Citation: | ZHANG Lin, HUANG Yanwen, XUAN Jie, et al., “Trust Evaluation Model Based on PSO and LSTM for Huge Information Environments,” Chinese Journal of Electronics, vol. 30, no. 1, pp. 92-101, 2021, doi: 10.1049/cje.2020.12.005 |
[1] |
Y.K. Li, S.H. Liu, D. Li, et al., "Release connection fingerprints in social networks using personalized differential privacy", Chinese Journal of Electronics, Vol. 27, No. 5, pp. 1104-1110, 2018. doi: 10.1049/cje.2017.08.008
|
[2] |
G.D. Angelo, S. Rampone and F. Palmieri, "Developing a trust model for pervasive computing based on Apriori association rules learning and bayesian classification", Soft Computing, Vol. 21, No. 21, pp. 6297-6315, 2017. doi: 10.1007/s00500-016-2183-1
|
[3] |
S. Siadat, A.M. Rahmani and H. Navid, "Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model", Journal of Supercomputing, Vol. 73, No. 6, pp. 1-23, 2017.
|
[4] |
C.H. Yu, X.J. Liu, B. Li, et al., "Mobile service recommendation based on context similarity and social network", Chinese Journal of Electronics, Vol. 45, No. 6, pp. 1530-1536, 2017. (in Chinese) http://en.cnki.com.cn/Article_en/CJFDTOTAL-DZXU201706036.htm
|
[5] |
C. Fernandez-Gago, I. Agudo and J. Lopez, "Building trust from context similarity measures", Computer Standards & Interfaces, Vol. 36, No. 4, pp. 792-800, 2014.
|
[6] |
M. J Sule, M. Li, G. Taylor, et al., "Fuzzy logic approach to modelling trust in cloud computing", IET Cyber-Physical Systems: Theory & Applications, Vol. 2, No. 2, pp. 84-89, 2017.
|
[7] |
H. Shirgahi, M. Mohsenzadeh and H.H.S. Javadi, "A three level fuzzy system for evaluating the trust of single web services", Journal of Intelligent & Fuzzy Systems, Vol. 32, No. 1, pp. 1-23, 2016.
|
[8] |
S.A. Soleymani, A.H. Abdullah, M. Zareei, et al., "A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing", IEEE Access, Vol. 5, pp. 15619-15629, 2017. doi: 10.1109/ACCESS.2017.2733225
|
[9] |
H. Xia, Z. Jia and H.M. Sha, "Research of trust model based on fuzzy theory in mobile ad hoc networks", IET Information Security, Vol. 8, No. 2, pp. 88-1033, 2013. doi: 10.1049/iet-ifs.2012.0145
|
[10] |
H.Y. Cai, Z. Li and J.F. Tian, "A new trust evaluation model based on cloud theory in e-commerce environment", IEEE International Symposium on Intelligence Information Processing and Trusted Computing, Huanggang, China, pp. 139-142, 2011.
|
[11] |
Z.Y. Yu, H.W. Zhang, Niu K, et al., "Research on service trust evaluation approach under cloud computing environment", IET International Conference on Cyberspace Technology, Beijing, China, pp. 1-5, 2016.
