计算机技术、信息电子 |
|
|
|
|
信任网络中基于节点重要性的层次化划分方法 |
龚卫华1 , 郭伟鹏1 , 裴小兵2 , 杨良怀1 |
1. 浙江工业大学 计算机学院,浙江 杭州 310023; 2.华中科技大学 软件学院,湖北 武汉 430074 |
|
Hierarchical classification method of trust networks based on nodes importance |
GONG Weihua1, GUO Weipeng1, PEI Xiaobing2,YANG Lianghuai1 |
1.School of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023,China; 2. School of Software Engineering, Huazhong University of Science and Technology, Wuhan 430074, China |
[1] AUDUN J, ROSS H, POPE S. Trust network analysis with subjective logic [C] ∥ Proceedings of the 29th Australasian Computer Science Conference (ACSC 2006). Hobart: Australian Computer Society, 2006: 85-94.
[2] KIM Y A, SONG H S. Strategies for predicting local trust based on trust propagation in social networks [J]. Knowledge Based Systems, 2011, 24(8): 1360-1371.
[3] VERBIEST N, CORNELIS C, VICTOR P, et al. Trust and distrust aggregation enhanced with path length incorporation [J]. Fuzzy Sets and Systems, 2012, 202: 61-74.
[4] SEPANDAR D K, MARIO T S, HECTOR G. The Eigentrust algorithm for reputation management in P2P networks [C] ∥ Proceedings of the 12th International Conference on World Wide Web (WWW’03). New York: ACM, 2003: 640-651.
[5] XIONG L, LIU L. PeerTrust: supporting reputation based trust for peer to peer electronic communities [J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16(7): 843-857.
[6] 田春岐,江建慧,胡治国,等. 一种基于聚集超级节点的P2P网络信任模型[J].计算机学报,2010, 33(2): 345-355.
TIAN Chunqi,JIANG Jianhui,HU Zhiguo, et al. A novel superpeer based trust model for peertopeer networks [J]. Chinese Journal of Computers, 2010,33(2): 345-355.
[7] 冯景瑜,张玉清,陈深龙,等. P2P声誉系统中GoodRep攻击及其防御机制[J].计算机研究与发展, 2011, 48(8): 1473-1480.
FENG Jing yu, ZHANG Yu qing, CHEN Shenlong, et al. GoodRep attack and defense in P2P reputation systems [J]. Journal of Computer Research and Development,2011,48(8): 1473-1480.
[8] 王海艳,杨文彬,王随昌,等. 基于可信联盟的服务推荐方法[J].计算机学报,2014,37(2):301-311.
WANG Hai yan, YANG Wen bin, WANG Sui chang,et al. A service recommendation method based on trustworthy community [J]. Chinese Journal of Computers, 2014, 37(2): 301-311.
[9] 窦文,王怀民,贾焰,等. 构造基于推荐的 PeertoPeer 环境下的 Trust 模型[J]. 软件学报, 2004, 15(4): 571-583.
DOU Wen, WANG Huaimin, JIA Yan, et al. A recommendationbased peertopeer trust model [J]. Journal of Software, 2004, 15(4): 571-583.
[10] WANG Y, NAKAO A, VASILAKOS A V. Doubleface: robust reputation ranking based on link analysis in P2P networks [J]. Cybernetics and Systems, 2010, 41(2): 167-189.
[11] CAVERLEE J, LIU L, WEBB S. The SocialTrust framework for trusted social information management: architecture and algorithms J]. Information Sciences, 2010, 180(1): 95-112.
[12] KOOHBORFARDHAGHIGHI S, KIM J. Using structural information for distributed recommendation in a social network [J]. Applied Intelligence, 2013, 38(2): 255-266.
[13] ZHANG X, LIANG W, ZHU S, et al. Automatic seed set expansion for trust propagation based antispam algorithms [J]. Information Sciences, 2013, 232(20): 167-187.
[14] JIN Y, GU Z, BAN Z. Restraining false feedbacks in peertopeer reputation systems [C] ∥ Proceedings of International Conference on Semantic Computing (ICSC’07). Irvine:IEEE, 2007, 304-312.
[15] CHEN D, LU L, SHANG M, et al. Identifying influential nodes in complex networks [J]. Physica A: Statistical Mechanics and its Applications, 2012,391(4): 1777-1787.
[16] BRIN S, PAGE L. The anatomy of a largescale hypertextual web search engine [J]. Computer Networks and ISDN Systems, 1998, 30(1): 107-117.
[17] KLEINBERG J M. Authoritative sources in a hyperlinked environment [J]. Journal of the ACM (JACM), 1999, 46(5): 604-632.
[18] KITSAK M, GALLOS L K, HAVLIN S, et al. Identification of influential spreaders in complex networks [J]. Nature Physics, 2010, 6(11): 888-893.
[19] LIU J G, REN Z M, GUO Q. Ranking the spreading influence in complex networks [J]. Physica A: Statistical Mechanics and its Applications, 2013, 392(18): 4154-4159.
[20] 赵佳,喻莉,李静茹.社交网络中基于贝叶斯和半环代数模型的节点影响力计算机理[J]. 物理学报, 2013, 62(13): 1-7.
ZHAO Jia, YU Li, LI Jing ru. Node influence calculation mechanism based on bayesian and semiring algebraic model in social networks[J]. Acta Physica Sinica, 2013, 62(13): 1-7.
[21] 张玥,张宏莉,张伟哲,等.识别网络论坛中有影响力用户[J].计算机研究与发展,2013, 50(10): 2195-2205.
ZHANG Yue, ZHANG Hong li, ZHANG Weizhe, et al. Identifying the influential users in network forum [J]. Journal of Computer Research and Development, 2013, 50(10): 2195-2205.
[22] ROMSAIYUD W, PREMCHAISWADI W. Applying mining fuzzy sequential patterns technique to predict the leadership in social networks [C] ∥ Proceedings of 9th International Conference on ICT and Knowledge Engineering. Bangkok: IEEE, 2012: 134-137. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|