Search
Now showing items 21-30 of 49
A generalized stereotype learning approach and its instantiation in trust modeling
(Elsevier, 2018-08)
Owing to the lack of historical data regarding an entity in online communities, a user may rely on stereotyping to estimate its behavior based on historical data about others. However, these stereotypes cannot accurately ...
A 2020 perspective on “A generalized stereotype learning approach and its instantiation in trust modeling”
(Elsevier, 2020-03)
Owing to the rapid increase of user data and development of machine learning techniques, user modeling has been explored in depth and exploited by both academia and industry. It has prominent impacts in e-commercerelated ...
On context-aware DDoS attacks using deep generative networks
(IEEE, 2018-10)
Distributed Denial of Service (DDoS) attacks continue to be one of the most severe threats in the Internet. The intrinsic challenge in preventing DDoS attacks is to distinguish them from legitimate flash crowds since two ...
Trust estimation of sources over correlated propositions
(IEEE, 2018-09-05)
This work analyzes the impact of correlated propositions when estimating the reporting behavior of information sources. These behavior estimates are critical for fusion, and traditional methods assume the propositions are ...
Interest-based negotiation for policy-regulated asset sharing
(Springer Nature, 2016)
Resources sharing is an important but complex problem to be solved. The problem is exacerbated in a coalition context due to policy constraints, that reflect concerns regarding security, privacy and performance to name a ...
Preface
(Springer International Publishing, 2016)
The pervasiveness of open systems raises a range of challenges and opportunities for research and technological development in the area of autonomous agents and multi-agent systems. Open systems comprise loosely coupled ...
How to trust a few among many
(Springer International Publishing, 2017)
The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can ...
Privacy enforcement through policy extension
(IEEE, 2016)
Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility ...
Semantic reasoning with uncertain information from unreliable sources
(Springer International Publishing, 2016)
Intelligent software agents may significantly benefit from semantic reasoning. However, existing semantic reasoners are based on Description Logics, which cannot handle vague, incomplete, and unreliable knowledge. In this ...
Share this page