Exploring security and trust mechanisms in online social networks: An extensive review
Abstract The rise of Online Social Networks (OSNs) continues to surge in today's modern
era. Millions of users are attracted and joined various OSNs and use them to perform various …
era. Millions of users are attracted and joined various OSNs and use them to perform various …
Blockchain-based data management and edge-assisted trusted cloaking area construction for location privacy protection in vehicular networks
J Feng, Y Wang, J Wang, F Ren - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the tremendous pervasion of location-based services (LBSs) in vehicular networks, the
location privacy of vehicles has become an utmost concern. K-anonymity is one of the most …
location privacy of vehicles has become an utmost concern. K-anonymity is one of the most …
Robustness of multilayer networks: A graph energy perspective
Real-world complex systems, encompassing domains like Social, Technological, and
Infrastructure networks, exhibit interconnections and dependencies. These systems are …
Infrastructure networks, exhibit interconnections and dependencies. These systems are …
A most influential node group discovery method for influence maximization in social networks: A trust-based perspective
Develo** a computational method for discovering the most influential nodes in social
networks is a significant challenge that reveals an approach for maximizing the influence …
networks is a significant challenge that reveals an approach for maximizing the influence …
Securing cooperative spectrum sensing against collusive false feedback attack in cognitive radio networks
J Feng, S Li, S Lv, H Wang, A Fu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the
utilization of scarce spectrum resources. However, CSS assumes that all secondary users …
utilization of scarce spectrum resources. However, CSS assumes that all secondary users …
A tensor-based approach for the QoS evaluation in service-oriented environments
Multi-agent technologies have been widely applied to many applications, such as in e-
markets, cloud computing, service-oriented environments, etc. In real applications, service …
markets, cloud computing, service-oriented environments, etc. In real applications, service …
Multi-criteria assessment of user trust in Social Reviewing Systems with subjective logic fusion
By now people's opinions and actions are more and more strongly influenced by what is
posted and shared on the various social networks. Thus, malicious users can purposely …
posted and shared on the various social networks. Thus, malicious users can purposely …
Trustworthiness two-way games via margin policy in e-commerce platforms
L Wang, J Wan, Y Zhang, S Chen, Z Zhu, Y Tao - Applied Intelligence, 2022 - Springer
The portability and low cost of e-commerce platforms have attracted more and more
businesses and consumers. However, due to the virtual nature of e-commerce platforms …
businesses and consumers. However, due to the virtual nature of e-commerce platforms …
Securing cooperative spectrum sensing against dc‐ssdf attack using trust fluctuation clustering analysis in cognitive radio networks
F Zhao, S Li, J Feng - Wireless Communications and Mobile …, 2019 - Wiley Online Library
Cooperative spectrum sensing (CSS) has been recognized as a forceful approach to
promote the utilization of spectrum bands. Nevertheless, all secondary users (SU) are …
promote the utilization of spectrum bands. Nevertheless, all secondary users (SU) are …
Trust traversal: a trust link detection scheme in social network
Z Bo, Z Huan, L Meizi, Z Qin, H Jifeng - Computer Networks, 2017 - Elsevier
The nature of free communication results in increased challenges with respect to the
reliability of user interaction in online social network. It is difficult to ensure that the users in a …
reliability of user interaction in online social network. It is difficult to ensure that the users in a …