{"id":"https://openalex.org/W2192070699","doi":"https://doi.org/10.1504/ijaacs.2015.069566","title":"KFTrust: P2P trust model based on evaluation rank using Kalman filter","display_name":"KFTrust: P2P trust model based on evaluation rank using Kalman filter","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2192070699","doi":"https://doi.org/10.1504/ijaacs.2015.069566","mag":"2192070699"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijaacs.2015.069566","pdf_url":null,"source":{"id":"https://openalex.org/S191948775","display_name":"International Journal of Autonomous and Adaptive Communications Systems","issn_l":"1754-8632","issn":["1754-8632","1754-8640"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100332260","display_name":"Zhigang Chen","orcid":"https://orcid.org/0000-0002-7248-9162"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"funder","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhigang Chen","raw_affiliation_strings":["School of Information Science and Engineering, Central South University, No. Room 102 of Computer Building, CSU Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Central South University, No. Room 102 of Computer Building, CSU Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109391376","display_name":"M. Li","orcid":null},"institutions":[{"id":"https://openalex.org/I198357462","display_name":"Changsha University","ror":"https://ror.org/011d8sm39","country_code":"CN","type":"education","lineage":["https://openalex.org/I198357462"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"miao Li","raw_affiliation_strings":["Department of Computer Science, Changsha University, No. 98 Hongshan Road, Kaifu District, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Changsha University, No. 98 Hongshan Road, Kaifu District, China","institution_ids":["https://openalex.org/I198357462"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056257764","display_name":"Jingsong Gui","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"funder","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingsong Gui","raw_affiliation_strings":["School of Information Science and Engineering, Central South University, No. Room 102 of Computer Building, CSU Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Central South University, No. Room 102 of Computer Building, CSU Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103253363","display_name":"Xiaoheng Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"funder","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoheng Deng","raw_affiliation_strings":["School of Information Science and Engineering, Central South University, No. Room 102 of Computer Building, CSU Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Central South University, No. Room 102 of Computer Building, CSU Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101620437","display_name":"Lei Yuan","orcid":"https://orcid.org/0000-0003-3488-2278"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"funder","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Yuan","raw_affiliation_strings":["School of Information Science and Engineering, Central South University, No. Room 102 of Computer Building, CSU Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Central South University, No. Room 102 of Computer Building, CSU Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.634,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.842111,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":79},"biblio":{"volume":"8","issue":"2/3","first_page":"268","last_page":"268"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.53054196},{"id":"https://openalex.org/keywords/rank","display_name":"Rank (graph theory)","score":0.46726575},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.45043847},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.42958197}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8920982},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.78327537},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.56383395},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.5313569},{"id":"https://openalex.org/C157286648","wikidata":"https://www.wikidata.org/wiki/Q846780","display_name":"Kalman filter","level":2,"score":0.530627},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.53054196},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.46726575},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.45043847},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4390318},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.42958197},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.3723113},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3613793},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34692386},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14638132},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.10813752},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.07199195},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijaacs.2015.069566","pdf_url":null,"source":{"id":"https://openalex.org/S191948775","display_name":"International Journal of Autonomous and Adaptive Communications Systems","issn_l":"1754-8632","issn":["1754-8632","1754-8640"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.76,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1565696930","https://openalex.org/W1986820967","https://openalex.org/W2007868971","https://openalex.org/W2022036778","https://openalex.org/W2099286575","https://openalex.org/W2100107987","https://openalex.org/W2101081051","https://openalex.org/W2103913225","https://openalex.org/W2111974546","https://openalex.org/W2113044782","https://openalex.org/W2116911448","https://openalex.org/W2123892677","https://openalex.org/W2130234299","https://openalex.org/W2136452426","https://openalex.org/W2153407452","https://openalex.org/W2158049821","https://openalex.org/W2160914528","https://openalex.org/W2167514596","https://openalex.org/W2374502701"],"related_works":["https://openalex.org/W4385687966","https://openalex.org/W4243605140","https://openalex.org/W2940914837","https://openalex.org/W2916013893","https://openalex.org/W2509590646","https://openalex.org/W2495963281","https://openalex.org/W2339500151","https://openalex.org/W2300110045","https://openalex.org/W2170496240","https://openalex.org/W1579892909"],"abstract_inverted_index":{"Security":[0],"and":[1,18,114,166],"privacy":[2],"have":[3,55],"been":[4],"critically":[5],"important":[6],"with":[7,146],"the":[8,45,49,64,79,96,104,109,112,115,120,135,151,168],"fast":[9],"expansion":[10],"of":[11,26,48,83,122],"P2P":[12,27,29],"systems,":[13,28],"which":[14],"are":[15],"open,":[16],"anonymous":[17],"dynamic":[19],"in":[20,73,139],"nature.":[21],"Due":[22],"to":[23,39,43,61,71,95,133,159],"such":[24],"nature":[25],"networks":[30],"present":[31],"potential":[32],"threats":[33,41],"among":[34],"nodes.":[35,51],"One":[36],"feasible":[37],"way":[38],"minimise":[40],"is":[42,131,157],"evaluate":[44,63],"trust":[46,53,65,92,99,105],"values":[47,66],"interacting":[50],"Many":[52],"models":[54],"done":[56],"so,":[57],"but":[58],"they":[59],"fail":[60],"properly":[62],"when":[67],"malicious":[68,84,162],"nodes":[69,113],"start":[70],"behave":[72],"an":[74,89],"unpredictable":[75],"way.":[76],"To":[77],"solve":[78],"strategically":[80],"altering":[81],"behaviour":[82],"nodes,":[85,125],"this":[86],"paper":[87],"designs":[88],"evaluation":[90],"rank-based":[91],"model":[93,102,145,156],"according":[94],"different":[97],"recommended":[98,124],"values.":[100],"This":[101],"computes":[103],"value":[106],"by":[107],"combining":[108],"similarity":[110],"between":[111],"time":[116],"decaying":[117],"features.":[118],"In":[119],"mechanism":[121],"finding":[123],"a":[126],"trust-based":[127],"Kalman":[128],"filter":[129],"algorithm":[130],"implemented":[132],"reduce":[134,167],"system":[136,169],"overhead.":[137,170],"Finally,":[138],"our":[140,144,155],"experiments,":[141],"we":[142],"compare":[143],"other":[147],"four":[148],"typical":[149],"models,":[150],"results":[152],"show":[153],"that":[154],"able":[158],"defend":[160],"against":[161],"nodes'":[163],"attack":[164],"effectively":[165]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2192070699","counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-04-18T15:32:45.622690","created_date":"2016-06-24"}