References
- H. Hu, Jin. Guo, J. Chen, "Modeling online social networks based on preferential linking," Chinese Physics B, vol. 21, no. 11, pp. 118902, 2012. https://doi.org/10.1088/1674-1056/21/11/118902
- R. Lu, X. Lin, Z. Shi, J. Shao, "Plam: A privacy-preserving framework for local-area mobile social networks," INFOCOM, pp. 763-771, 2014.
- F. Hao, G. Min, M. Lin, C. Luo, L. Yang, "Mobifuzzytrust: An efficient fuzzy trust inference mechanism in mobile social networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 11, pp. 2944-2955, 2014. https://doi.org/10.1109/TPDS.2013.309
- X. Liang, X. Lin, X. Shen, "Enabling trustworthy service evaluation in service-oriented mobile social networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 310-320, 2014. https://doi.org/10.1109/TPDS.2013.37
- W. Sherchan, S. Nepal, C. Paris, "A survey of trust in social networks," ACM Computing Surveys (CSUR), vol. 45, no. 4, pp. 47, 2013.
- M. Sirivianos, K. Kim, X. Yang, "Socialfilter: Introducing social trust to collaborative spam mitigation," INFOCOM, pp. 2300-2308, 2011.
- G. Wang, F. Musau, S. Guo, M. Abdullahi, "Neighbor similarity trust against sybil attack in p2p e-commerce," IEEE Transactions on Parallel and Distributed Systems, pp. 1, 2014.
- L. Cutillo, R. Molva, T. Strufe, "Safebook: A privacy-preserving online social network leveraging on real-life trust," IEEE Communications Magazine, vol. 47, no. 12, pp. 94-101, 2009. https://doi.org/10.1109/MCOM.2009.5350374
- R. Gross, A. Acquisti, "Information revelation and privacy in online social networks," in Proc. of ACM CONFERENCE of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES '05, pp. 71-80, 2005.
- A. L. Young, A. Quan-Haase, "Information revelation and internet privacy concerns on social network sites: A case study of facebook," in Proc. of ACM CONFERENCE of the Fourth International Conference on Communities and Technologies, pp. 265-274, 2009.
- G. Liu, Q. Yang, H. Wang, X. Lin, M. Wittie, "Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic," INFOCOM, pp. 1698-1706, 2014.
- J. Tang, H. Gao, H. Liu, A. Das Sarma, "etrust: Understanding trust evolution in an online world," in Proc. of ACM Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 253-261, 2012.
- Tavakolifard, M., Almeroth, K.C., "Social computing: an intersection of recommender systems, trust/reputation systems, and social networks," IEEE Network, vol. 26, no. 4, pp. 53-58, 2012. https://doi.org/10.1109/MNET.2012.6246753
- W. Jiang, J. Wu, G. Wang, H. Zheng, "Fluidrating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics," INFOCOM, pp. 1707-1715, 2014.
- L. Yu, J. Li, Z. Liu, "Semiring trust model based on adaptive forgetting scheme," Journal of Electronics and Information Technology, vol. 33, no. 1, pp. 175-179, 2011. (in Chinese). https://doi.org/10.3724/SP.J.1146.2010.00221
- D. Khodyakov, "Trust as a process a three-dimensional approach," Sociology, vol. 41, no. 1, pp. 115-132, 2007. https://doi.org/10.1177/0038038507072285
- X. Li, F. Zhou, X. Yang, "Scalable feedback aggregating (sfa) overlay for large-scale p2p trust management," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1944-1957, 2012. https://doi.org/10.1109/TPDS.2012.26
- V. Arnaboldi, M. L. Gala, A. Passarella, M. Conti, "The role of trusted relationships on content spread in distributed online social networks," in Proc. of The Second Workshop on Large Scale Distributed Virtual Environments on Clouds and P2P (LSDVE 2014), 2014.
- X. Chen and L. Wang, "A Cloud-Based Trust Management Framework for Vehicular Social Networks," in Proc. of IEEE Access, vol. 5, no. , pp. 2967-2980, 2017.
- W. Jiang, J. Wu, F. Li, G. Wang and H. Zheng, "Trust Evaluation in Online Social Networks Using Generalized Network Flow," IEEE Transactions on Computers, vol. 65, no. 3, pp. 952-963, March 1 2016. https://doi.org/10.1109/TC.2015.2435785
- C. Huang, Z. Yan, N. Li and M. Wang, "Secure Pervasive Social Communications Based on Trust in a Distributed Way," IEEE Access, vol. 4, pp. 9225-9238, 2016. https://doi.org/10.1109/ACCESS.2017.2647824
- Z. Yan and M. Wang, "Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels," IEEE Systems Journal, vol. 11, no. 1, pp. 207-218, March 2017. https://doi.org/10.1109/JSYST.2014.2347259
- V. Sharma; I. You; R. Kumar; P. Kim, "Computational offloading for efficient trust management in pervasive online social networks using osmotic computing," IEEE Access , vol.PP, no.99, pp.1-1, 2017.
