期刊文献+
共找到4,092篇文章
< 1 2 205 >
每页显示 20 50 100
A Distributed Anonymous Reputation System for V2X Communication
1
作者 Shahidatul Sadiah Toru Nakanishi 《Computers, Materials & Continua》 2026年第4期1030-1050,共21页
V2X communication enables vehicles to share real-time traffic and road-condition data,but binding messages to persistent identifiers enables location tracking.Furthermore,since forged reports from malicious vehicles c... V2X communication enables vehicles to share real-time traffic and road-condition data,but binding messages to persistent identifiers enables location tracking.Furthermore,since forged reports from malicious vehicles can distort trust decisions and threaten road safety,privacy-preserving trust management is essential.Lu et al.previously presented BARS,an anonymous reputation mechanism founded on blockchain technology to establish a privacy-preserving trust architecture for V2X communication.In this system,reputation certificates without a vehicle identifier ensure anonymity,while two authorities jointly manage certificate issuance and reputation updates.However,the centralized certificate updates introduce scalability limitations,and the authorities can trace vehicle behavioral information,which threatens privacy guarantees.Several subsequent systems derived from BARS still rely on centralized certificate management and are subject to authority-side privacy leakage.As a result,a key challenge in this line of research remains unresolved:how to decentralize the certificate-update process while preserving privacy against the authorities in privacy-preservingV2X trustmanagement.In this paper,we propose a distributed anonymous reputation system for V2X communication,based on an anonymous reputation system for crowdsensing.In our proposed system for V2X communication,the server is distributed to a certificate authority(CA)and roadside units(RSUs).Each vehicle shows the reputation level to the nearest RSU at the beginning of each time interval,and registers a short-time public key.In the interval,the messages from the vehicle are authenticated under the public key and are scored.At the end of the interval,the nearest RSU updates the certificate anonymously.Our solution decentralizes the certificate-update process by assigning each update to the nearest RSU.A zero-knowledge-proof-based show protocol removes the need for any central authority to handle vehicle certificates and thus prevents the authorities from tracing vehicle activities.Compared with BARS,where centralized authorities must update the reputation certificates of many vehicles and may incur communication and processing delays,our system performs each update locally at the nearest RSUonce per interval.The required interaction consists only of a fewkilobytes of communication and a zero-knowledge proof that is almost fully precomputed on the vehicle side,while the RSU-side processing is estimated to take about 40 ms based on timingmeasurements of the underlying cryptographic operations.This distributed updatemodel avoids the centralized bottleneck of BARS and simultaneously removes the privacy risk arising from authority collusion. 展开更多
关键词 V2X communication anonymous reputation system proof of knowledge
在线阅读 下载PDF
An Overlap Sharding Blockchain:Reputation Voting Enabling Security and Efficiency for Dynamic AP Management in 6G UCAN 被引量:1
2
作者 Wang Jupen Hu Bo +2 位作者 Chen Shanzhi Zhang Yiting Wang Yilei 《China Communications》 2025年第7期208-219,共12页
