Aiming at the problem that the data in the user rating matrix is missing and the importance of implicit trust between users is ignored when using the TrustSVD model to fill it,this paper proposes a recommendation algo...Aiming at the problem that the data in the user rating matrix is missing and the importance of implicit trust between users is ignored when using the TrustSVD model to fill it,this paper proposes a recommendation algorithm based on TrustSVD++and XGBoost.Firstly,the explicit trust and implicit trust were introduced into the SVD++model to construct the TrustSVD++model.Secondly,considering that there is much data in the interaction matrix after filling,which may lead to a rather complex calculation process,the K-means algorithm is introduced to cluster and extract user and item features at the same time.Then,in order to improve the accuracy of rating prediction for target users,an XGBoost model is proposed to train user and item features,and finally,it is verified on the data sets MovieLens-1M and MovieLens-100k.Experiments show that compared with the SVD++model and the recommendation algorithm without XGBoost model training,the proposed algorithm has the RMSE value reduced by 2.9%and the MAE value reduced by 3%.展开更多
Based on the legal attribute of charitable trusts(CTs), they should be interpreted as organizations.In practice, CTs are not only a type of trust but also a charitable organization with unique dual attributes focusing...Based on the legal attribute of charitable trusts(CTs), they should be interpreted as organizations.In practice, CTs are not only a type of trust but also a charitable organization with unique dual attributes focusing on public welfare and profitability.Their core function is to achieve the goal of charity by using the trust as a tool, although they have the characteristics of a trust in terms of external representation.The dual attributes of CTs present new challenges in terms of governance mechanisms, which must be different from those of traditional charitable organizations and the general corporate governance mechanisms applied to trust companies.展开更多
The traditional cryptographic security techniques are not sufficient for secure routing of message from source to destination in Wireless Sensor Networks (WSNs), because it requires sophisticated software, hardware, l...The traditional cryptographic security techniques are not sufficient for secure routing of message from source to destination in Wireless Sensor Networks (WSNs), because it requires sophisticated software, hardware, large memory, high processing speed and communication bandwidth. It is not economic and feasible because, depending on the application, WSN nodes are high-volume in number (hence, limited resources at each node), deployment area may be hazardous, unattended and/or hostile and sometimes dangerous. As WSNs are characterized by severely constrained resources and requirement to operate in an ad-hoc manner, security functionality implementation to protect nodes from adversary forces and secure routing of message from source node to base station has become a challenging task. In this paper, we present a direct trust dependent link state routing using route trusts which protects WSNs against routing attacks by eliminating the un-trusted nodes before making routes and finding best trustworthy route among them. We compare our work with the most prevalent routing protocols and show its benefits over them.展开更多
China has entered a new era represented by the newly established China (Shanghai) Pilot Free Trade Zone, in which further reform and development of its financial system and capital market are highly prioritized. The...China has entered a new era represented by the newly established China (Shanghai) Pilot Free Trade Zone, in which further reform and development of its financial system and capital market are highly prioritized. The trust as an important vehicle in development of the financial market in China as well as in the world will play an important role, and there will be more foreign elements involved in Chinese trusts. The Law of the People's Republic of China on Application of Laws in Civil Relations with Foreign Elements provides rules, in its article 17, on the application of laws to trusts, which symbolizes the formal creation of rules of conflict of laws in China in this area. However, it seems to cause more problems than it may resolve. For example, it may not always be possible for the parties to determine the appli- cable law through consultation and agreement, and the parties' right to choice of law should not be without limitation either. By allowing judges to choose from "the law of the situs where the trust property is situated" and "the law of the situs where the trust relationship occurred" in the absence of an effective choice of law by the parties may lead to a situation contrary to existing laws and may create uncertainty for the parties as well. This paper analyzes this article 17 by comparing it with the conflict law rules adopted in the United States and by the Hague Convention, identifies problems, and seeks to find solutions in order to promote the healthy development of the trust system in China.展开更多
The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supporte...The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supported Africa in addressing historical injustices at diplomatic and political levels and firmly backed South Africa in hosting the G20 Leaders’Summit,further deepening China-Africa strategic mutual trust.展开更多
With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Further...With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate.展开更多
