{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:23:36Z","timestamp":1742937816550,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319942889"},{"type":"electronic","value":"9783319942896"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94289-6_24","type":"book-chapter","created":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T11:30:15Z","timestamp":1529321415000},"page":"373-388","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Identification for Strategically Malicious Participants"],"prefix":"10.1007","author":[{"given":"Xinxin","family":"Fan","sequence":"first","affiliation":[]},{"given":"Jingping","family":"Bi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,19]]},"reference":[{"issue":"2","key":"24_CR1","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Supp. Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Supp. Syst."},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640\u2013651. ACM (2003)","DOI":"10.1145\/775152.775242"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Fan, X., Liu, L., Li, M., Su, Z.: EigenTrust++: attack resilient trust management. In: Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 416\u2013425 (2012)","DOI":"10.4108\/icst.collaboratecom.2012.250420"},{"issue":"4","key":"24_CR4","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1109\/TPDS.2016.2611660","volume":"28","author":"X Fan","year":"2017","unstructured":"Fan, X., Liu, L., Li, M., Su, Z.: GroupTrust: dependable trust management. IEEE Trans. Parallel Distrib. Syst. 28(4), 1076\u20131090 (2017)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"12","key":"24_CR5","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P Resnick","year":"2000","unstructured":"Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM 43(12), 45\u201348 (2000)","journal-title":"Commun. ACM"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/11755593_15","volume-title":"Trust Management","author":"F Kerschbaum","year":"2006","unstructured":"Kerschbaum, F., Haller, J., Karabulut, Y., Robinson, P.: PathTrust: a trust-based reputation service for virtual organization formation. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 193\u2013205. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11755593_15"},{"issue":"1","key":"24_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TDSC.2012.74","volume":"10","author":"AB Can","year":"2013","unstructured":"Can, A.B., Bhargava, B.: SORT: a self-organizing trust model for peer-to-peer systems. IEEE Trans. Dependable Secure Comput. 10(1), 14\u201327 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"24_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2979677","volume":"16","author":"K Gai","year":"2017","unstructured":"Gai, K., Qiu, L., Chen, M., Zhao, H., Qiu, M.: SA-EAST: Security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 1\u201322 (2017). Article 60","journal-title":"ACM Trans. Embed. Comput. Syst."},{"issue":"3","key":"24_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2754934","volume":"9","author":"Z Su","year":"2015","unstructured":"Su, Z., Liu, L., Li, M., Fan, X., Zhou, Y.: Reliable and resilient trust management in distributed service provision networks. ACM Trans. Web 9(3), 1\u201337 (2015). Article 14","journal-title":"ACM Trans. Web"},{"key":"24_CR10","unstructured":"MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 281\u2013297 (1967)"},{"issue":"1","key":"24_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1023\/B:MACH.0000033113.59016.96","volume":"56","author":"P Drineas","year":"2004","unstructured":"Drineas, P., Frieze, A., Kannan, R., Vempala, S., Vinay, V.: Clustering large graphs via the singular value decomposition. Mach. Learn. 56(1), 9\u201333 (2004)","journal-title":"Mach. Learn."},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Meil\u0103, M.: The uniqueness of a good optimum for k-means. In: Proceedings of the 23rd International Conference on Machine Learning, pp. 625\u2013632. ACM (2006)","DOI":"10.1145\/1143844.1143923"},{"issue":"1","key":"24_CR13","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF01017372","volume":"35","author":"P Landsberg","year":"1984","unstructured":"Landsberg, P.: Is equilibrium always an entropy maximum? J. stat. phys. 35(1), 159\u2013169 (1984)","journal-title":"J. stat. phys."},{"issue":"6","key":"24_CR14","doi-asserted-by":"publisher","first-page":"1737","DOI":"10.1016\/j.jcss.2011.10.021","volume":"78","author":"X Fan","year":"2012","unstructured":"Fan, X., Li, M., Ma, J., Ren, Y., Zhao, H., Su, Z.: Behavior-based reputation management in P2P file-sharing networks. J. Comput. Syst. Sci. 78(6), 1737\u20131750 (2012)","journal-title":"J. Comput. Syst. Sci."},{"issue":"3","key":"24_CR15","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/91.413225","volume":"3","author":"N Palal","year":"1995","unstructured":"Palal, N., Bezdek, J.: On cluster validity for the fuzzy c-means model. IEEE Trans. Fuzzy Syst. 3(3), 370\u2013379 (1995)","journal-title":"IEEE Trans. Fuzzy Syst."}],"container-title":["Lecture Notes in Computer Science","Web Services \u2013 ICWS 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94289-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T11:36:07Z","timestamp":1710243367000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-94289-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319942889","9783319942896"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94289-6_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"19 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICWS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seattle, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icws2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icws.org\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"www.confhub.com","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"116","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}