Blockchain-based user-centric access network(UCAN)fails in dynamic access point(AP)management,as it lacks an incentive mechanism to promote virtuous behavior.Furthermore,the low throughput of the blockchain has been a... Blockchain-based user-centric access network(UCAN)fails in dynamic access point(AP)management,as it lacks an incentive mechanism to promote virtuous behavior.Furthermore,the low throughput of the blockchain has been a bottleneck to the widespread adoption of UCAN in 6G.In this paper,we propose Overlap Shard,a blockchain framework based on a novel reputation voting(RV)scheme,to dynamically manage the APs in UCAN.AP nodes in UCAN are distributed across multiple shards based on the RV scheme.That is,nodes with good reputation(virtuous behavior)are likely to be selected in the overlap shard.The RV mechanism ensures the security of UCAN because most APs adopt virtuous behaviors.Furthermore,to improve the efficiency of the Overlap Shard,we reduce cross-shard transactions by introducing core nodes.Specifically,a few nodes are overlapped in different shards,which can directly process the transactions in two shards instead of crossshard transactions.This greatly increases the speed of transactions between shards and thus the throughput of the overlap shard.The experiments show that the throughput of the overlap shard is about 2.5 times that of the non-sharded blockchain. 展开更多
关键词 blockchain reputation voting scheme sharding 6G
在线阅读 下载PDF
A Task Offloading Method for Vehicular Edge Computing Based on Reputation Assessment
3
作者 Jun Li Yawei Dong +2 位作者 Liang Ni Guopeng Feng Fangfang Shan 《Computers, Materials & Continua》 2025年第5期3537-3552,共16页
With the development of vehicle networks and the construction of roadside units,Vehicular Ad Hoc Networks(VANETs)are increasingly promoting cooperative computing patterns among vehicles.Vehicular edge computing(VEC)of... With the development of vehicle networks and the construction of roadside units,Vehicular Ad Hoc Networks(VANETs)are increasingly promoting cooperative computing patterns among vehicles.Vehicular edge computing(VEC)offers an effective solution to mitigate resource constraints by enabling task offloading to edge cloud infrastructure,thereby reducing the computational burden on connected vehicles.However,this sharing-based and distributed computing paradigm necessitates ensuring the credibility and reliability of various computation nodes.Existing vehicular edge computing platforms have not adequately considered themisbehavior of vehicles.We propose a practical task offloading algorithm based on reputation assessment to address the task offloading problem in vehicular edge computing under an unreliable environment.This approach integrates deep reinforcement learning and reputation management to address task offloading challenges.Simulation experiments conducted using Veins demonstrate the feasibility and effectiveness of the proposed method. 展开更多
关键词 Vehicular edge computing task offloading reputation assessment
在线阅读 下载PDF
基于区块链的产品众包设计工作监管方法
4
作者 刘电霆 崔博渊 +1 位作者 代宣军 张祖琼 《机械设计》 北大核心 2026年第1期93-99,共7页
传统的众包设计模式,是通过中心化的互联网平台来协调任务的请求者和工人,面临单点故障、隐私信息泄露及平台主观仲裁造成的信任危机等一系列问题。作为一种分布式账本技术,区块链具有去中心化、防篡改、可溯源及双方契约不可单方撕毁... 传统的众包设计模式,是通过中心化的互联网平台来协调任务的请求者和工人,面临单点故障、隐私信息泄露及平台主观仲裁造成的信任危机等一系列问题。作为一种分布式账本技术,区块链具有去中心化、防篡改、可溯源及双方契约不可单方撕毁等优点,可以用来解决传统中心化平台存在的上述问题。为此,提出一种基于区块链的产品众包设计工作模型,研究了3大关键点:用户管理区块链结构及其存储策略、结合智能合约的工人所做工作记录方法及众包设计工人的信誉评估机制,并阐述了其关键使能技术。经过在具体区块链上进行部署,并进行功能性试验与测试,结果显示:该方法对于众包设计任务中的过程管理展现出一定的有效性。 展开更多
关键词 区块链 众包设计 工作记录 信誉评估
原文传递
主动模仿与被动反应:同群效应如何影响企业数字并购?
5
作者 郭树龙 杜传忠 +1 位作者 岳枫 王金杰 《现代金融研究》 北大核心 2026年第2期58-72,共15页
本文基于2014-2021年上市公司数据,探究了企业数字并购决策趋同现象。研究发现,企业数字并购决策存在显著的同群效应,即企业倾向于模仿同群企业的数字并购行为。异质性分析显示,数字企业数字并购模仿行为主要受同群企业数字并购规模的影... 本文基于2014-2021年上市公司数据,探究了企业数字并购决策趋同现象。研究发现,企业数字并购决策存在显著的同群效应,即企业倾向于模仿同群企业的数字并购行为。异质性分析显示,数字企业数字并购模仿行为主要受同群企业数字并购规模的影响,而传统企业数字并购模仿行为主要受并购频次的影响。机制检验表明,数字并购同群效应的形成源于“信息式学习”、管理者数字身份认同的主动模仿,以及“跟风式学习”、策略互动和低能力管理者声誉维护的被动反应。进一步研究发现,这种同群效应加剧了企业风险。 展开更多
关键词 数字并购 同群效应 数字身份认同 策略互动 声誉维护
在线阅读 下载PDF
绿色转型能提升企业韧性吗?