This mixed-methods study investigated how AI-enhanced English as a Foreign Language(EFL)learning environments influence students’psychological well-being through the mediating roles of motivation and language learnin...This mixed-methods study investigated how AI-enhanced English as a Foreign Language(EFL)learning environments influence students’psychological well-being through the mediating roles of motivation and language learning anxiety and the moderating role of trust.Participants were Chinese university students(N=310,62%female,mean age=18.9,SD=0.8),of whom 15 completed interviews to both add to and to clarify the evidence from the surveys.Structural equation modeling results revealed that AI use had significant indirect effects on well-being through increased motivation and reduced language learning anxiety.Trust in AI significantly moderated both paths,amplifying the motivational benefits and anxiety reduction associated with AI use.Thematic analysis supported these results,identifying three experiential themes:(1)motivational empowerment through personalization,(2)anxiety regulation through safe practice and feedback,and(3)trust as the emotional bridge between AI and well-being.The study extends AI psychology applications by empirically linking technology engagement with affective outcomes and underscores the need for human-centered and trust-enhancing design in AI-supported education.From these findings,we conclude that adaptive,transparent,and autonomy-supportive AI systems promote self-determined motivation,emotional safety,and overall psychological health among EFL learners.展开更多
This paper examines Hernán Díaz’s novel Trust (2022) through the lens of cultural deconstruction, analyzing how its four nested narratives systematically dismantle the American Dream ideology. The novel Bon...This paper examines Hernán Díaz’s novel Trust (2022) through the lens of cultural deconstruction, analyzing how its four nested narratives systematically dismantle the American Dream ideology. The novel Bonds and autobiography My Life collaboratively construct a financial myth portraying protagonist Andrew Bevel as an exemplar of self-made success. Subsequently, Ida’s Memoir exposes the subjective construction of history, declaring the American Dream’s bankruptcy at the epistemological level, while Mildred’s diary Futures deconstructs the myth from within by revealing that Bevel’s financial genius was built upon appropriation of his wife’s intellectual labor. This paper argues that Trust reveals the American Dream as an ideological illusion-narratively constructed, practically dependent on structural injustice, and essentially serving power reproduction.展开更多
With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT termi...With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space.展开更多
To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel...To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions.展开更多
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,com...Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain routing.Existing research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP nodes.In this paper,we propose a blockchain-based trust model for inter-domain routing.Our model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the blockchain.The BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective alliance.We incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing service.We forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing behavior.We use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust model.Compared with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks.展开更多
GS1 is an international standards organization,which focuses on product identification and product data,helping businesses and governments to improve commerce and supply chain.Why trusted data is essential to high-qua...GS1 is an international standards organization,which focuses on product identification and product data,helping businesses and governments to improve commerce and supply chain.Why trusted data is essential to high-quality development?More than 50 years ago,GS1 was initiated with the bar code,a profound transformation of the way we work and live.From then on,a simple scan connected a physical product to its digital identity.It transformed commerce,improving supply chains and enabling safer healthcare.Collaboration between industry and governments,and a strong partnership with ISO and IEC laid the foundations for the global adoption of a common product identification over the past 50 years and all around the world.展开更多
Today,I want to share how international standards can forge trust and fuel innovation,laying the foundation for a future where AI benefits everyone,everywhere.First,AI standards,developed jointly by ISO and IEC-the In...Today,I want to share how international standards can forge trust and fuel innovation,laying the foundation for a future where AI benefits everyone,everywhere.First,AI standards,developed jointly by ISO and IEC-the International Electrotechnical Commission-help build global trust and enable responsible innovation by bringing clarity and coherence to an ever-changing AI landscape.As developments in AI continue to emerge at speed,regulation is struggling to keep up and the proliferation of competing standards has created confusion rather than clarity.ISO and our partner IEC are addressing this challenge through the work of our expert committee on AI,SC 42,which takes a holistic,cohesive approach to AI standardization.展开更多
Nowadays,we are witnessing the tremendous changes brought by AI technologies.What role can standards play in this process?How can we build global trust and enable responsible innovation?
