.A group trust metric for identifying people of trust in online social networks[J].Expert Systems with Applications,2012,39(18):13173-13181. [7]ABDELGHANI W,ZAYANI C A,AMOUS I,et al.Trust Management in Social Internet of Things:A Survey[C]//IFIP Conference on e-Business,e-Services,and e-Society.2016:187-199. [8]LI P C,ZHONG Y S.A study of offline merchants’ acceptance of mobile O2O commerce[J].Contemporary Finance & Economi-cs,2014(9):75-87.(in Chinese) 李普聪,钟元生.移动O2O商务线下商家采纳行为研究[J].当代财经,2014(9):75-87. [9]Advogato.Introduction about advogato trust metric[EB/OL].http://www.advogato.org/trust-metric.html. [10]XIAO S,DONG M.Hidden semi-Markov model-based reputation management system for online to offline (O2O) e-commerce markets[J].Decision Support Systems,2015,77(C):87-99. [11]ZOLFAGHAR K,AGHAIE A.A syntactical approach for interpersonal trust prediction in social web applications:Combining contextual and structural data[J].Knowledge-Based Systems,2012,26:93-102. [12]WANG Y,WANG X,ZUO W L.Trust Prediction Modeling Based on Social Theories[J].Journal of Software,2014,25(12):2893-2904.(in Chinese) 王英,王鑫,左万利.基于社会学理论的信任关系预测模型[J].软件学报,2014,25(12):2893-2904. [13]ZHANG W Y,WU B,GENG Y S,et al.Joint Rating and Trust Collective Matrix Prediction Based on Factorization[J].Acta Electronica Sinica,2016,44(7):1581-1586.(in Chinese) 张维玉,吴斌,耿玉水,等.基于协同矩阵分解的评分与信任联合预测[J].电子学报,2016,44(7):1581-1586. [14]GAN Z B,ZENG C,MA Y,et al.C2C E-Commerce trust Algorithm Based on trust Network[J].Journal of Software,2015,26(8):1946-1959.(in Chinese) 甘早斌,曾灿,马尧,等.基于信任网络的C2C电子商务信任算法[J].软件学报,2015,26(8):1946-1959. [15]JIANG L,XU J,ZHANG K,et al.A new evidential trust model for open distributed systems[J].Expert Systems with Applications,2012,39(3):3772-3782. [16]LAX G,SARNÉ G M L.CellTrust:a reputation model for C2C commerce[J].Electronic Commerce Research,2008,8(4):193-216. [17]GAN Z B,ZENG C,LI K,et al.Construction and Optimization of Trust Network in E-Commerce Environment[J].The Chinese Journal of Computers,2012,35(1):27-37.(in Chinese) 甘早斌,曾灿,李开,等.电子商务下的信任网络构造与优化[J].计算机学报,2012,35(1):27-37. [18]JØSANG A,BHUIYAN T.Optimal Trust Network Analysis with Subjective Logic[C]//International Conference on Emerging Security Information.IEEE,2008:179-184. [19]LI D Q,WU X C,GUO R M.Electronic Commerce Transaction Trust Model Based on Two Layers Nodes and Objective Risk[J].Computer Science,2016,43(5):117-121.(in Chinese) 李道全,吴兴成,郭瑞敏.一种基于二层节点和客观风险的电子商务交易信任模型[J].计算机科学,2016,43(5):117-121. [20]HUR J,GUO M,PARK Y,et al.Reputation-Based Collusion Detection with Majority of Colluders[J].Ieice Transactions on Information & Systems,2016,E99.D(7):1822-1835. [21]FORD L R,FULKERSON D R.Maximal Flow Through a Network[M]//Classic Papers in Combinatorics.Boston:Birkhau-ser,2009:243-248. [22]MARK G.The Strength of Weak Ties:A network theory revisited[J].Sociological Theory,1983,1(6):201-233. [23]HOFFMAN K,ZAGE D,NITA-ROTARU C.A survey of attack and defense techniques for reputation systems[J].Acm Computing