| Citation: | XU Jun, ZHONG Yuansheng, WAN Shuping. Incentive Adaptive Trust Model Based on Integrated Intuitionistic Fuzzy Information[J]. Journal of Electronics & Information Technology, 2016, 38(4): 803-810. doi: 10.11999/JEIT150750 | 
 
	                | 徐海湄, 齐守青, 卢显良, 等. 一种新的基于概率统计论的P2P网络信任模型[J]. 电子与信息学报, 2011, 33(6): 1314-1318. doi:  10.3724/SP.J.1146.2010.00179. | 
| XU H M, QI S Q, LU X L, et al. A novel trust model of P2P networks based on theory of probability and statistics[J]. Journal of Electronics  Information Technology, 2011, 33(6): 1314-1318. doi:  10.3724/SP.J.1146.2010.00179. | 
| KAMVAR S D, SCHLOSSER M T, and GARCIA-MOLINA H. The eigentrust algorithm for reputation management in P2P networks[C]. Proceedings of 12th International World Wide Web Conference, Budapest, 2003: 640-651. | 
| TEACY W T, LUCK M, ROGERS A, et al. An efficient and versatile approach to trust and reputation using hierarchical bayesian modeling[J]. Artificial Intelligence, 2012, 193: 149-185. | 
| 张绍武, 林鸿飞, 刘晓霞, 等. 基于概率的信任传播模型[J]. 计算机科学, 2014, 41(8): 90-93. | 
| ZHANG S W, LIN H F, LIU X X, et al. Trust propagation based on probability[J]. Computer Science, 2014, 41(8): 90-93. | 
| CERUTTI F, TONIOLO A, OREN N, et al. Subjective logic operators in trust assessment: an empirical study[J]. Information Systems Frontiers, 2015, 17(4): 743-762. | 
| 田俊峰, 吴丽娟. 基于多项式主观逻辑的扩展信任传播模型[J]. 通信学报, 2013, 34(5): 12-19. | 
| TIAN J F and WU L J. Multinomial subjective logic based extended trust propagation model[J]. Journal on Communications, 2013, 34(5): 12-19. | 
| LIU G, YANG Q, WANG H, et al. Assessment of Multi-hop interpersonal trust in social networks by three-valued subjective logic[C]. IEEE Conference on Computer Communications, Shanghai, 2014: 1698-1706. | 
| 李致远, 王汝传. P2P电子商务环境下的动态安全信任管理模型[J]. 通信学报, 2011, 32(3): 50-59. | 
| LI Z Y and WANG R C. Dynamic secure trust management model for P2P e-commerce environments[J]. Journal on Communications, 2011, 32(3): 50-59. | 
| 徐晓斌, 张光卫, 王尚广, 等. 基于轻量云模型的WSN不确定性信任表示方法[J]. 通信学报, 2014, 35(2): 63-69. | 
| XU X B, ZHANG G W, WANG S G, et al. Representation for uncertainty trust of WSN based on lightweight-cloud[J]. Journal on Communications, 2014, 35(2): 63-69. | 
| YU B and SINGH M P. An evidential model of distributed reputation management[C]. Proceedings of the First International Joint Conference on Autonomous Agents and Multi-agent Systems: Part 1. Bologna, 2002: 294-301. | 
| 田春岐, 邹仕洪, 王文东, 等. 一种新的基于改进型DS证据理论的P2P信任模型[J]. 电子与信息学报, 2008, 30(6): 1480-1484. | 
| TIAN C Q, ZOU S H, WANG W D, et al. A new trust based on advance D-S evidence theory for P2P networks[J]. Journal of Electronics  Information Technology, 2008, 30(6): 1480-1484. | 
| 蒋黎明, 张宏, 张琨, 等. 开放系统中一种基于模糊修正的证据信任模型[J]. 电子与信息学报, 2011, 33(8): 1930-1936. doi:  10.3724/SP.J.1146.2011.00063. | 
| JIANG L M, ZHANG H, ZHANG K, et al. An evidential trust model with fuzzy adjustment method for open systems[J]. Journal of Electronics  Information Technology, 2011, 33(8): 1930-1936. doi:  10.3724/SP.J.1146.2011.00063. | 
| JIANG L, XU J, ZHANG K, et al. A new evidential trust model for open distributed systems[J]. Expert Systems with Applications, 2012, 39(3): 3772-3782. | 
| XU Z and CAI X. Intuitionistic Fuzzy Information Aggregation[M]. Springer Berlin Heidelberg, 2012: 4-16. | 
| 雷英杰, 赵杰, 路艳丽, 等. 直觉模糊集理论及应用[M]. 北京: 科学出版社, 2014: 90-95. | 
| LEI Y J, ZHAO J, LU Y L, et al. Theory and Application of Intuitionistic Fuzzy Set[M]. Beijing: Science Press, 2014: 90-95. | 
| 韩祺祎, 任梦吟, 文红. 基于拓扑势的P2P社区推荐信任模型[J]. 电子与信息学报, 2015, 37(6):?1279-1284. doi: 10.11999/ JEIT141303. | 
| HAN Q Y, REN M Y, and WEN H. Topological potential based recommendation trust model for P2P communities system[J]. Journal of Electronics  Information Technology, 2015, 37(6): 1279-1284. doi:  10.11999/JEIT141303. | 
| YUE Z. Aggregating crisp values into intuitionistic fuzzy number for group decision making[J]. Applied Mathematical Modelling, 2014, 38(11): 2969-2982. | 
| TZENG G H and HUANG J J. Multiple Attribute Decision Making: Methods and Applications[M]. Florida: CRC Press, 2011: 342-366. | 
| 吴大鹏, 冯誉, 王汝言, 等. 恶意节点容忍的间断连接无线网络消息转发策略[J]. 电子与信息学报, 2015, 37(7): 1591-1597. doi:  10.11999/JEIT141198. | 
| WU D P, FENG Y, WANG R Y, et al. Malicious node tolerant packet forwarding mechanism for intermittently connected wireless network[J]. Journal of Electronics  Information Technology, 2015, 37(7): 1591-1597. doi:  10.11999/JEIT141198. | 
