Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on trust modeling
The concept of trust and/or trust management has received considerable attention in
engineering research communities as trust is perceived as the basis for decision making in …
engineering research communities as trust is perceived as the basis for decision making in …
A survey on uncertainty reasoning and quantification in belief theory and its application to deep learning
An in-depth understanding of uncertainty is the first step to making effective decisions under
uncertainty. Machine/deep learning (ML/DL) has been hugely leveraged to solve complex …
uncertainty. Machine/deep learning (ML/DL) has been hugely leveraged to solve complex …
Hybrid recommendation approaches for multi-criteria collaborative filtering
Recommender systems are software tools and techniques for suggesting items in an
automated fashion to users tailored their preferences. Collaborative Filtering (CF) …
automated fashion to users tailored their preferences. Collaborative Filtering (CF) …
Building a trusted route in a mobile ad hoc network considering communication reliability and path length
J Wang, Y Liu, Y Jiao - Journal of Network and Computer Applications, 2011 - Elsevier
In a mobile ad hoc network (MANET), a source node must rely on other nodes to forward its
packets on multi-hop routes to the destination. Unlike most previous studies that sought only …
packets on multi-hop routes to the destination. Unlike most previous studies that sought only …
Novel trust framework for vehicular networks
Dedicated short range communication is proposed for vehicle to vehicle communications to
learn about significant events in the network from neighboring vehicles. However, these …
learn about significant events in the network from neighboring vehicles. However, these …
Fuzzy trust protocol for malicious node detection in wireless sensor networks
Wireless sensor networks (WSNs) are used in many applications nowadays, because of its
extensive usage. Due to the distinct characteristics, they are vulnerable to many attacks. To …
extensive usage. Due to the distinct characteristics, they are vulnerable to many attacks. To …
A survey on trust modeling from a Bayesian perspective
In this paper, we are concerned with trust modeling for agents in networked computing
systems. As trust is a subjective notion that is invisible, implicit and uncertain in nature, many …
systems. As trust is a subjective notion that is invisible, implicit and uncertain in nature, many …
Trust-based fuzzy bat optimization algorithm for attack detection in manet
Mobile nodes dynamically form a multi-hop wireless networks which are termed as mobile
ad hoc networks (MANETs). Centralized infrastructure is not required for the operation of …
ad hoc networks (MANETs). Centralized infrastructure is not required for the operation of …
Trust-based minimum cost opportunistic routing for ad hoc networks
W Bo, H Chuanhe, L Layuan, Y Wenzhong - Journal of Systems and …, 2011 - Elsevier
Recently, opportunistic routing has received much attention as a new design direction. It can
exploit the wireless broadcast and more highly reliable opportunistic forwarding, so as to …
exploit the wireless broadcast and more highly reliable opportunistic forwarding, so as to …
Fuzzy Reputation Based Trust Mechanism for Mitigating Attacks in MANET.
Abstract Mobile Ad-hoc Networks (MANET) usage across the globe is increasing by the day.
Evaluating a node's trust value has significant advantages since such network applications …
Evaluating a node's trust value has significant advantages since such network applications …