Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2015
DOI: 10.1016/j.knosys.2015.08.003
|View full text |Cite
|
Sign up to set email alerts
|

A priori trust inference with context-aware stereotypical deep learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 30 publications
0
13
0
Order By: Relevance
“…In particular, privacy protections on trust evidence are not explored in all methods. Only a few of the existing methods can resist attacks that occur in trust evaluation [D'Angelo et al 2017;Zhou et al 2015;Tran 2015, 2017]. Among the existing methods, we roughly divide those with contextual awareness into two categories.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, privacy protections on trust evidence are not explored in all methods. Only a few of the existing methods can resist attacks that occur in trust evaluation [D'Angelo et al 2017;Zhou et al 2015;Tran 2015, 2017]. Among the existing methods, we roughly divide those with contextual awareness into two categories.…”
Section: Discussionmentioning
confidence: 99%
“…Methods that consider computational overhead are also rare. Most works do not consider this quality attribute, which was only considered in Zhou et al [2015], Yahyaoui and Zhioua [2013], Yahyaoui and Al-Mutairi [2016], Huang et al [2005], and Kim and Song [2011].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…A separate thread of research relies solely on stereotypical intrinsic properties of the agents and the environment in which they operate, to derive a likelihood of trustworthiness without using any evidence. These approaches (Zhou et al 2015;Noorian, Marsh, and Fleming 2011;Singh 2011;Liu and Datta 2012) are considered a complement to evidence-based trust and are beneficial when there is no enough evidence available.…”
Section: Related Workmentioning
confidence: 99%
“…In general, HTTPAS performs active authentication based on trust management theory. However, since the trust management is a big research topic, we should narrow down our scope and exclude the trust management works that are somewhat far away from this paper (such as the social trust management [14–16], the behaviour‐based trust modelling [17, 18] and the stereotypical trust management methods [19]). As a result, we only focus on the trust management methods built on the CA model for authentication.…”
Section: Related Workmentioning
confidence: 99%