|
[12] |
Y. P Xiao, H.H. Yao and Y.B. Liu, "A WSNs node reputation security scheme based on cloud model", Chinese Journal of Electronics, Vol. 44, No. 1, pp. 168-175, 2016. (in Chinese) http://www.cqvip.com/QK/90131X/201601/668743114.html
|
[13] |
M. Chiregi and N.J. Navimipour, "A comprehensive study of the trust evaluation mechanisms in the cloud computing", Journal of Service Science Research, Vol. 9, No. 1, pp. 1-30, 2017. doi: 10.1007/s12927-017-0001-7
|
[14] |
L. Zhang, J.W. Liu and R. C Wang, et al., "Trust evaluation model based on improved D-S evidence theory", Journal of Communications, Vol. 34, No. 7, pp. 167-173, 2013. (in Chinese) http://en.cnki.com.cn/Article_en/CJFDTOTAL-TXXB201307018.htm
|
[15] |
Q.Y. Zhao, Zuo WL, Tian ZS, et al., "A method for assessment of trust relationship strength based on the improved D-S evidence theory", Chinese Journal of Computers, Vol. 37, No. 4, pp. 873-883, 2014. (in Chinese) http://www.researchgate.net/publication/286323607_A_method_for_assessment_of_trust_relationship_strength_based_on_the_improved_D-S_evidence_theory
|
[16] |
Y. Wang, X. Wang and W.L. Zuo, "Trust prediction podeling based on social theories", Journal of Software, Vol. 25, No. 12, pp. 2893-2904, 2014. (in Chinese)
|
[17] |
W.Y. Zhang, B. Wu, Y.S. Geng, et al., "Rating and trust prediction based on collective matrix factorization", Acta Electronica Sinica, Vol. 44, No. 7, pp. 1582-1586, 2016. (in Chinese) http://en.cnki.com.cn/Article_en/CJFDTOTAL-DZXU201607009.htm
|
[18] |
S. Hou, X.G. Luo and K. Song, "A maximum entropy weighted trust-analysis algorithm based on sources clustering", Acta Electronica Sinica, Vol. 44, No. 5, pp. 993-999, 2015. (in Chinese) http://www.researchgate.net/publication/283099310_A_maximum_entropy_weighted_trust-analysis_algorithm_based_on_sources_clustering
|
[19] |
Y. Wang, Q. Chen, C. Kang, et al., "Clustering of electricity consumption behavior dynamics toward big data applications", IEEE Transactions on Smart Grid, Vol. 7, No. 5, pp. 2437-2447, 2017. http://ieeexplore.ieee.org/document/7448460/
|
[20] |
Wu J, Guo S, Li J, et al., "Big data meet green challenges: big data toward green applications", IEEE Systems Journal, Vol. 10, No. 3, pp. 888-900, 2016. doi: 10.1109/JSYST.2016.2550530
|
[21] |
K.E. Jie, D. Hong, T. Cheng, et al., "PBWA: A Provenance-Based What-If Analysis Approach for Data Mining Processes", Chinese Journal of Electronics, Vol. 26, No. 5, pp. 986-992, 2017. doi: 10.1049/cje.2017.06.003
|
[22] |
P.F. Shen, S.F. Liu and L. Han, "Distrust prediction in signed social network", Chinese Journal of Electronics, Vol. 28, No. 1, pp. 188-194, 2019. http://www.cnki.com.cn/Article/CJFDTotal-EDZX201901025.htm
|
[23] |
S. Ramaswamy, "Efficient algorithms for mining outliers from large data sets", ACM Sigmod Record, Vol. 29, No. 2, pp. 427-438, 2000. doi: 10.1145/335191.335437
|
[24] |
S. Hochreiter and J. Schmidhuber, "Long short-term memory", Neural Computation, Vol. 9, No. 8, pp. 1735-1780, 1997.
|
[25] |
J. Madar, J. Abonyi and F. Szeifert, "Interactive particle swarm optimization", Proceedings of the 2005 5th International Conference on Intelligent Systems Design and Applications, Montreal, Canada, pp. 314-319, 2005.
|
[26] |
R. Eberhart and Y. Shi, "Particle swarm optimization: developments, applications and resources", Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No. 01TH8546), California, USA, pp. 81-86, 2002.
|
[27] |
P.J. Werbos, "Backpropagation through time: what it does and how to do it", Proceedings of the IEEE, Vol. 78, No. 10, pp. 1550-1560, 1990. doi: 10.1109/5.58337
|
[28] |
D. Wei, L. Hu, J.W. Sun, et al., "A new trust model for online social networks", 2016 First IEEE International Conference on Computer Communication and the Internet. IEEE, Nagoya, Japan, pp. 300-304, 2016.
|