
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Erman Ayday, Faramarz Fekri, "Iterative Trust and Reputation Management Using Belief Propagation," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 375386, May/June, 2012.  
BibTex  x  
@article{ 10.1109/TDSC.2011.64, author = {Erman Ayday and Faramarz Fekri}, title = {Iterative Trust and Reputation Management Using Belief Propagation}, journal ={IEEE Transactions on Dependable and Secure Computing}, volume = {9}, number = {3}, issn = {15455971}, year = {2012}, pages = {375386}, doi = {http://doi.ieeecomputersociety.org/10.1109/TDSC.2011.64}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Dependable and Secure Computing TI  Iterative Trust and Reputation Management Using Belief Propagation IS  3 SN  15455971 SP375 EP386 EPD  375386 A1  Erman Ayday, A1  Faramarz Fekri, PY  2012 KW  Trust and reputation management KW  belief propagation KW  iterative algorithms KW  bad mouthing KW  ballot stuffing KW  online services KW  ecommerce. VL  9 JA  IEEE Transactions on Dependable and Secure Computing ER   
[1] S. Buchegger and J. Boudec, "Performance Analysis of Confidant Protocol (Coorperation of Nodes: Fairness in Dynamic AdHoc Networks)," Proc. IEEE/ACM Symp. Mobile Ad Hoc Networking and Computing (MobiHOC), June 2002.
[2] S. Buchegger and J. Boudec, "A Robust Reputation System for P2P and Mobile AdHoc Networks," Proc. Second Workshop the Economics of PeertoPeer Systems, 2004.
[3] S. Ganeriwal and M. Srivastava, "ReputationBased Framework for High Integrity Sensor Networks," Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), pp. 6677, 2004.
[4] Y. Sun, W. Yu, Z. Han, and K. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 305317, Feb. 2006.
[5] H. PishroNik and F. Fekri, "On Decoding of LowDensity ParityCheck Codes on the Binary Erasure Channel," IEEE Trans. Information Theory, vol. 50, no. 3, pp. 439454, Mar. 2004.
[6] H. PishroNik and F. Fekri, "Results on Punctured Lowdensity ParityCheck Codes and Improved Iterative Decoding Techniques," IEEE Trans. Information Theory, vol. 53, no. 2, pp. 599614, Feb. 2007.
[7] B.N. Vellambi and F. Fekri, "Results on the Improved Decoding Algorithm for LowDensity ParityCheck Codes over the Binary Erasure Channel," IEEE Trans. Information Theory, vol. 53, no. 4, pp. 15101520, Apr. 2007.
[8] E. Ayday, H. Lee, and F. Fekri, "An Iterative Algorithm for Trust and Reputation Management," Proc. IEEE Int'l Symp. Information Theory (ISIT '09), 2009.
[9] J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, 1988.
[10] F. Kschischang, B. Frey, and H.A. Loeliger, "Factor Graphs and the SumProduct Algorithm," IEEE Trans. Information Theory, vol. 47, no. 2, pp. 498519, Feb. 2001.
[11] J. Zhang and M. Fossorier, "Shuffled Belief Propagation Decoding," Proc. 36th Asilomar Conf. Signals, Systems and Computers, Nov. 2002.
[12] E. Ayday, H. Lee, and F. Fekri, "Trust Management and Adversary Detection in Delay Tolerant Networks," Proc. IEEE Military Comm. Conf. (MILCOM '10), 2010.
[13] Y. Liu, A.H. Ngu, and L.Z. Zeng, "Qos Computation and Policing in Dynamic Web Service Selection," Proc. 13th Int'l World Wide Web Conf. Alternate Track Papers & Posters (WWW Alt. '04), pp. 6673, 2004.
[14] U.S. Manikrao and T.V. Prabhakar, "Dynamic Selection of Web Services with Recommendation System," Proc. Int'l Conf. Next Generation Web Services Practices (NWESP '05), p. 117, 2005.
[15] E.M. Maximilien and M.P. Singh, "Conceptual Model of Web Service Reputation," SIGMOD Record, vol. 31, no. 4, pp. 3641, 2002.
[16] E.M. Maximilien and M.P. Singh, "Toward Autonomic Web Services Trust and Selection," Proc. Second Int'l Conf. Service Oriented Computing (ICSOC '04), pp. 212221, 2004.
[17] E.M. Maximilien and M.P. Singh, "Multiagent System for Dynamic Web Services Selection," Proc. First Workshop ServiceOriented Computing and AgentBased Eng., 2005.
[18] K. Aberer and Z. Despotovic, "Managing Trust in a Peer2Peer Information System," Proc. Tenth Int'l Conf. Information and Knowledge Management (CIKM '01), pp. 310317, 2001.
[19] F. Cornelli, E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P. Samarati, "Choosing Reputable Servents in a P2P Network," Proc. 11th Int'l Conf. World Wide Web (WWW '02), pp. 376386, 2002.
[20] E. Damiani, D.C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, "A reputationBased Approach for choosing Reliable Resources in PeertoPeer Networks," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), pp. 207216, 2002.
