Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (8): 2442-2446.DOI: 10.11772/j.issn.1001-9081.2014.08.2442
Previous Articles Next Articles
LIU Bin,ZHANG Renjin
Received:
2014-01-26
Revised:
2014-03-09
Online:
2014-08-01
Published:
2014-08-10
Contact:
LIU Bin
通讯作者:
刘彬
作者简介:
基金资助:
贵州省科学技术基金资助项目
CLC Number:
LIU Bin ZHANG Renjin. Promoting accuracy of trust bootstrapping from rating network[J]. Journal of Computer Applications, 2014, 34(8): 2442-2446.
刘彬 张仁津. 从评价网络提升信任启动的准确度[J]. 计算机应用, 2014, 34(8): 2442-2446.
[1]HOFFMAN K, ZAGE D, CRISTINA N R. A survey of attack and defense techniques for reputation systems [J]. ACM Computing Surveys, 2009, 42(1): 1-31. |
[1] | . Moving target defense decision-making algorithm based on multi-stage evolutionary signal game model [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | ZHU Yuna, ZHANG Yutao, YAN Shaoge, FAN Yudan, CHEN Hantuo. Protocol identification approach based on semi-supervised subspace clustering [J]. Journal of Computer Applications, 2021, 41(10): 2900-2904. |
[3] | XIAO Yuelei, DENG Xiaofan. Improvement and analysis of certificate-based wired local area network security association scheme [J]. Journal of Computer Applications, 2021, 41(7): 1970-1976. |
[4] | DU Xinyu, WANG Huaqun. Dynamic group based effective identity authentication and key agreement scheme in LTE-A networks [J]. Journal of Computer Applications, 2021, 41(6): 1715-1722. |
[5] | WANG Yao, SUN Guozi. Oversampling method for intrusion detection based on clustering and instance hardness [J]. Journal of Computer Applications, 2021, 41(6): 1709-1714. |
[6] | GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan. Reverse hybrid access control scheme based on object attribute matching in cloud computing environment [J]. Journal of Computer Applications, 2021, 41(6): 1604-1610. |
[7] | . Adversarial attack algorithm for deep learning interpretability [J]. Journal of Computer Applications, 0, (): 0-0. |
[8] | GUO Shuai, SU Yang. Encrypted traffic classification method based on data stream [J]. Journal of Computer Applications, 2021, 41(5): 1386-1391. |
[9] | ZHANG Quanlong, WANG Huaibin. Intrusion detection model based on combination of dilated convolution and gated recurrent unit [J]. Journal of Computer Applications, 2021, 41(5): 1372-1377. |
[10] | TANG Yanqiang, LI Chenghai, SONG Yafei. Network security situation prediction based on improved particle swarm optimization and extreme learning machine [J]. Journal of Computer Applications, 2021, 41(3): 768-773. |
[11] | HANG Mengxin, CHEN Wei, ZHANG Renjie. Abnormal flow detection based on improved one-dimensional convolutional neural network [J]. Journal of Computer Applications, 2021, 41(2): 433-440. |
[12] | OU Binli, ZHONG Xiaru, DAI Jianhua, YANG Tian. Intrusion detection method based on variable precision covering rough set [J]. Journal of Computer Applications, 2020, 40(12): 3465-3470. |
[13] | YANG Jianxi, ZHANG Yuanli, JIANG Hua, ZHU Xiaochen. Detection method of physical-layer impersonation attack based on deep Q-network in edge computing [J]. Journal of Computer Applications, 2020, 40(11): 3229-3235. |
[14] | CHEN Yi, ZHANG Meijing, XU Fajian. Slow HTTP DoS attack detection method based on one-dimensional convolutional neural network [J]. Journal of Computer Applications, 2020, 40(10): 2973-2979. |
[15] | ZHAO Guoxin, DING Ruofan, YOU Jianzhou, LYU Shichao, PENG Feng, LI Fei, SUN Limin. Design and implementation of high-interaction programmable logic controller honeypot system based on industrial control business simulation [J]. Journal of Computer Applications, 2020, 40(9): 2650-2656. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||