2017
DOI: 10.1109/tsc.2015.2437383
|View full text |Cite
|
Sign up to set email alerts
|

NCShield: Protecting Decentralized, Matrix Factorization-Based Network Coordinate Systems

Abstract: Network Coordinate (NC) systems provide a scalable means for Internet distance prediction and are useful for various Internet-based services, such as cloud or web-based services. Decentralized, matrix factorization-based NC (MFNC) systems have received particular attention recently. They can serve large-scale distributed services (as opposed to centralized NC systems) and do not need to satisfy the triangle inequality (as opposed to Euclidean-based NC systems). However, because of their decentralized nature, M… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 56 publications
(86 reference statements)
0
3
0
Order By: Relevance
“…In addition to the explicit type of game model, researchers have established some game models based on different application scenarios [70][71][72][73][74]. Most of these game models are established with the following objectives as the ultimate goal: To establish trust relationships and increase the credibility of data, to defend against malicious attacks in the network, to help the system by choosing a better strategy, and to maximize network utility by achieving these goals [75][76][77][78][79][80][81].…”
Section: Relate Summarized Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition to the explicit type of game model, researchers have established some game models based on different application scenarios [70][71][72][73][74]. Most of these game models are established with the following objectives as the ultimate goal: To establish trust relationships and increase the credibility of data, to defend against malicious attacks in the network, to help the system by choosing a better strategy, and to maximize network utility by achieving these goals [75][76][77][78][79][80][81].…”
Section: Relate Summarized Workmentioning
confidence: 99%
“…Wu et al [60] Ruan et al [61] John et al [62] Wu et al [63] Jin and van Dijk [64] Yu et al [66] Abbass et al [68] Chica et al [69] Hu et al [6] Zhu et al [70] Ding et al [71] Zhang et al [72] Aloqaily et al [74] Rishwaraj et al [75] Pouryazdan et al [76] Chen et al [77] Lorenzo et al [78] Li et al [79] Aroyo et al [80] Moghadam and Modares [81] Cui et al [28] Yin et al [26] Chen et al [27] Li et al [14] According to whether the players cooperate, the game is divided into cooperative game and non-cooperative game. The common goal of both games can maximize network utility and improve network security.…”
Section: Security Game Trust Game Othersmentioning
confidence: 99%
See 1 more Smart Citation