期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Using UAV to Detect Truth for Clean Data Collection in Sensor⁃Cloud Systems 被引量:1
1
作者 LI Xiuxian LI Zhetao +2 位作者 OUYANG Yan DUAN Haohua XIANG Liyao 《ZTE Communications》 2021年第3期30-45,共16页
Mobile edge users(MEUs)collect data from sensor devices and report to cloud systems,which can facilitate numerous applications in sensor‑cloud systems(SCS).However,because there is no effective way to access the groun... Mobile edge users(MEUs)collect data from sensor devices and report to cloud systems,which can facilitate numerous applications in sensor‑cloud systems(SCS).However,because there is no effective way to access the ground truth to verify the quality of sensing devices’data or MEUs’reports,malicious sensing devices or MEUs may report false data and cause damage to the platform.It is critical for selecting sensing devices and MEUs to report truthful data.To tackle this challenge,a novel scheme that uses unmanned aerial vehicles(UAV)to detect the truth of sensing devices and MEUs(UAV‑DT)is proposed to construct a clean data collection platform for SCS.In the UAV‑DT scheme,the UAV delivers check codes to sensor devices and requires them to provide routes to the specified destination node.Then,the UAV flies along the path that enables maximal truth detection and collects the information of the sensing devices forwarding data packets to the cloud during this period.The information collected by the UAV will be checked in two aspects to verify the credibility of the sensor devices.The first is to check whether there is an abnormality in the received and sent data packets of the sensing devices and an evaluation of the degree of trust is given;the second is to compare the data packets submitted by the sensing devices to MEUs with the data packets submitted by the MEUs to the platform to verify the credibility of MEUs.Then,based on the verified trust value,an incentive mechanism is proposed to select credible MEUs for data collection,so as to create a clean data collection sensor‑cloud network.The simulation results show that the proposed UAV‑DT scheme can identify the trust of sensing devices and MEUs well.As a result,the proportion of clean data collected is greatly improved. 展开更多
关键词 sensor‑cloud system truth detection trust reasoning and evolution mobile edge user unmanned aerial vehicle
下载PDF
Mining Trust Relationships from Online Social Networks 被引量:2
2
作者 张宇 于彤 《Journal of Computer Science & Technology》 SCIE EI CSCD 2012年第3期492-505,共14页
With the growing popularity of online social network, trust plays a more and more important role in connecting people to each other. We rely on our personal trust to accept recommendations, to make purchase decisions ... With the growing popularity of online social network, trust plays a more and more important role in connecting people to each other. We rely on our personal trust to accept recommendations, to make purchase decisions and to select transaction partners in the online community. Therefore, how to obtain trust relationships through mining online social networks becomes an important research topic. There are several shortcomings of existing trust mining methods. First, trust is category-dependent. However, most of the methods overlook the category attribute of trust relationships, which leads to low accuracy in trust calculation. Second, since the data in online social networks cannot be understood and processed by machines directly, traditional mining methods require much human effort and are not easily applied to other applications. To solve the above problems, we propose a semantic-based trust reasoning mechanism to mine trust relationships from online social networks automatically. We emphasize the category attribute of pairwise relationships and utilize Semantic Web technologies to build a domain ontology for data communication and knowledge sharing. We exploit role-based and behavior-based reasoning functions to infer implicit trust relationships and category-specific trust relationships. We make use of path expressions to extend reasoning rules so that the mining process can be done directly without much human effort. We perform experiments on real-life data extracted from Epinions. The experimental results verify the effectiveness and wide application use of our proposed method. 展开更多
关键词 trust mining trust reasoning implicit trust category-specific trust SEMANTICS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部