Citation: | XU Jun, ZHONG Yuansheng, WAN Shuping. Incentive Adaptive Trust Model Based on Integrated Intuitionistic Fuzzy Information[J]. Journal of Electronics & Information Technology, 2016, 38(4): 803-810. doi: 10.11999/JEIT150750 |
徐海湄, 齐守青, 卢显良, 等. 一种新的基于概率统计论的P2P网络信任模型[J]. 电子与信息学报, 2011, 33(6): 1314-1318. doi: 10.3724/SP.J.1146.2010.00179.
|
XU H M, QI S Q, LU X L, et al. A novel trust model of P2P networks based on theory of probability and statistics[J]. Journal of Electronics Information Technology, 2011, 33(6): 1314-1318. doi: 10.3724/SP.J.1146.2010.00179.
|
KAMVAR S D, SCHLOSSER M T, and GARCIA-MOLINA H. The eigentrust algorithm for reputation management in P2P networks[C]. Proceedings of 12th International World Wide Web Conference, Budapest, 2003: 640-651.
|
TEACY W T, LUCK M, ROGERS A, et al. An efficient and versatile approach to trust and reputation using hierarchical bayesian modeling[J]. Artificial Intelligence, 2012, 193: 149-185.
|
张绍武, 林鸿飞, 刘晓霞, 等. 基于概率的信任传播模型[J]. 计算机科学, 2014, 41(8): 90-93.
|
ZHANG S W, LIN H F, LIU X X, et al. Trust propagation based on probability[J]. Computer Science, 2014, 41(8): 90-93.
|
CERUTTI F, TONIOLO A, OREN N, et al. Subjective logic operators in trust assessment: an empirical study[J]. Information Systems Frontiers, 2015, 17(4): 743-762.
|
田俊峰, 吴丽娟. 基于多项式主观逻辑的扩展信任传播模型[J]. 通信学报, 2013, 34(5): 12-19.
|
TIAN J F and WU L J. Multinomial subjective logic based extended trust propagation model[J]. Journal on Communications, 2013, 34(5): 12-19.
|
LIU G, YANG Q, WANG H, et al. Assessment of Multi-hop interpersonal trust in social networks by three-valued subjective logic[C]. IEEE Conference on Computer Communications, Shanghai, 2014: 1698-1706.
|
李致远, 王汝传. P2P电子商务环境下的动态安全信任管理模型[J]. 通信学报, 2011, 32(3): 50-59.
|
LI Z Y and WANG R C. Dynamic secure trust management model for P2P e-commerce environments[J]. Journal on Communications, 2011, 32(3): 50-59.
|
徐晓斌, 张光卫, 王尚广, 等. 基于轻量云模型的WSN不确定性信任表示方法[J]. 通信学报, 2014, 35(2): 63-69.
|
XU X B, ZHANG G W, WANG S G, et al. Representation for uncertainty trust of WSN based on lightweight-cloud[J]. Journal on Communications, 2014, 35(2): 63-69.
|
YU B and SINGH M P. An evidential model of distributed reputation management[C]. Proceedings of the First International Joint Conference on Autonomous Agents and Multi-agent Systems: Part 1. Bologna, 2002: 294-301.
|
田春岐, 邹仕洪, 王文东, 等. 一种新的基于改进型DS证据理论的P2P信任模型[J]. 电子与信息学报, 2008, 30(6): 1480-1484.
|
TIAN C Q, ZOU S H, WANG W D, et al. A new trust based on advance D-S evidence theory for P2P networks[J]. Journal of Electronics Information Technology, 2008, 30(6): 1480-1484.
|
蒋黎明, 张宏, 张琨, 等. 开放系统中一种基于模糊修正的证据信任模型[J]. 电子与信息学报, 2011, 33(8): 1930-1936. doi: 10.3724/SP.J.1146.2011.00063.
|
JIANG L M, ZHANG H, ZHANG K, et al. An evidential trust model with fuzzy adjustment method for open systems[J]. Journal of Electronics Information Technology, 2011, 33(8): 1930-1936. doi: 10.3724/SP.J.1146.2011.00063.
|
JIANG L, XU J, ZHANG K, et al. A new evidential trust model for open distributed systems[J]. Expert Systems with Applications, 2012, 39(3): 3772-3782.
|
XU Z and CAI X. Intuitionistic Fuzzy Information Aggregation[M]. Springer Berlin Heidelberg, 2012: 4-16.
|
雷英杰, 赵杰, 路艳丽, 等. 直觉模糊集理论及应用[M]. 北京: 科学出版社, 2014: 90-95.
|
LEI Y J, ZHAO J, LU Y L, et al. Theory and Application of Intuitionistic Fuzzy Set[M]. Beijing: Science Press, 2014: 90-95.
|
韩祺祎, 任梦吟, 文红. 基于拓扑势的P2P社区推荐信任模型[J]. 电子与信息学报, 2015, 37(6):?1279-1284. doi: 10.11999/ JEIT141303.
|
HAN Q Y, REN M Y, and WEN H. Topological potential based recommendation trust model for P2P communities system[J]. Journal of Electronics Information Technology, 2015, 37(6): 1279-1284. doi: 10.11999/JEIT141303.
|
YUE Z. Aggregating crisp values into intuitionistic fuzzy number for group decision making[J]. Applied Mathematical Modelling, 2014, 38(11): 2969-2982.
|
TZENG G H and HUANG J J. Multiple Attribute Decision Making: Methods and Applications[M]. Florida: CRC Press, 2011: 342-366.
|
吴大鹏, 冯誉, 王汝言, 等. 恶意节点容忍的间断连接无线网络消息转发策略[J]. 电子与信息学报, 2015, 37(7): 1591-1597. doi: 10.11999/JEIT141198.
|
WU D P, FENG Y, WANG R Y, et al. Malicious node tolerant packet forwarding mechanism for intermittently connected wireless network[J]. Journal of Electronics Information Technology, 2015, 37(7): 1591-1597. doi: 10.11999/JEIT141198.
|