基金Guangdong Science and Technology University Young Projects(GKY-2023KYQNK-1 and GKY-2023KYQNK-10)Guangdong Provincial Key Discipline Research Capacity Improvement Project(2022ZDJS147)。
文摘Aiming at the problem that the data in the user rating matrix is missing and the importance of implicit trust between users is ignored when using the TrustSVD model to fill it,this paper proposes a recommendation algorithm based on TrustSVD++and XGBoost.Firstly,the explicit trust and implicit trust were introduced into the SVD++model to construct the TrustSVD++model.Secondly,considering that there is much data in the interaction matrix after filling,which may lead to a rather complex calculation process,the K-means algorithm is introduced to cluster and extract user and item features at the same time.Then,in order to improve the accuracy of rating prediction for target users,an XGBoost model is proposed to train user and item features,and finally,it is verified on the data sets MovieLens-1M and MovieLens-100k.Experiments show that compared with the SVD++model and the recommendation algorithm without XGBoost model training,the proposed algorithm has the RMSE value reduced by 2.9%and the MAE value reduced by 3%.
文摘Based on the legal attribute of charitable trusts(CTs), they should be interpreted as organizations.In practice, CTs are not only a type of trust but also a charitable organization with unique dual attributes focusing on public welfare and profitability.Their core function is to achieve the goal of charity by using the trust as a tool, although they have the characteristics of a trust in terms of external representation.The dual attributes of CTs present new challenges in terms of governance mechanisms, which must be different from those of traditional charitable organizations and the general corporate governance mechanisms applied to trust companies.
文摘The traditional cryptographic security techniques are not sufficient for secure routing of message from source to destination in Wireless Sensor Networks (WSNs), because it requires sophisticated software, hardware, large memory, high processing speed and communication bandwidth. It is not economic and feasible because, depending on the application, WSN nodes are high-volume in number (hence, limited resources at each node), deployment area may be hazardous, unattended and/or hostile and sometimes dangerous. As WSNs are characterized by severely constrained resources and requirement to operate in an ad-hoc manner, security functionality implementation to protect nodes from adversary forces and secure routing of message from source node to base station has become a challenging task. In this paper, we present a direct trust dependent link state routing using route trusts which protects WSNs against routing attacks by eliminating the un-trusted nodes before making routes and finding best trustworthy route among them. We compare our work with the most prevalent routing protocols and show its benefits over them.
文摘China has entered a new era represented by the newly established China (Shanghai) Pilot Free Trade Zone, in which further reform and development of its financial system and capital market are highly prioritized. The trust as an important vehicle in development of the financial market in China as well as in the world will play an important role, and there will be more foreign elements involved in Chinese trusts. The Law of the People's Republic of China on Application of Laws in Civil Relations with Foreign Elements provides rules, in its article 17, on the application of laws to trusts, which symbolizes the formal creation of rules of conflict of laws in China in this area. However, it seems to cause more problems than it may resolve. For example, it may not always be possible for the parties to determine the appli- cable law through consultation and agreement, and the parties' right to choice of law should not be without limitation either. By allowing judges to choose from "the law of the situs where the trust property is situated" and "the law of the situs where the trust relationship occurred" in the absence of an effective choice of law by the parties may lead to a situation contrary to existing laws and may create uncertainty for the parties as well. This paper analyzes this article 17 by comparing it with the conflict law rules adopted in the United States and by the Hague Convention, identifies problems, and seeks to find solutions in order to promote the healthy development of the trust system in China.
文摘The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supported Africa in addressing historical injustices at diplomatic and political levels and firmly backed South Africa in hosting the G20 Leaders’Summit,further deepening China-Africa strategic mutual trust.