6
作者 刘孙芸 杨玲 《统计与管理》 2026年第2期31-47,共17页
世界经济发展不稳定、不确定日益突出,企业韧性是市场主体抵御外部危机、实现逆势成长所需的关键能力。基于2010—2022年沪深A股上市公司数据,构建“声誉—资源—创新”整合性分析框架,研究绿色转型对企业韧性的影响效应及作用机制,发... 世界经济发展不稳定、不确定日益突出,企业韧性是市场主体抵御外部危机、实现逆势成长所需的关键能力。基于2010—2022年沪深A股上市公司数据,构建“声誉—资源—创新”整合性分析框架,研究绿色转型对企业韧性的影响效应及作用机制,发现绿色转型能够显著提升企业韧性,经过稳健性检验后该结论依然成立。具体传导机制上,绿色转型通过提高企业声誉,降低融资约束和增进创新效率三条路径显著增强企业维稳、适应和创新能力。环境规制在绿色转型对企业韧性的影响过程中存在显著的负向调节作用。进一步分析发现绿色转型对于重污染、高科技和制造业企业韧性的提升效用更加显著。 展开更多
关键词 绿色转型 企业韧性 企业声誉 创新效率
在线阅读 下载PDF
企业数据资产信息披露与供应链配置
7
作者 陈艳利 邹雨荷 《当代财经》 北大核心 2026年第1期153-164,共12页
充分的信息披露是资本市场有效运行的关键,而企业数据资产信息披露是上市公司披露的重要内容。以2007—2023年中国A股上市公司为样本,研究了企业数据资产信息披露对企业供应链配置的影响及其影响机制。结果表明,数据资产信息披露能提高... 充分的信息披露是资本市场有效运行的关键,而企业数据资产信息披露是上市公司披露的重要内容。以2007—2023年中国A股上市公司为样本,研究了企业数据资产信息披露对企业供应链配置的影响及其影响机制。结果表明,数据资产信息披露能提高企业的声誉、缓解企业的融资约束和促进企业技术创新,因而数据资产信息披露能降低企业的供应链集中度和促进企业供应链多元化发展。异质性分析表明,在分析师关注度高的企业和金融科技发展水平高的地区的企业中,数据资产信息披露更能促进企业供应链多元化发展。经济后果分析表明,因为数据资产信息披露促进了企业供应链多元化发展,所以数据资产信息披露降低了企业的现金流风险。为此,要完善数据资产信息披露制度,引导企业积极履行数据资产信息披露义务。 展开更多
关键词 数据资产信息披露 供应链配置 企业声誉 融资约束 技术创新
原文传递
耐心资本投资对供应链韧性的影响研究
8
作者 唐亮 佟梦霞 杨国玉 《华东经济管理》 北大核心 2026年第1期50-62,共13页
培育壮大耐心资本,提高金融服务实体经济能力,是当前复杂经济局势下,实现企业稳链、扩链、强链的重要手段。文章基于2009—2023年我国沪深A股上市公司数据,实证检验耐心资本投资对供应链韧性的影响及作用机制。研究表明,耐心资本投资能... 培育壮大耐心资本,提高金融服务实体经济能力,是当前复杂经济局势下,实现企业稳链、扩链、强链的重要手段。文章基于2009—2023年我国沪深A股上市公司数据,实证检验耐心资本投资对供应链韧性的影响及作用机制。研究表明,耐心资本投资能够显著提升供应链韧性,该作用主要体现在扩链和强链上。机制检验发现,耐心资本投资通过供应商网络优化效应、声誉效应及公司治理效应三条路径提升供应链韧性。异质性分析表明,耐心资本投资对供应链韧性的影响在国有、大规模、非链主企业及高新技术、环境不确定性低的行业中更为显著。据此,文章提出应培育和壮大耐心资本,以提高企业抗风险能力为抓手,提升企业供应链韧性。 展开更多
关键词 耐心资本投资 供应链韧性 网络优化效应 声誉效应 公司治理效应
在线阅读 下载PDF
企业ESG表现对创新投入的影响机制研究
9
作者 朱吉庆 《上海管理科学》 2026年第1期51-57,共7页
企业ESG建设能够取得经济、社会、环境等多重效益。然而,企业ESG表现能否促进创新投入,学术界尚未形成共识。本文基于2015-2023年我国A股上市公司数据,实证分析企业ESG表现对创新投入的影响及作用机制,并探讨市场竞争强度对二者关系的... 企业ESG建设能够取得经济、社会、环境等多重效益。然而,企业ESG表现能否促进创新投入,学术界尚未形成共识。本文基于2015-2023年我国A股上市公司数据,实证分析企业ESG表现对创新投入的影响及作用机制,并探讨市场竞争强度对二者关系的调节效应。结果表明,企业ESG表现对创新投入具有显著的促进作用,市场竞争强度负向调节企业ESG表现对创新投入的促进作用。进一步的影响机制检验表明,企业ESG表现通过提升企业声誉、缓解融资约束、降低经营风险等途径,促进企业加强创新投入。 展开更多
关键词 企业ESG表现 创新投入 企业声誉 融资约束 经营风险
在线阅读 下载PDF
The Reputation Model of Multi-Stage Dynamic Game
10
作者 侯光明 金军 甘仞初 《Journal of Beijing Institute of Technology》 EI CAS 1999年第1期2-7,共6页
