829 Hits in 2.4 sec

Identifying and Exploiting Trustable Users with Robust Features in Online Rating Systems

2017 KSII Transactions on Internet and Information Systems  
In this paper, we first address identifying trustable users who tend to give fair ratings to products in online rating systems and then propose a method of computing true reputation of a product by aggregating  ...  When purchasing an online product, a customer tends to be influenced strongly by its reputation, the aggregation of other customers' ratings on it.  ...  Performance evaluation 4.1 Experimental Setup In online rating systems, it is important to provide true reputation of a product by aggregating trustable users' ratings.  ... 
doi:10.3837/tiis.2017.04.019 fatcat:6ph2qeteenea5ptahb2qx7qz7i

Customer Analysis Model for Trusted Online Merchant

Osama Emam, Arafa Taher, Hanan Fahmy
2020 Communications on Applied Electronics  
can rate the trust among other merchants.  ...  Trust is one of the most important factors which influence the behavior of online shopping. Previous researchers indicated several factors that affect online brand shopping.  ...  In [13] Trust Online brand testing a model of trust in online brand Highlighted security, privacy, brand name, word of mouth, good online experience, and quality of information that influence the online  ... 
doi:10.5120/cae2020652872 fatcat:p7fgxac7gnbvvg7tigaweniesa

Quality-biased ranking for queries with commercial intent

Alexander Shishkin, Polina Zhinalieva, Kirill Nikolaev
2013 Proceedings of the 22nd International Conference on World Wide Web - WWW '13 Companion  
To solve this problem we propose to consider additional facets of relevance, such as trustability, usability, design quality and the quality of service.  ...  We aggregated new facets into the single label, commercial relevance, that represents cumulative quality of the site.  ...  On the basis of several quality facets we form a cumulative rating, which is called commercial relevance.  ... 
doi:10.1145/2487788.2488137 dblp:conf/www/ShishkinZN13 fatcat:kya7hxe3wncq3i577kit2yyhya

Exploring Blockchain for The Coordination of Distributed Energy Resources [article]

Qing Yang, Hao Wang
2021 arXiv   pre-print
The coordination of DERs through an aggregator, such as a utility, system operator, or a third-party coordinator, emerges as a promising paradigm.  ...  In this paper, we develop a trustable and distributed coordination system for DERs using blockchain technology.  ...  Once prosumers respond to the DR requests and perform load reduction, they can receive rewards at a unit rate of π DR [t] from the grid.  ... 
arXiv:2103.06046v1 fatcat:yla2zoqdk5fy3oivnhauxlrcgi

Moderator-Controlled Information Sharing by Identity-Based Aggregate Signatures for Information Centric Networking

Tohru Asami, Byambajav Namsraijav, Yoshihiko Kawahara, Kohei Sugiyama, Atsushi Tagami, Tomohiko Yagyu, Kenichi Nakamura, Toru Hasegawa
2015 Proceedings of the 2nd International Conference on Information-Centric Networking - ICN '15  
Because of the properties of the identity-based signature [24] , this IBAS implementation is robust and works even during a disaster or when a trustable centralized server is not online.  ...  We propose the use of Identity-Based Aggregate Signatures (IBAS) to decrease this overhead, and provide a proof-of-concept IBAS implementation for Named Data Networking (NDN).  ...  Commission under its 7th Framework Program (contract no. 608518) and the National Institute of Information and Communications Technology (NICT) in Japan (contract no. 167).  ... 
doi:10.1145/2810156.2810163 dblp:conf/acmicn/AsamiNKSTYNH15 fatcat:7exyvdoevzb6hmexgjcp3zliyu

A Trust-Based Recruitment Framework for Multi-hop Social Participatory Sensing

Haleh Amintoosi, Salil S. Kanhere
2013 2013 IEEE International Conference on Distributed Computing in Sensor Systems  
However, the selection of suitable participants who are trustable and provide high quality contributions is challenging.  ...  Our framework leverages multi-hop friendship relations to identify and select suitable and trustworthy participants among friends or friends of friends, and finds the most trustable paths to them.  ...  The result of these ratings among members is a rich web of trust, which comprises of 14,019 users and 47, 347 trust ratings.  ... 
doi:10.1109/dcoss.2013.29 dblp:conf/dcoss/AmintoosiK13 fatcat:rdnbqm33tvf7xctekfscd42mbe

VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks

Huanyu Zhao, Xiaolin Li
2011 Journal of Supercomputing  
In this paper, we propose a trust vector based scheme (VectorTrust) for aggregation of distributed trust scores.  ...  We design, implement, and analyze trust aggregation and trust management strategies.  ...  The increasing popularity of these P2P systems, social networks, online business paradigms has made them prone to malicious behaviors and attacks.  ... 
doi:10.1007/s11227-011-0576-6 fatcat:xy5yc6sdcvawjo2y2b35fgnmti

VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks

Huanyu Zhao, Xiaolin Li
2009 2009 Proceedings of 18th International Conference on Computer Communications and Networks  
In this paper, we propose a trust vector based scheme (VectorTrust) for aggregation of distributed trust scores.  ...  We design, implement, and analyze trust aggregation and trust management strategies.  ...  The increasing popularity of these P2P systems, social networks, online business paradigms has made them prone to malicious behaviors and attacks.  ... 
doi:10.1109/icccn.2009.5235290 dblp:conf/icccn/ZhaoL09 fatcat:fwbxj45565b43jcf4nhzigu5be


Dr. Senthilkumar A, Dr. Lekashri S, Abhay Chaturvedi, Dr. R. Manikandan
2021 Information Technology in Industry  
The trust rate is identified through the number of sent and receive data packets and the malicious packets are diagnosed through the un-matching packet rate.  ...  Here the trust nodes are identified through the data traffic sampling rate.  ...  Figure 1 : 1 Flow diagram of DTTS Figure 2 : 2 Data Rate Delivered Figure 4 : 4 Energy Published Online 18-03-2021 IT in Industry, Vol. 9, No.1, 2021  ... 
doi:10.17762/itii.v9i1.261 fatcat:jiwekp67tbfyvpkhm3soewhk74

Event Recognition Of Domestic Sounds Using Semi-Supervised Learning

Aniel Rossi, Eduardo Fonseca, Frederic Font
2018 Zenodo  
The semi-supervised approach shows better results and allows us to add a considerable amount of non-trustable data to the trustable portion of the dataset.  ...  The train set of DomesticFSD2018 is composed of a trustable (manually-verified) portion of data and a non-trustable (which has received no human validation and can be potentially inaccurate or mislabeled  ...  But, in our case, the use of frame-level aggregated features makes the duration of samples not critical for the task.  ... 
doi:10.5281/zenodo.1475465 fatcat:fhlbxn56ojaq7e2ypv6z24fyzy

Quality Control for Crowdsourcing with Spatial and Temporal Distribution [chapter]

Gang Zhang, Haopeng Chen
2013 Lecture Notes in Computer Science  
Our experiments have demonstrated the effectiveness and efficiency of the approach.  ...  In the past decade, crowdsourcing has become a prospective paradigm for commercial purposes, for it brings a lot of benefits such as low cost and high immediacy, particularly in location-based services  ...  In e of and more d be ting the the rate. gard hese Algorithm2: MDA Reducer Procedure  ... 
doi:10.1007/978-3-642-41428-2_14 fatcat:t2xbv7thq5eo3jvkfty4ot6c2q

Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources

Yali Gao, Xiaoyong Li, Jirui Li, Yunquan Gao, Philip S. Yu
2019 IEEE Access  
trustworthiness evaluation of information sources.  ...  Trust, as one of the most complex concepts in network communities, has multi-criteria properties.  ...  reflect a user's online social network activity pattern.  ... 
doi:10.1109/access.2019.2893657 fatcat:cogvanbk4jg6zerm2a5taompj4

A Trust based Clustering Routing Scheme to Enhance the Security of WSNs

Because of the nature of efficiency and load balancing, LEACH based hierarchical routing protocols mixed with trust management techniques can be one of the good choices to design a trustable and secured  ...  the routing inside and outside of clusters in the network.  ...  (online)stage.In that sense,tried to build a very efficient and trustable WSN both for small and moderate-scale networks.  ... 
doi:10.35940/ijitee.i7811.078919 fatcat:tebelolv55hmvg3oc24kpqjxrm

A Trust Framework for Social Participatory Sensing Systems [chapter]

Haleh Amintoosi, Salil S. Kanhere
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
The integration of participatory sensing with online social networks affords an effective means to generate a critical mass of participants, which is essential for the success of this new and exciting  ...  Our framework not only considers an objective estimate of the quality of the raw readings contributed but also incorporates a measure of trust of the user within the social network.  ...  This trust rating helps John to select trustable contributions and accordingly plan for his weekend shopping.  ... 
doi:10.1007/978-3-642-40238-8_20 fatcat:e4hz5tt7kfc7pd4ud6bymyjac4

Information Filtering via Implicit Trust-based Network [article]

Zhao-Guo Xuan, Zhan Li, Jian-Guo Liu
2011 arXiv   pre-print
In this paper, we present a novel measurement to calculate users' implicit trust-based correlation by taking into account their average ratings, rating ranges, and the number of common rated items.  ...  The simulation results on three benchmark data sets show that the performances of both user-based and item-based algorithms could be enhanced greatly.  ...  For item i and j, their common popularity is the aggregation of over v's and w's ratings.  ... 
arXiv:1112.2388v1 fatcat:jszdi2skardwfmwldinn5wfzxe
« Previous Showing results 1 — 15 out of 829 results