[1] 中国电子商务研究中心.2014年(上)中国电子商务用户体验与投诉监测报告[EB/OL].[2015-07-10].http://www.100ec.cn/zt/upload_data/down/2014shyhty.pdf.(China Electronic Commerce Research Center. 2014 China electronic commerce user experience and complaint monitoring report[EB/OL].[2015-07-10]. http://www.100ec.cn/zt/upload_data/down/2014 shyhty.pdf.) [2] JSANG A, ISMAIL R. The beta reputation system[EB/OL].[2014-10-10]. http://folk.uio.no/josang/papers/JI2002-Bled.pdf. [3] WHITBY A, JØSANG A, INDULSKA J. Filtering out unfair ratings in Bayesian reputation systems[EB/OL].[2014-10-10]. http://folk.uio.no/josang/papers/WJI2004-AAMAS.pdf. [4] TEACY W T, LUCK M, ROGERS A, et al. An efficient and versatile approach to trust and reputation using hierarchical Bayesian modeling[J]. Artificial Intelligence, 2012, 193:149-185. [5] 苗光胜, 冯登国, 苏璞睿. P2P 信任模型中基于模糊逻辑的共谋团体识别方法[J].计算机研究与发展, 2012, 48(12):2187-2200.(MIAO G S, FENG D G, SU P R. A collusion detector based on fuzzy logic in P2P trust model[J]. Journal of Computer Research and Development, 2011, 48(12):2187-2200.) [6] XIA H, JIA Z, LI X, et al. Trust prediction and trust-based source routing in mobile Ad Hoc networks[J]. Ad Hoc Networks, 2013, 11(7):2096-2114. [7] CERUTTI F, TONIOLO A, OREN N, et al. Context-dependent trust decisions with subjective logic[EB/OL].[2015-10-01]. http://export.arxiv.org/pdf/1309.4994. [8] CERUTTI F, KAPLAN L M, NORMAN T J, et al. Subjective logic operators in trust assessment:an empirical study[J]. Information Systems Frontiers, 2013, 17(4):743-762. [9] 孟祥怡,张光卫,刘常昱,等.基于云模型的主观信任管理模型研究[J].系统仿真学报,2007,19(14):3310-3317.(MENG X Y, ZHANG G W, LIU C Y, et al. Research on subjective trust management model based on cloud model[J]. Journal of System Simulation, 2007, 19(14):3310-3317.) [10] 张仕斌, 许春香. 基于云模型的信任评估方法研究[J]. 计算机学报, 2013, 36(2):422-431.(ZHANG S B, XU C X. Study on the trust evaluation approach based on cloud model[J]. Chinese Journal of Computers, 2013, 36(2):422-431.) [11] WANG J, SUN H J. A new evidential trust model for open communities[J]. Computer Standards & Interfaces, 2009, 31(5):994-1001. [12] JIANG L, XU J, ZHANG K, et al. A new evidential trust model for open distributed systems[J]. Expert Systems with Applications, 2012, 39(3):3772-3782. [13] 徐军, 钟元生. 一种集成区间逼近理想点的主观信任模型[J]. 小型微型计算机系统, 2014, 35(11):2428-2433.(XU J, ZHONG Y S. A subjective trust model based on integrated interval similarity to ideal[J]. Journal of Chinese Computer Systems, 2014, 35(11):2428-2433.) [14] 徐兰芳, 胡怀飞, 桑子夏, 等. 基于灰色系统理论的信誉报告机制[J].软件学报, 2007, 18(7):1730-1737.(XU L F, HU H F, SANG Z X, et al. A prestige reporting mechanism based on gray system theory[J]. Journal of Software, 2007, 18(7):1730-1737.) [15] XU Z S, CAI X. Intuitionistic Fuzzy Information Aggregation[M]. Berlin:Springer, 2012:4-16. [16] 赵萌, 任嵘嵘, 邱菀华. 基于直觉模糊熵的专家权重确定方法及其验证[J]. 控制与决策, 2015, 30(7):1233-1238.(ZHAO M, REN R R, QIU W H. Experts' weights method and computational experiment analysis based on intuitionistic fuzzy entropy measures[J]. Control and Decision, 2015, 30(7):1233-1238.) [17] 李乔, 何慧, 方滨兴, 等. 基于信任的网络群体异常行为发现[J].计算机学报, 2014, 37(1):1-14.(LI Q, HE H, FANG B X, et al. A wareness of the network group anomalous behaviors based on network trust[J]. Chinese Journal of Computers, 2014, 37(1):1-14.) |