Aim To study the implicit restriction mechanism for hidden action in multi stage dynamic game. Methods A reputation model for restriction on repeated principal agent relationship was established by using the theor... Aim To study the implicit restriction mechanism for hidden action in multi stage dynamic game. Methods A reputation model for restriction on repeated principal agent relationship was established by using the theory on principal agent problem in information economics and the method of game theory to study the implicit restriction mechanism for hidden action. Results and Conclusion It is proved that there exists implicit restriction mechanism for the multi stage principal agent relationship, some conditions for effective restriction are derived, the design methods of implicit restriction mechanism are presented. 展开更多
关键词 INCENTIVE RESTRICTION hidden action implicit restriction mechanism reputation model probability of discovery
在线阅读 下载PDF
DM-PBFT:Double Layers and Multi Copies-Enabled Secure and Efficient Practical Byzantine Fault Tolerance Consensus Algorithm
11
作者 Chai Ze Gao Zhipeng +3 位作者 Yang Yang Lin Yijing Li Huangqi Rui Lanlan 《China Communications》 2026年第1期204-217,共14页
Practical byzantine fault tolerance(PBFT)can reduce energy consumption and achieve high throughput compared with the traditional PoW algorithm,which is more suitable for a strongly consistent consortium blockchain.How... Practical byzantine fault tolerance(PBFT)can reduce energy consumption and achieve high throughput compared with the traditional PoW algorithm,which is more suitable for a strongly consistent consortium blockchain.However,due to the frequent communication among nodes,PBFT cannot realize scalability in large-scale networks.Existing PBFTbased algorithms still ignore performance and security.Therefore,we propose a secure and efficient practical byzantine fault tolerance based on double layers and multi copies(DM-PBFT).We design a reputation evaluation and node scheduling method for DMPBFT.And then we propose an adaptive node scheduling strategy based on the derived threshold values after analyzing the system communication complexity and security.Combining the above research,a node dynamic adjustment mechanism is proposed to freeze or adjust the node operation status according to the system environment.Simulation experiments show that the proposed mechanism can improve efficiency and increase the system’s throughput. 展开更多
关键词 blockchain CONSENSUS PBFT reputation
在线阅读 下载PDF
创新“走出去”与企业全要素生产率——基于声誉效应的视角
12
作者 盛伟 韩剑 《国际经贸探索》 北大核心 2026年第1期39-55,共17页
文章基于2001~2023年中国上市公司的国际专利数据,探究创新“走出去”对企业全要素生产率的影响及其作用机制。研究发现,创新“走出去”能够显著提升企业全要素生产率,这一结论在考虑内生性问题和通过一系列稳健性检验后依然成立。创新... 文章基于2001~2023年中国上市公司的国际专利数据,探究创新“走出去”对企业全要素生产率的影响及其作用机制。研究发现,创新“走出去”能够显著提升企业全要素生产率,这一结论在考虑内生性问题和通过一系列稳健性检验后依然成立。创新“走出去”通过建立合约执行声誉和质量可靠声誉,能够优化企业供需匹配效率和提升产品竞争优势,进而实现全要素生产率的增长。进一步分析表明,创新“走出去”的声誉效应具有显著的行业溢出性。异质性分析表明,“走向”发达国家(地区)的国际专利具有更强的全要素生产率提升效应;创新“走出去”覆盖的国家(地区)范围越广,其全要素生产率提升效应也越强;国有企业更能从创新“走出去”中获益。该研究为政府引导企业创新国际化、推动高质量发展提供了经验证据。 展开更多