[21] D. Fahrenholtz and W. Lamersdorf, "Transactional Security for a Distributed Reputation Management System," Proc. Third Int'l Conf. ECommerce and Web Technologies (ECWEB '02), pp. 214223, 2002.
[22] M. Gupta, P. Judge, and M. Ammar, "A Reputation System for PeertoPeer Networks," Proc. 13th Int'l Workshop Network and Operating Systems Support for Digital Audio and Video (NOSSDAV '03), pp. 144152, 2003.
[23] S.D. Kamvar, M.T. Schlosser, and H. GarciaMolina, "The Eigentrust Algorithm for Reputation Management in P2P Networks," Proc. 12th Int'l Conf. World Wide Web (WWW '03), pp. 640651, 2003.
[24] C.W. Hang, Y. Wang, and M.P. Singh, "An Adaptive Probabilistic Trust Model and Its Evaluation," Proc. Seventh Int'l Joint Conf. Autonomous Agents and Multiagent Systems (AAMAS '08), vol. 3, pp. 14851488, 2008.
[25] Y. Wang and M.P. Singh, "EvidenceBased Trust: A Mathematical Model Geared for Multiagent Systems," ACM Trans. Autonomous and Adaptive Systems, vol. 5, pp. 14:114:28, Nov. 2010.
[26] L. Page, S. Brin, R. Motwani, and T. Winograd, "The Pagerank Citation Ranking: Bringing Order to the Web," technical report, Stanford Digital Library Technologies Project, 1998.
[27] S. Buchegger and J. Boudec, "Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad Hoc Networks," Technical Report IC/2003/31, EPFLDIICA, 2003.
[28] G. Zacharia, A. Moukas, and P. Maes, "Collaborative Reputation Mechanisms in Electronic Marketplaces," Proc. 32nd Ann. Hawaii Int'l Conf. System Sciences (HICSS '99), 1999.
[29] C. Dellarocas, "Immunizing Online Reputation Reporting Systems against Unfair Ratings and Discriminatory Behavior," Proc. Second ACM Conf. Electronic Commerce (EC '00), pp. 150157, 2000.
[30] P. Resnick and R. Zeckhauser, "Trust among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System," Proc. Workshop Empirical Studies of Electronic Commerce, 2002.
[31] J.M. Pujol, R. Sangüesa, and J. Delgado, "Extracting Reputation in Multi Agent Systems by Means of Social Network Topology," Proc. First Int'l Joint Conf. Autonomous Agents and Multiagent Systems (AAMAS '02), pp. 467474, 2002.
[32] P. Yolum and P. Singh, "SelfOrganizing Referral Networks: A Process View of Trust and Authority," First Int'l Workshop Eng. SelfOrganising Applications (ESOA '03), July 2003.
[33] A. Whitby, A. Josang, and J. Indulska, "Filtering Out Unfair Ratings in Bayesian Reputation Systems," Proc. Seventh Int'l Workshop Trust in Agent Societies (AAMAS '04), 2004.
[34] P. MacnaughtonSmith, W.T. Williams, M.B. Dale, and L.G. Mockett, "Dissimilarity Analysis: A New Technique of Hierarchical SubDivision," Nature, vol. 202, pp. 10341035, 1964.
[35] D. Goldberg, D. Nichols, B.M. Oki, and D. Terry, "Using Collaborative Filtering to Weave an Information Tapestry," Comm. ACM, vol. 35, pp. 6170, Dec. 1992.
[36] P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J. Riedl, "GroupLens: An Open Architecture for Collaborative Filtering of Netnews," Proc. ACM Conf. Computer Supported Cooperative Work (CSCW '94), pp. 175186, 1994.
[37] J. Herlocker, J.A. Konstan, and J. Riedl, "An Empirical Analysis of Design Choices in NeighborhoodBased Collaborative Filtering Algorithms," Information Retrieval, vol. 5, no. 4, pp. 287310, 2002.
[38] B.M. Sarwar, G. Karypis, J.A. Konstan, and J.T. Riedl, "Application of Dimensionality Reduction in Recommender System—A Case Study," Proc. ACM WebKDD Web Mining ECommerce Workshop, 2000.
[39] G. Shafer, A Mathematical Theory of Evidence. Princeton Univ. Press, 1976.
[40] G. Shafer, "The DempsterShafer Theory," Encyclopedia of Artificial Intelligence, 1992.
[41] F. Slanina and Y.C. Zhang, "Referee Networks and Their Spectral Properties," Acta Physica Polonica B, vol. 36, p. 2797, Sep. 2005.
[42] Y. Yang, Q. Feng, Y.L. Sun, and Y. Dai, "RepTrap: a Novel Attack on FeedbackBased Reputation Systems," Proc. Fourth Int'l Conf. Security and Privacy in Comm. Networks (Secure Comm '08), pp. 111, 2008.
[43] J. Chen, A. Dholakia, E. Eleflhetiou, M. Fossotier, and X.Y. Hu, "Near Optimum ReducedComplexity Decoding Algonhm for LDPC Codes," Proc. IEEE Int'l Symp. Information Theory, July 2002.