Surveys,2009,42(1):5515-5528. [24]GILBERT E,KARAHALIOS K.Predicting tie strength with social media[C]//International Conference on Human Factors in Computing Systems(CHI 2009).Boston,MA,USA,2009:211-220. [25]CANTADOR I,BRUSILOVSKY P,KUFLIK T.Second workshop on information heterogeneity and fusion in recommender systems [C]//Proceedings of the 2nd International Workshop on Information Heterogeneity and Fusion in Recommender Systems(HetRec2011).2011:387-388. [26]KLEINBERG J.The Small-World Phenomenon:An Algorithmic Perspective[C]//ACM Symposium on Theory of Computing.2000:163-170. |
[1] | WU Dai-yue, LI Qiang, YU Xiang, HUANG Jun. Trust Model for P2P Based on Blockchain [J]. Computer Science, 2019, 46(12): 138-147. |
[2] | ZHANG Hong-bo, WANG Jia-lei, ZHANG Li-juan, LIU Zhi-hong. Trust Network Based Collaborative Filtering Recommendation Algorithm [J]. Computer Science, 2018, 45(8): 146-150. |
[3] | WANG Jia-lei, GUO Yao, LIU Zhi-hong. Service Recommendation Method Based on Social Network Trust Relationships [J]. Computer Science, 2018, 45(11A): 402-408. |
[4] | LIU Jian-sheng, YOU Zhen-xu, YUE Guang-xue, WANG Jie-tai, LIU Jian-hua. Research Progress of Network Trust [J]. Computer Science, 2018, 45(11): 13-28. |
[5] | LIAO Xin-kao, WANG Li-sheng, LIU Xiao-jian and XU Xiao-jie. Personalized Trust Model in Network Environment [J]. Computer Science, 2017, 44(8): 100-106. |
[6] | HE Ming, LIU Wei-shi and WEI Zheng. Collaborative Filtering Recommendation Based on Random Walk Model in Trust Network [J]. Computer Science, 2016, 43(6): 257-262. |
[7] | YOU Jing, FENG Hui and SUN Yu-qiang. Trust Evaluation and Service Selection Based on Collaborative Recommendation for Cloud Environment [J]. Computer Science, 2016, 43(5): 140-145. |
[8] | LI Dao-quan, WU Xing-cheng and GUO Rui-min. Electronic Commerce Transaction Trust Model Based on Two Layers Nodes and Objective Risk [J]. Computer Science, 2016, 43(5): 117-121. |
[9] | PENG Hao, ZHAO Dan-dan, YU Yun-jie, WU Zhen-dong and WU Song-yang. Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks [J]. Computer Science, 2016, 43(10): 66-69. |
[10] | ZHANG Ming, XU Bo-yi and GUO Yan-lai. Review of Typical Attacks on SSL/TLS [J]. Computer Science, 2015, 42(Z6): 408-412. |
[11] | YANG Zhang-wei, WANG Li-ping and LAI Wen-ping. Improved Design for Trust Model on Domain Entity of Computing Grid [J]. Computer Science, 2015, 42(Z11): 386-389. |
[12] | WU Chun-qiong and HUANG Rong-ning. Dynamic Linear Relevance Based Access Control Model [J]. Computer Science, 2015, 42(9): 94-96. |
[13] | WU Hai-qin and WANG Liang-min. Trust Distance Based Malicious Nodes Detection Method in Vehicular Ad Hoc Network [J]. Computer Science, 2015, 42(8): 157-160. |
[14] | CAO Xiao-mei and HU Wen-jie. Dynamic Role Property Based Trust Model for MP2P Networks [J]. Computer Science, 2015, 42(8): 106-111. |
[15] | XU Pei, LIAN Bin, SHAO Kun, CHEN Jun and AN Ning. Research on Fusion Trust Model for Decision-making [J]. Computer Science, 2015, 42(12): 157-161. |
|