关键词 国际专利 声誉效应 高质量发展 全要素生产率
原文传递
一种基于信誉值多分类与在线学习的安全频谱感知策略
13
作者 谢松霖 顾志豪 +2 位作者 王全全 胡海峰 吴城坤 《电讯技术》 北大核心 2026年第2期183-190,共8页
针对频谱感知数据伪造(Spectrum Sensing Data Falsification,SSDF)攻击导致协作频谱感知性能下降的问题,提出了一种基于信誉值多分类与在线学习的安全频谱感知策略。首先提取次用户(Secondary User,SU)上传信号的平均能量差与平均幅度... 针对频谱感知数据伪造(Spectrum Sensing Data Falsification,SSDF)攻击导致协作频谱感知性能下降的问题,提出了一种基于信誉值多分类与在线学习的安全频谱感知策略。首先提取次用户(Secondary User,SU)上传信号的平均能量差与平均幅度差,训练恶意次用户(Malicious Secondary User,MSU)识别模型。再通过MSU识别模型的历史判别结果,计算各SU的信誉值,然后依据信誉值将SU分为正常次用户与MSU两种,并将MSU进一步分为偶尔、时常与频繁攻击3类,针对不同种类采取相应的处理提取其上传信号的特征值,更为充分地训练主用户(Primary User,PU)状态判决模型,提升抗SSDF攻击的能力。最后,使用在线学习完成对各SU信誉值、MSU识别模型、PU状态判决模型的实时更新,并限制训练集的最大长度,来及时调整MSU的种类,提升对隐蔽性更强的潜伏性攻击的防御能力。仿真结果表明,在面对潜伏性攻击时,该方法的检测概率最高可达84.43%,具有更好的抗SSDF攻击能力。 展开更多
关键词 协作频谱感知 频谱感知数据伪造(SSDF) 信誉值 在线学习
在线阅读 下载PDF
基于多权重声誉机制与联邦学习的电动汽车IPMSM故障诊断研究
14
作者 李佳恒 吴钦木 +2 位作者 洪涛 杨柳 徐博学 《汽车工程》 北大核心 2026年第1期225-234,共10页
在当代大数据与人工智能的背景下,随着电动汽车智能化程度的提高,对电机故障诊断的需求也日益增强,尤其是在保障电机运行安全性和可靠性方面。本研究针对内嵌式永磁同步电机(IPMSM)的转子退磁与偏心故障诊断问题,通过联邦学习实现分布... 在当代大数据与人工智能的背景下,随着电动汽车智能化程度的提高,对电机故障诊断的需求也日益增强,尤其是在保障电机运行安全性和可靠性方面。本研究针对内嵌式永磁同步电机(IPMSM)的转子退磁与偏心故障诊断问题,通过联邦学习实现分布式数据训练与隐私保护,避免了数据的集中存储和处理,保障了数据的隐私性;同时,设计了一种基于指数移动平均(EMA)动态更新与多样性因子的多权重声誉机制,该机制综合考虑时间衰减、历史稳定性和协同特征贡献等多维因素,对参与节点的可靠性进行动态评估,从而在防御恶意攻击的同时,降低了误剔除诚实节点的可能性,进而提高模型训练效果。实验结果表明,该方法在多种恶意攻击场景下均表现出优异的鲁棒性和安全性,在完全剔除恶意节点的同时避免了误删诚实节点,在4种攻击下较传统声誉机制而言在诊断准确性方面分别提高了8.937%、5.146%、9.868%、5.675%。 展开更多
关键词 电机故障诊断 声誉机制 联邦学习 内嵌式永磁同步电机 防攻击 车联网
在线阅读 下载PDF
认知无线传感器网络下抗拜占庭攻击的SW-WSPRT算法
15
作者 吴俊 赵睿 +2 位作者 苏明坤 许晓荣 包建荣 《西安邮电大学学报》 2026年第1期82-89,共8页
针对认知无线传感器网络(Cognitive Wireless Sensor Networks,CWSNs)中协作频谱感知(Cooperative Spectrum Sensing,CSS)易受恶意传感器拜占庭攻击的问题,提出一种基于滑动窗口的加权序贯概率比检验(Sliding Window-based Weighted Seq... 针对认知无线传感器网络(Cognitive Wireless Sensor Networks,CWSNs)中协作频谱感知(Cooperative Spectrum Sensing,CSS)易受恶意传感器拜占庭攻击的问题,提出一种基于滑动窗口的加权序贯概率比检验(Sliding Window-based Weighted Sequential Probability Ratio Test,SW-WSPRT)算法。通过分析滑动窗口内传感器的历史感知行为,根据滑动窗口内传感器的感知精度进一步建立信誉值和权重值分配机制,识别排除恶意传感器以降低其对融合中心的影响,并让信誉值最高的传感器感知报告参与似然比检验,最终由融合中心据此作出关于主用户(Primary User,PU)状态的全局决策。仿真实验结果表明,在拜占庭攻击下,SW-WSPRT识别恶意传感器的性能优于其他算法,且显著提升了协作频谱感知性能,在信噪比较优或较差的网络下,平均仅需约3或7个最高信誉值的感知报告即可作出可靠的全局决策。 展开更多
关键词 协作频谱感知 拜占庭攻击 滑动窗口 信誉值机制 加权机制 序贯概率比检验
在线阅读 下载PDF
区块链技术赋能的馈赠型产品供应链隐私保护与信誉维护决策研究
16
作者 袁红平 张莉 曹兵兵 《中国管理科学》 北大核心 2026年第2期336-347,共12页
