Understanding graph-based trust evaluation in online social networks: Methodologies and challenges
Online Social Networks (OSNs) are becoming a popular method of meeting people and
kee** in touch with friends. OSNs resort to trust evaluation models and algorithms to …
kee** in touch with friends. OSNs resort to trust evaluation models and algorithms to …
Distributed reputation management for secure and efficient vehicular edge computing and networks
Vehicular edge computing (VEC) is introduced to extend computing capacity to vehicular
network edge recently. With the advent of VEC, service providers directly host services in …
network edge recently. With the advent of VEC, service providers directly host services in …
Gatrust: A multi-aspect graph attention network model for trust assessment in osns
Social trust assessment that characterizes a pairwise trustworthiness relationship can spur
diversified applications. Extensive efforts have been put in exploration, but mainly focusing …
diversified applications. Extensive efforts have been put in exploration, but mainly focusing …
DRL-based adaptive sharding for blockchain-based federated learning
Blockchain-based Federated Learning (FL) technology enables vehicles to make smart
decisions, improving vehicular services and enhancing the driving experience through a …
decisions, improving vehicular services and enhancing the driving experience through a …
Caching based socially-aware D2D communications in wireless content delivery networks: a hypergraph framework
The emergence of the D2D communications paradigm has transformed the way in which
cellular networks are operated. Previous work in D2D communications, however, mainly …
cellular networks are operated. Previous work in D2D communications, however, mainly …
Trust management in online computing environment: a complete review
A Singh, K Chatterjee - Journal of Ambient Intelligence and Humanized …, 2024 - Springer
Nowadays, trust management plays a significant role in different applications like
commercial applications, Internet of Things (IoT) based applications, social networking …
commercial applications, Internet of Things (IoT) based applications, social networking …
A survey of trust management systems for online social communities–trust modeling, trust inference and attacks
Trust can help participants in online social communities to make decisions; however, it is a
challenge for systems to map trust into computational models because of its subjective …
challenge for systems to map trust into computational models because of its subjective …
Knowledge-centric edge computing based on virtualized D2D communication systems
R Wang, J Yan, D Wu, H Wang… - IEEE Communications …, 2018 - ieeexplore.ieee.org
MEC has been gaining great interest in addressing the limited computational capability in
5G mobile networks. Although there are several existing works about MEC, for example …
5G mobile networks. Although there are several existing works about MEC, for example …
Blockchain-inspired secure computation offloading in a vehicular cloud network
With the emergence of computation-intensive vehicular applications, computation offloading
based on mobile-edge computing (MEC) has become a promising paradigm in resource …
based on mobile-edge computing (MEC) has become a promising paradigm in resource …
Software defined networking for energy harvesting Internet of Things
Internet of Things (IoT) provides ubiquitous intelligence and pervasive interconnections to
diverse physical objects. The overall network performance of existing IoT is restricted by …
diverse physical objects. The overall network performance of existing IoT is restricted by …