Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (8): 2442-2446.DOI: 10.11772/j.issn.1001-9081.2014.08.2442
Previous Articles Next Articles
LIU Bin,ZHANG Renjin
Received:2014-01-26
Revised:2014-03-09
Online:2014-08-10
Published:2014-08-01
Contact:
LIU Bin
刘彬,张仁津
通讯作者:
刘彬
作者简介:基金资助:贵州省科学技术基金资助项目
CLC Number:
LIU Bin ZHANG Renjin. Promoting accuracy of trust bootstrapping from rating network[J]. Journal of Computer Applications, 2014, 34(8): 2442-2446.
刘彬 张仁津. 从评价网络提升信任启动的准确度[J]. 计算机应用, 2014, 34(8): 2442-2446.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.08.2442
| [1]HOFFMAN K, ZAGE D, CRISTINA N R. A survey of attack and defense techniques for reputation systems [J]. ACM Computing Surveys, 2009, 42(1): 1-31. |
| [1] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
| [2] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
| [3] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
| [4] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
| [5] | . Location privacy-preserving recommendation scheme based on federated graph neural network [J]. Journal of Computer Applications, 0, (): 0-0. |
| [6] | XiangJun LI, Junhong WANG, Shilu WANG, Jinxia CHEN, Jitao SUN, Jianhui WANG. Malicious traffic detection method based on multi-model parallel fusion network [J]. Journal of Computer Applications, 2023, 43(S2): 122-129. |
| [7] | Jingcheng XU, Xuebin CHEN, Yanling DONG, Jia YANG. DDoS attack detection by random forest fused with feature selection [J]. Journal of Computer Applications, 2023, 43(11): 3497-3503. |
| [8] | Shanshan HUO, Yanjun LI, Jian LIU, Yinshuang LI. Design and implementation of cipher component security criteria testing tool [J]. Journal of Computer Applications, 2023, 43(10): 3156-3161. |
| [9] | Xiang GUO, Wengang JIANG, Yuhang WANG. Encrypted traffic classification method based on improved Inception-ResNet [J]. Journal of Computer Applications, 2023, 43(8): 2471-2476. |
| [10] | Kui JIANG, Zhihang YU, Xiaolei CHEN, Yuhao LI. Design and implementation of Webshell traffic detection system based on BERT-CNN [J]. Journal of Computer Applications, 2023, 43(S1): 126-132. |
| [11] | Chao ZHENG, Yueting WU, Ke XIAO. Intrusion detection based on federated learning and deep residual network [J]. Journal of Computer Applications, 2023, 43(S1): 133-138. |
| [12] | Yiting SUN, Yue GUO, Changjin LI, Hongjun ZHANG, Kang LIU, Junjiao Liu, Limin SUN. Intrusion detection method for control logic injection attack against programmable logic controller [J]. Journal of Computer Applications, 2023, 43(6): 1861-1869. |
| [13] | Haiyan HU, Qiaoyan KANG, Shuo ZHAO, Jianfeng WANG, Youbin FU. Service function chain deployment optimization method based on node comprehensive importance ranking [J]. Journal of Computer Applications, 2023, 43(3): 860-868. |
| [14] | Jingyun CHENG, Buhong WANG, Peng LUO. Static code defect detection method based on deep semantic fusion [J]. Journal of Computer Applications, 2022, 42(10): 3170-3176. |
| [15] | Wenting BI, Haitao LIN, Liqun ZHANG. Moving target defense decision-making algorithm based on multi-stage evolutionary signal game model [J]. Journal of Computer Applications, 2022, 42(9): 2780-2787. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||