应用区块链技术能在一定程度上扼制赝品销售,但却引发了产品受众的隐私担忧问题,那么,针对不同区块链使用情景与产销模式,产品受众偏好将会如何影响馈赠型产品市场呢?基于Hotelling模型,构建了由供应商、零售商、消费者及受赠者组成的... 应用区块链技术能在一定程度上扼制赝品销售,但却引发了产品受众的隐私担忧问题,那么,针对不同区块链使用情景与产销模式,产品受众偏好将会如何影响馈赠型产品市场呢?基于Hotelling模型,构建了由供应商、零售商、消费者及受赠者组成的链上链下两条供应链,探索了受众偏好在不同市场环境中对供应链成员决策以及供应链间竞争的影响。结果表明:受赠者不满意度对两条供应链的隐私保护水平和信誉维护水平有十分重要的影响;随着消费者对链上链下的价格敏感系数之差的增大,供应链市场占有率随之增加,但供应链的最优隐私保护水平和信誉维护水平会降低;消费者对产品服务偏好的差异化更有利于市场环境的净化;特别地,受众偏好会对产销一体化企业产生更大的影响,这意味着产销一体化企业在提升市场竞争力方面更应注重产品受众偏好。 展开更多
关键词 区块链技术 隐私保护 信誉维护 馈赠型产品 HOTELLING模型
原文传递
数据资产信息披露与企业信用评级关系研究——基于文本分析的经验证据
17
作者 王海芳 范东军 李梦沅 《金融发展研究》 北大核心 2026年第1期74-83,共10页
在数字经济浪潮下,数据资产已成为企业核心战略资源,但其信息披露相关实证研究仍显不足。研究选取2010—2022年中国A股上市公司作为样本,通过提取年度报告文本中的数据资产披露信息,实证检验数据资产信息披露对企业信用评级的影响效应... 在数字经济浪潮下,数据资产已成为企业核心战略资源,但其信息披露相关实证研究仍显不足。研究选取2010—2022年中国A股上市公司作为样本,通过提取年度报告文本中的数据资产披露信息,实证检验数据资产信息披露对企业信用评级的影响效应。研究结果表明,数据资产信息披露能够对企业信用评级产生显著的正向提升作用。机制分析发现:数据资产信息披露可以通过缓解融资约束、提升内部控制质量、弱化经营风险以及提高企业声誉,从而提升企业的信用评级。异质性分析发现:数据资产信息披露对企业信用评级的提升作用在非国有企业、四大会计师事务所审计企业、高科技行业企业以及东部地区企业中更显著。此外,数据资产信息披露可通过提升企业信用评级水平,进而有效降低企业的债券融资成本。因此,为优化企业信用评级、降低信用风险,企业需要深化数据资产开发与应用并规范披露行为,同时相关部门应强化监管,完善数据资产信息披露制度体系。 展开更多
关键词 数据资产信息披露 信用评级 融资约束 内部控制质量 经营风险 企业声誉
在线阅读 下载PDF
SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks 被引量:6
18
作者 Lin Hui Ma Jianfeng Hu Jia 《China Communications》 SCIE CSCD 2012年第10期40-48,共9页
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this proble... Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model. 展开更多
关键词 wireless mesh networks reputation mechanism cross-layer design network security
在线阅读 下载PDF
Data trustworthiness and user reputation as indicators of VGI quality 被引量:5
19
作者 Paolo Fogliaroni Fausto D’Antonio Eliseo Clementini 《Geo-Spatial Information Science》 SCIE CSCD 2018年第3期213-233,共21页
Volunteered geographic information(VGI)has entered a phase where there are both a substantial amount of crowdsourced information available and a big interest in using it by organizations.But the issue of deciding the ... Volunteered geographic information(VGI)has entered a phase where there are both a substantial amount of crowdsourced information available and a big interest in using it by organizations.But the issue of deciding the quality of VGI without resorting to a comparison with authoritative data remains an open challenge.This article first formulates the problem of quality assessment of VGI data.Then presents a model to measure trustworthiness of information and reputation of contributors by analyzing geometric,qualitative,and semantic aspects of edits over time.An implementation of the model is running on a small data-set for a preliminary empirical validation.The results indicate that the computed trustworthiness provides a valid approximation of VGI quality. 展开更多