基金supported by the National Natural Science Foundation of China under Grant 62471493supported by the Natural Science Foundation of Shandong Province under Grant ZR2023LZH017,ZR2024MF066。
文摘With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate.
文摘This mixed-methods study investigated how AI-enhanced English as a Foreign Language(EFL)learning environments influence students’psychological well-being through the mediating roles of motivation and language learning anxiety and the moderating role of trust.Participants were Chinese university students(N=310,62%female,mean age=18.9,SD=0.8),of whom 15 completed interviews to both add to and to clarify the evidence from the surveys.Structural equation modeling results revealed that AI use had significant indirect effects on well-being through increased motivation and reduced language learning anxiety.Trust in AI significantly moderated both paths,amplifying the motivational benefits and anxiety reduction associated with AI use.Thematic analysis supported these results,identifying three experiential themes:(1)motivational empowerment through personalization,(2)anxiety regulation through safe practice and feedback,and(3)trust as the emotional bridge between AI and well-being.The study extends AI psychology applications by empirically linking technology engagement with affective outcomes and underscores the need for human-centered and trust-enhancing design in AI-supported education.From these findings,we conclude that adaptive,transparent,and autonomy-supportive AI systems promote self-determined motivation,emotional safety,and overall psychological health among EFL learners.
文摘This paper examines Hernán Díaz’s novel Trust (2022) through the lens of cultural deconstruction, analyzing how its four nested narratives systematically dismantle the American Dream ideology. The novel Bonds and autobiography My Life collaboratively construct a financial myth portraying protagonist Andrew Bevel as an exemplar of self-made success. Subsequently, Ida’s Memoir exposes the subjective construction of history, declaring the American Dream’s bankruptcy at the epistemological level, while Mildred’s diary Futures deconstructs the myth from within by revealing that Bevel’s financial genius was built upon appropriation of his wife’s intellectual labor. This paper argues that Trust reveals the American Dream as an ideological illusion-narratively constructed, practically dependent on structural injustice, and essentially serving power reproduction.
基金supported by National Key R&D Program of China(No.2022YFB3105101).
文摘With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space.
基金funded by the Sichuan Science and Technology Program,Grant Nos.2024NSFSC0515,2024ZHCG0182 and MZGC20230013.
文摘To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions.
基金funded by the National Natural Science Foundation of China,grant numbers(62272007,62001007)the Natural Science Foundation of Beijing,grant numbers(4234083,4212018)The authors also extend their appreciation to King Khalid University for funding this work through the Large Group Project under grant number RGP.2/373/45.
文摘Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain routing.Existing research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP nodes.In this paper,we propose a blockchain-based trust model for inter-domain routing.Our model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the blockchain.The BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective alliance.We incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing service.We forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing behavior.We use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust model.Compared with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks.
文摘GS1 is an international standards organization,which focuses on product identification and product data,helping businesses and governments to improve commerce and supply chain.Why trusted data is essential to high-quality development?More than 50 years ago,GS1 was initiated with the bar code,a profound transformation of the way we work and live.From then on,a simple scan connected a physical product to its digital identity.It transformed commerce,improving supply chains and enabling safer healthcare.Collaboration between industry and governments,and a strong partnership with ISO and IEC laid the foundations for the global adoption of a common product identification over the past 50 years and all around the world.
文摘Today,I want to share how international standards can forge trust and fuel innovation,laying the foundation for a future where AI benefits everyone,everywhere.First,AI standards,developed jointly by ISO and IEC-the International Electrotechnical Commission-help build global trust and enable responsible innovation by bringing clarity and coherence to an ever-changing AI landscape.As developments in AI continue to emerge at speed,regulation is struggling to keep up and the proliferation of competing standards has created confusion rather than clarity.ISO and our partner IEC are addressing this challenge through the work of our expert committee on AI,SC 42,which takes a holistic,cohesive approach to AI standardization.
文摘Nowadays,we are witnessing the tremendous changes brought by AI technologies.What role can standards play in this process?How can we build global trust and enable responsible innovation?