- S. Trifunovic, F. Legendre, C. Anastasiades, "Social trust in opportunistic networks," in Proc. of INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1-6, 2010.
- S. Nepal, W. Sherchan, C. Paris, "Strust: a trust model for social networks," in Proc. of IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 841-846, 2011.
- Z. Li, H. Shen, "Soap: A social network aided personalized and effective spam filter to clean your e-mail box," INFOCOM, pp. 1835-1843, 2011.
- L. Li, A. Scaglione, A. Swami, Q. Zhao, "Consensus, polarization and clustering of opinions in social networks," IEEE Journal on Selected Areas in Communications, vol. 31, no. 6, pp. 1072-1083, 2013. https://doi.org/10.1109/JSAC.2013.130609
- F. Liu, X. Li, Y. Ding, H. Zhao, X. Liu, Y. Ma, B. Tang, "A social network-based trust-aware propagation model for p2p systems," Knowledge-Based Systems, vol. 41, pp. 8-15, 2013. https://doi.org/10.1016/j.knosys.2012.12.005
- G. Han, J. Jiang, L. Shu, J. Niu, H.-C. Chao, "Management and applications of trust in wireless sensor networks: A survey," Journal of Computer and System Sciences, vol. 80, no. 3, pp. 602-617, 2014. https://doi.org/10.1016/j.jcss.2013.06.014
- L. V. Orman, "Bayesian inference in trust networks," ACM Transactions on Management Information Systems (TMIS), vol. 4, no. 2, pp. 7, 2013.
- Y. L. Sun, W. Yu, Z. Han, K. R. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 305-317, 2006. https://doi.org/10.1109/JSAC.2005.861389
- F. Zhang, Z.-P. Jia, H. Xia, X. Li, H.-M. Sha Edwin, "Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and markov scgm (1, 1) model," Computer Communications, vol. 35, no. 5, pp. 589-596, 2012. https://doi.org/10.1016/j.comcom.2011.10.007
- L. Zhao, J. Cai, H. Zhang, "Radio-efficient adaptive modulation and coding: green communication perspective," in Proc. of IEEE 73rd Vehicular Technology Conference (VTC Spring), pp. 1-5, 2011.
- Y. Jiang, Y. Liu, "Stochastic network calculus," Springer, 2008.
- Y. Jiang, "A basic stochastic network calculus," ACM SIGCOMM Computer Communication Review, Vol. 36, pp. 123-134, 2006. https://doi.org/10.1145/1151659.1159929
- J.-Y. Le Boudec, P. Thiran, "Network calculus: a theory of deterministic queuing systems for the internet," Springer, Vol. 2050, 2001.
- J. Li, R. Li, J. Kato, "Future trust management framework for mobile ad hoc networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 108-114, 2008. https://doi.org/10.1109/MCOM.2008.4481349
- A. Josang, R. Ismail, C. Boyd, "A survey of trust and reputation systems for online service provision," Decision support systems, vol. 43, no. 2, pp. 618-644, 2007. https://doi.org/10.1016/j.dss.2005.05.019
- H. Yu, Z. Shen, C. Miao, C. Leung, D. Niyato, "A survey of trust and reputation management systems in wireless communications," in Proc. of the IEEE, vol. 98, no. 10, pp. 1755-1772, 2010. https://doi.org/10.1109/JPROC.2010.2059690
- Y. L. Sun, Z. Han, K. R. Liu, "Defense of trust management vulnerabilities in distributed networks," IEEE Communications Magazine, vol. 46, no. 2, pp. 112-119, 2008. https://doi.org/10.1109/MCOM.2008.4473092
- B.-J. Chang, S.-L. Kuo, "Markov chain trust model for trust-value analysis and key management in distributed multicast manets," IEEE Transactions on Vehicular Technology, vol. 58, no. 4, pp. 1846-1863, 2009. https://doi.org/10.1109/TVT.2008.2005415
- Y. Jiang, "A note on applying stochastic network calculus," in Proc. of SIGCOMM, Vol. 10, pp. 16-20, May, 2010.
- A. Pentland, N. Eagle, D. Lazer, "Inferring social network structure using mobile phone data," in Proc. of the National Academy of Sciences (PNAS), vol. 106, no. 36, pp. 15274-15278, 2009.
- N. Welton, A. Ades, "Estimation of markov chain transition probabilities and rates from fully and partially observed data: uncertainty propagation, evidence synthesis, and model calibration," Medical Decision Making, vol. 25, no.6, pp. 633-645, 2005. https://doi.org/10.1177/0272989X05282637
- B. Craig, P. Sendi, "Estimation of the transition matrix of a discrete-time Markov chain," Health Economics, vol. 11, no.1, pp. 33-42, 2002. https://doi.org/10.1002/hec.654