关键词 Volunteered geographic information data quality trustworthiness reputation
原文传递
Application of Machine Learning for Online Reputation Systems 被引量:3
20
作者 Ahmad Alqwadri Mohammad Azzeh Fadi Almasalha 《International Journal of Automation and computing》 EI CSCD 2021年第3期492-502,共11页
Users on the Internet usually require venues to provide better purchasing recommendations.This can be provided by a reputation system that processes ratings to provide recommendations.The rating aggregation process is... Users on the Internet usually require venues to provide better purchasing recommendations.This can be provided by a reputation system that processes ratings to provide recommendations.The rating aggregation process is a main part of reputation systems to produce global opinions about the product quality.Naive methods that are frequently used do not consider consumer profiles in their calculations and cannot discover unfair ratings and trends emerging in new ratings.Other sophisticated rating aggregation methods that use a weighted average technique focus on one or a few aspects of consumers′profile data.This paper proposes a new reputation system using machine learning to predict reliability of consumers from their profile.In particular,we construct a new consumer profile dataset by extracting a set of factors that have a great impact on consumer reliability,which serve as an input to machine learning algorithms.The predicted weight is then integrated with a weighted average method to compute product reputation score.The proposed model has been evaluated over three Movie Lens benchmarking datasets,using 10-folds cross validation.Furthermore,the performance of the proposed model has been compared to previous published rating aggregation models.The obtained results were promising which suggest that the proposed approach could be a potential solution for reputation systems.The results of the comparison demonstrated the accuracy of our models.Finally,the proposed approach can be integrated with online recommendation systems to provide better purchasing recommendations and facilitate user experience on online shopping markets. 展开更多
关键词 reputation system rating aggregation machine learning consumer reliability user trust
原文传递
上一页 1 2 205 下一页 到第
使用帮助 返回顶部